06-20-2024, 10:07 AM
Osint For Beginners
Published 2/2024
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 3.03 GB | Duration: 6h 16m
Non regional edition: Learning OSINT for beginners and beyond
[b]What you'll learn[/b]
OSINT
Open Source Intelligence
Fact checking
Information gathering
[b]Requirements[/b]
• Requirements 40+ GB free space, 8+ GB memory, admin rights, internet connection
[b]Description[/b]
In this course you will be learning about OSINT (Open-source intelligence) from a non regional view (i.e.. the tools will be much more open and not focused on the US). Tools, techniques, setting up a virtual lab, and how to protect yourself. This is a comprehensive course that will be using free open source tools to investigate people and companies. No matter if you are totally new to the fascinating world of OSINT and hacking or have some experience, this course will walk you through how both hackers and investigators use these tools and why.This course is designed to be beginner friendly and also help educate experienced individuals alike with a easy to follow and practical approach. Your safety is also important as we explore the use of sock puppets, a Linux virtual machine and more.This course is built from the previous best selling courses that I have taught over the years. The intention was to build a course that is more accessible to people inside and outside of the US. If you have taken any of the previous OSINT courses by me, I do not recommend taking this course as the majority will be review.Get stuck or have a question? Always feel free to send me a message and I will do my best to help you out!The course has been recorded using a Hyperx Quadcast mic, shock stand, mic arm, OBS Studio 1920x1080, 48kHz Stereo.FYI, a reminder: I not anyone that is a part of DGS has any affiliation with any of the vendors, software manufactures, or programmers in this course.
Overview
Section 1: Introduction
Lecture 1 What is this course?
Lecture 2 What is OSINT and why is it important?
Lecture 3 Disclaimer
Lecture 4 What will you need?
Lecture 5 DGS Start.me page
Section 2: Getting Started
Lecture 6 Information overload and emotional impact
Lecture 7 Avoiding Bias
Lecture 8 What is a virtual machine (VM)?
Lecture 9 Installing VB (And alternative for Mac M1 & M2 CPUs)
Lecture 10 Installing CSI Linux
Lecture 11 Basic Linux commands
Lecture 12 Social Engineering
Section 3: Methodology
Lecture 13 OSINT Breakdown, Methodology, Mindmaps
Lecture 14 Crossing the line, ethical and legal boundries
Lecture 15 Tools (and websites) will break and sometimes fail you
Lecture 16 Verifying results
Lecture 17 Ask
Section 4: Safety
Lecture 18 Sock Puppets
Lecture 19 Building a Sock Puppet
Lecture 20 VPNs and kill switches
Lecture 21 DNS Leak tests
Lecture 22 CSI Tor Gateway
Lecture 23 Disposable Emails
Lecture 24 VOIP and Burner Phones
Lecture 25 2FA
Lecture 26 Password Managers
Lecture 27 Encryption
Section 5: Reporting
Lecture 28 Reports
Lecture 29 CSI Reports
Lecture 30 OBS
Lecture 31 Right to be forgotten
Section 6: Searches (Basic)
Lecture 32 Google, Bing, Yandex, Baidu, Duck Duck Go
Lecture 33 Google Dorks
Lecture 34 Google Alerts
Lecture 35 IntelX
Section 7: Map searches
Lecture 36 Google, Bing Maps
Lecture 37 Sun Calculator
Lecture 38 Weather reports
Section 8: Photos
Lecture 39 Analyzing photos
Lecture 40 Car Stickers
Lecture 41 GeoLocation
Lecture 42 Exifdata
Lecture 43 Photo Manipulation and Gan
Lecture 44 Reverse Image Searches
Section 9: Social Media
Lecture 45 Twitter/X
Lecture 46 Facebook
Lecture 47 Snapchat
Lecture 48 Telegram
Lecture 49 Linkedin
Lecture 50 WhatsApp
Section 10: IP Addresses
Lecture 51 IP to Location. VPN check, Tor Lookup
Lecture 52 Canary Tokens
Section 11: Browsers
Lecture 53 Tor
Lecture 54 Extentions
Section 12: Darkweb
Lecture 55 What is the Darkweb and how to browse it
Lecture 56 Searching the Darkweb
Section 13: Leaks and Dumps
Lecture 57 DDOS and Wikileaks
Lecture 58 Pastebin
