OSINT: Open-Source Intelligence
- Description
- Curriculum
- FAQ
- Reviews
In this course you will be learning about OSINT (Open-source intelligence) from a hacker’s point of view. Tools, techniques, setting up a virtual lab, and how to protect yourself. This is a comprehensive course that will be using free open source tools to investigate people and companies. No matter if you are totally new to the fascinating world of OSINT and hacking or have some experience, this course will walk you through how both hackers and investigators use these tools and why.
This course is designed to be beginner friendly and also help educate experienced individuals alike with a easy to follow and practical approach. Your safety is also important as we explore the use of sock puppets, a Linux virtual machine and more.
Worried about out of date content? I have gone through updating the content as things change, become obsolete, I find new cool tools, or techniques. These updates are free along with the bonus content.
Get stuck or have a question? Always feel free to send me a message and I will do my best to help you out!
FYI, a reminder: I not anyone that is a part of DGS has any affiliation with any of the vendors, software manufactures, or programmers in this course.
-
1IntroductionVideo lesson
An introduction to the course, myself, and expectations for OSINT
-
2DisclaimerVideo lesson
- The tools presented in this course are free and open-source
- All of the information that we gather and analyze are from publicly available sources
- While OSINT is also used by hackers, OSINT in itself is not illegal (check with your local laws). We are not exploiting systems or people to obtain this information.
- I am not responsible for misuse of the information or techniques demonstrated in this course.
- I am not responsible for for lost, corrupted, or otherwise altered/damaged files, software or hardware.
- This course is presented on a "As is" basis.
-
3What is OSINT and who is OSINT for?Video lesson
-
4Mental preparationVideo lesson
-
5Data sheetVideo lesson
-
6OSINT PathVideo lesson
-
7What will you need?Video lesson
What will you need for this course?
-
8Your tools will breakVideo lesson
-
9AskVideo lesson
-
10Crossing the lineVideo lesson
-
13VirtualizationVideo lesson
What is virtualization? We discuss what virtualization is and why you would want to use it.
-
14Installing Virtualbox (Windows host)Video lesson
-
15CSILinux installVideo lesson
-
16Temp CSI DownloadText lesson
-
17Linux Terminal basicsVideo lesson
In this video we will be going over some basic Linux terminal commands. While knowing terminal commands is not necessary for OSINT per se, it is useful o have a basic understanding of them.
-
18BiasVideo lesson
-
19Why a sock puppet account and what is it?Video lesson
-
20More sock puppets GmailVideo lesson
-
21SudoVideo lesson
There may be times where we need to conceal our real identity or just need a burner telephone number, text message, and/or email. Sudo to the rescue! This is currently a iOS only app.
-
22Temp mailVideo lesson
Using a temporary email solution instead of your burner email.
-
23Using Text Free for texting updatedVideo lesson
-
24CSI Linux Sock PuppetsVideo lesson
-
25Handling dataVideo lesson
In this video we talk about handling data and some tips on how not to become overwhelmed.
-
26Cherry tree templatesText lesson
These are a couple templates for a OSINT report. There is a technical report and a executive report template. Feel free to modify them to fit your needs.
-
27Opening Cherry tree files With audioVideo lesson
-
28Additional content: How to use Cherrytree templatesVideo lesson
-
29Keeping your data safeVideo lesson
In this video we look at some options to keep your data and yourself secure.
-
30Google Advanced OperatorsVideo lesson
In this video we will be looking at some advanced search techniques using Google.
-
31Google MapsVideo lesson
In this video we will be looking at Google maps and how it can be used in OSINT
-
32Google ImagesVideo lesson
In this video we talk about doing a reverse image search with Google.
-
33Exact match Google ImagesVideo lesson
-
34Google alertsVideo lesson
Google and Twitter alerts
-
35Other reverse image searchesVideo lesson
In this video we explore other reverse image options
-
36GeolocationVideo lesson
-
37GreynoiseVideo lesson
-
38Reverse emailVideo lesson
In this video we will be looking at some techniques to perform reverse email searches on our target.
Currently Behindemail is no longer in service.
-
39Phone OSINTVideo lesson
-
40Additional content: Reverse phone US and EuropeVideo lesson
-
41Reverse PhoneVideo lesson
In this video we will be looking at reverse number lookups.
-
42Deepfake detectionVideo lesson
https://platform.sensity.ai/deepfake-detection
-
43Deepware.aiVideo lesson
-
45Black Book OnlineVideo lesson
https://www.blackbookonline.info/index.html
-
46USA Public Data SearchVideo lesson
Cibib is now xlek, thank you Everand for the heads up.
-
47Dehashed (Updated 2/2/19)Video lesson
In this video we take a look at the breach site Dehashed.
-
48';--have i been pwned?Video lesson
In this video we learn about have i been pwned and how it can help in OSINT
-
49webmiiVideo lesson
In this video we are looking at webmii.com to search a person's internet footprint.
-
50Resume findersVideo lesson
In this video we look at some resume finders and how they can be applied to OSINT
-
51Family treesVideo lesson
In this video we talk a look at how family trees can be applied to OSINT and some sites.
-
52Property ownershipVideo lesson
-
53HospitalsVideo lesson
-
54Instant CheckmateVideo lesson
-
55Unmask Google UsersVideo lesson
-
56SpiderfootVideo lesson
In this section we will be looking at Spiderfoot, a program designed to crawl websites and harvest information.
https://sf-1485db5.hx.spiderfoot.net/
-
57wget and HTTrackVideo lesson
-
58Updated: MetagoofilVideo lesson
https://github.com/laramies/metagoofil
-
59Webpage CacheVideo lesson
The internet never forgets... In this video we will be looking at some options to retrieve lost pages from the internet.
-
60Saving to the Internet ArchiveVideo lesson
-
61The darkwebVideo lesson
In this video we will be talking about the darkweb, what it is, navigating it, tips and a demonstration.
-
62TorVideo lesson
What is the dark web, how to get there. Mobile, Onions, and Tor
-
632 VPN or not 2 VPN with TorVideo lesson
-
64Ahmia.fiVideo lesson
-
65CSI Tor GatewayVideo lesson
-
66Filtering fake news with SurfSafeVideo lesson
In this video we take a look at the tool SafeSurf that can be used to analyze news photos to make sure they are legitimate.
-
67Image CapturingVideo lesson
In this video we will be looking at different options to save videos and images from our targets.
-
68User agent switcherVideo lesson
-
69start.meVideo lesson
-
70Building a Facebook sock puppet accountVideo lesson
-
71Twitter Mind mapVideo lesson
-
72TwitterVideo lesson
In this video we look at Tinfoleak that is preinstalled on CSI Linux for Twitter OSINT
-
73X Part 2Video lesson
-
74Facebook IDVideo lesson
In this video we talk about getting a user's Facebook ID number
-
75FB DownVideo lesson
In this video we talk about downloading Facebook videos
-
76Bypassing Youtube login BonusVideo lesson
In this video we talk about how to bypass a Youtube login to view a video.
-
77Additional content: Using social media to track the Capitol riotsVideo lesson
https://projects.propublica.org/parler-capitol-videos/
https://intelx.io/?did=814b39fe-ad98-45a1-9f44-0346bc9f9b94
-
78Bonus User searches with MaigretVideo lesson
https://github.com/soxoj/maigret
-
79Youtube Data ViewerVideo lesson
https://citizenevidence.amnestyusa.org/
-
80Fixed Bonus: Profil3rVideo lesson
-
81BlueskyVideo lesson
-
82internect.infoVideo lesson
-
83HoaxyVideo lesson