From the course: Deep Dive into Open-Source Intelligence
Unlock the full course today
Join today to access over 22,600 courses taught by industry experts or purchase this course individually.
Crawling websites to gather OSINT data
From the course: Deep Dive into Open-Source Intelligence
Crawling websites to gather OSINT data
- [Instructor] Websites are generally built by web designers, graphic designers, and marketers but rarely information security professionals which presents an opportunity for reconnaissance. The lack of cybersecurity experience for most web developers often results in security vulnerabilities and overexposure of company information on websites. Even when a website is built with security in mind, there's a lot of OSINT information still available to us. Websites need to be publicly available for customers, investors and other people to visit. Being public also means that the underlying web hosting providers, content management systems, code libraries and many other bits of information are accessible to us OSINT practitioners. Knowing information like what content management system is being used by your target, you can identify vulnerabilities that are designed for that specific technology. For example, by performing technical…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.
Contents
-
-
-
-
-
-
(Locked)
Introducing domain names and DNS discovery2m 41s
-
(Locked)
Crawling websites to gather OSINT data3m 20s
-
(Locked)
Finding deleted information in web archives2m 9s
-
(Locked)
Introduction to using search engines for OSINT2m 11s
-
(Locked)
Google hacking or dorking for OSINT2m 22s
-
(Locked)
Discovering OSINT data in the dark web3m 7s
-
(Locked)
Introduction to RIRs2m 46s
-
(Locked)
-