![The OSINTion artwork](https://is1-ssl.mzstatic.com/image/thumb/Podcasts113/v4/77/8e/19/778e19a2-6541-ffe6-d47b-9ed80a78f102/mza_4146906507731982758.jpg/100x100bb.jpg)
Episode 6 - Exploring the Intersection of OSINT and Red Teaming with Rey Bango
The OSINTion
English - March 09, 2023 17:00 - 1 hour - 65.5 MB - ★★★★ - 10 ratingsTechnology News Tech News cissp issmp hacking data breach cpes advanced persistent security joe Homepage Download Apple Podcasts Google Podcasts Overcast Castro Pocket Casts RSS feed
Joe and Ray discuss how OSINT is used in offensive security scenarios, focusing on the importance of doing in-depth research. In order to properly use OSINT, Ray explains that it is essential to identify and map out the risks associated with an organization, as well as to do research to understand the company's structure, assets, and resources. He emphasizes that it is important to look at where the information lies, in order to get an idea of who the key people are within an organization. This could include looking for patterns in social media accounts, websites, and other sources to uncover insight on those individuals. Ray also advises that when doing the legwork, it is important to not only look at public sources, but to dig deeper. By using OSINT, companies can better understand their adversaries and develop a more effective security strategy. He further explains that it is important to constantly monitor the situation, as adversaries often change their tactics or target different areas. With the right tools and strategies in place, organizations can stay one step ahead of potential threats and be better prepared to respond.
Links Discussed:
Dehashed: https://www.dehashed.com
HaveIBeenPwned: https://www.haveibeenpwned.com
SecurityTrails: https://www.securitytrails.com
View DNS: https://www.viewdns.info
DNS Dumpster: https://www.dnsdumpster.com
Snapchat Map: https://map.snapchat.com
Trace Labs Kali: https://www.tracelabs.org/initiatives/osint-vm
Raspberry Pis: https://www.raspberrypi.com/
Free Digital Ocean Credit: https://m.do.co/c/ab5f75969c8a
Phone Infoga: https://github.com/sundowndev/phoneinfoga
CSI Linux: https://csilinux.com/
Flare VM: https://github.com/mandiant/flare-vm
Parrot OS: https://www.parrotsec.org/
Kali Linux: https://www.kali.org/
Axiom: https://github.com/pry0cc/axiom
SANS SIFT: https://www.sans.org/tools/sift-workstation/
Volatility Framework: https://www.volatilityfoundation.org/
Shodan: https://www.shodan.io
Michael Bazzell's Extreme Privacy: https://inteltechniques.com/book7.html
Michael Bazzell's Website: https://inteltechniques.com/
Joe's Podcast with Michael Bazzell: https://osint.mobi/michael-bazzell-podcast
Joe's Podcast with Justin Seitz: https://osint.mobi/justin-seitz-podcast
Justin Seitz's Hunchly: https://www.hunchly.com
Justin Seitz's Python for OSINT Training: https://www.automatingosint.com
Imagga: https://imagga.com/
Infoga: https://github.com/The404Hacking/Infoga
Joe's Podcast with Joe Vest: https://osint.mobi/red-team-podcast
Contacting Rey:
Twitter: https://twitter.com/reybango
The OSINTion Links:
https://linktr.ee/TheOSINTion
Twitch: https://twitch.tv/theosintion
YouTube: https://osint.mobi/youtube
The OSINTion Training:
On-Demand: https://academy.theosintion.com
Live Training: https://www.theosintion.com/courses
---
Send in a voice message: https://podcasters.spotify.com/pod/show/the-osintion/message
Support this podcast: https://podcasters.spotify.com/pod/show/the-osintion/support