Joe and Ray discuss how OSINT is used in offensive security scenarios, focusing on the importance of doing in-depth research. In order to properly use OSINT, Ray explains that it is essential to identify and map out the risks associated with an organization, as well as to do research to understand the company's structure, assets, and resources. He emphasizes that it is important to look at where the information lies, in order to get an idea of who the key people are within an organization. This could include looking for patterns in social media accounts, websites, and other sources to uncover insight on those individuals. Ray also advises that when doing the legwork, it is important to not only look at public sources, but to dig deeper. By using OSINT, companies can better understand their adversaries and develop a more effective security strategy. He further explains that it is important to constantly monitor the situation, as adversaries often change their tactics or target different areas. With the right tools and strategies in place, organizations can stay one step ahead of potential threats and be better prepared to respond. 


Links Discussed:  

Dehashed: https://www.dehashed.com  
HaveIBeenPwned: https://www.haveibeenpwned.com  
SecurityTrails: https://www.securitytrails.com  
View DNS: https://www.viewdns.info  
DNS Dumpster: https://www.dnsdumpster.com  
Snapchat Map: https://map.snapchat.com  
Trace Labs Kali: https://www.tracelabs.org/initiatives/osint-vm  
Raspberry Pis: https://www.raspberrypi.com/  
Free Digital Ocean Credit: https://m.do.co/c/ab5f75969c8a  
Phone Infoga: https://github.com/sundowndev/phoneinfoga  
CSI Linux: https://csilinux.com/  
Flare VM: https://github.com/mandiant/flare-vm  
Parrot OS: https://www.parrotsec.org/  
Kali Linux: https://www.kali.org/ 
Axiom: https://github.com/pry0cc/axiom  
SANS SIFT: https://www.sans.org/tools/sift-workstation/  
Volatility Framework: https://www.volatilityfoundation.org/  
Shodan: https://www.shodan.io  
Michael Bazzell's Extreme Privacy: https://inteltechniques.com/book7.html  
Michael Bazzell's Website: https://inteltechniques.com/  
Joe's Podcast with Michael Bazzell: https://osint.mobi/michael-bazzell-podcast  
Joe's Podcast with Justin Seitz: https://osint.mobi/justin-seitz-podcast  
Justin Seitz's Hunchly: https://www.hunchly.com  
Justin Seitz's Python for OSINT Training: https://www.automatingosint.com  
Imagga: https://imagga.com/  
Infoga: https://github.com/The404Hacking/Infoga  
Joe's Podcast with Joe Vest: https://osint.mobi/red-team-podcast  



Contacting Rey:  

Twitter: https://twitter.com/reybango  

The OSINTion Links:  

https://linktr.ee/TheOSINTion  
Twitch: https://twitch.tv/theosintion  
YouTube: https://osint.mobi/youtube 

The OSINTion Training: 

On-Demand: https://academy.theosintion.com  
Live Training: https://www.theosintion.com/courses 


---

Send in a voice message: https://podcasters.spotify.com/pod/show/the-osintion/message
Support this podcast: https://podcasters.spotify.com/pod/show/the-osintion/support

Twitter Mentions