Lecture 59 Dehashed and HaveIbeenPwned
Section 14: Tracking
Lecture 60 Flight trackers and Boat Trackers
Section 15: Websites
Lecture 61 Things to look for
Lecture 62 Wayback Machine
Lecture 63 Builtwith
Lecture 64 Whois
Section 16: Crawling and searches
Lecture 65 Spiderfoot
Lecture 66 Maltego
Lecture 67 Metagoofil
Section 17: Virus and Malware
Lecture 68 Hybridanalysis and Virustotal
Section 18: Phones
Lecture 69 LAN, Mobile, VOIP
Lecture 70 Phoneinfoga Phonefy
Section 19: Email
Lecture 71 Email Validation and Phishtool
Section 20: Media
Lecture 72 News sites and Media Bias
Lecture 73 Fact checking with Snopes
Section 21: People searches
Lecture 74 People Searches
Section 22: Crypto
Lecture 75 Bitcoin wallet
Section 23: Deaths and hospitals
Lecture 76 Finding death records (Ancestry, calling, obituary)
Section 24: Test time
Lecture 77 Let's use what you learned
Lecture 78 Example Solution (Video)
Section 25: Places to practice
Lecture 79 Places to practice what you learned
Section 26: Build a USB OSINT Toolkit
Lecture 80 Build a OSINT USB
Section 27: OSINT And AI
Lecture 81 AI and OSINT
Section 28: Thank you
Lecture 82 A Word of Thanks to you all
People interesting in OSINT (Open source intelligence) IT admins, investigators, law enforcement, home users, etc.
[b]What you'll learn[/b]
OSINT
Open Source Intelligence
Fact checking
Information gathering
[b]Requirements[/b]
• Requirements 40+ GB free space, 8+ GB memory, admin rights, internet connection
[b]Description[/b]
In this course you will be learning about OSINT (Open-source intelligence) from a non regional view (i.e.. the tools will be much more open and not focused on the US). Tools, techniques, setting up a virtual lab, and how to protect yourself. This is a comprehensive course that will be using free open source tools to investigate people and companies. No matter if you are totally new to the fascinating world of OSINT and hacking or have some experience, this course will walk you through how both hackers and investigators use these tools and why.This course is designed to be beginner friendly and also help educate experienced individuals alike with a easy to follow and practical approach. Your safety is also important as we explore the use of sock puppets, a Linux virtual machine and more.This course is built from the previous best selling courses that I have taught over the years. The intention was to build a course that is more accessible to people inside and outside of the US. If you have taken any of the previous OSINT courses by me, I do not recommend taking this course as the majority will be review.Get stuck or have a question? Always feel free to send me a message and I will do my best to help you out!The course has been recorded using a Hyperx Quadcast mic, shock stand, mic arm, OBS Studio 1920x1080, 48kHz Stereo.FYI, a reminder: I not anyone that is a part of DGS has any affiliation with any of the vendors, software manufactures, or programmers in this course.
Overview
Section 1: Introduction
Lecture 1 What is this course?
Lecture 2 What is OSINT and why is it important?
Lecture 3 Disclaimer
Lecture 4 What will you need?
Lecture 5 DGS Start.me page
Section 2: Getting Started
Lecture 6 Information overload and emotional impact
Lecture 7 Avoiding Bias
Lecture 8 What is a virtual machine (VM)?
Lecture 9 Installing VB (And alternative for Mac M1 & M2 CPUs)
Lecture 10 Installing CSI Linux
Lecture 11 Basic Linux commands
Lecture 12 Social Engineering
Section 3: Methodology
Lecture 13 OSINT Breakdown, Methodology, Mindmaps
Lecture 14 Crossing the line, ethical and legal boundries
Lecture 15 Tools (and websites) will break and sometimes fail you
Lecture 16 Verifying results
Lecture 17 Ask
Section 4: Safety
Lecture 18 Sock Puppets
Lecture 19 Building a Sock Puppet
Lecture 20 VPNs and kill switches
Lecture 21 DNS Leak tests
Lecture 22 CSI Tor Gateway
Lecture 23 Disposable Emails
Lecture 24 VOIP and Burner Phones
Lecture 25 2FA
Lecture 26 Password Managers
Lecture 27 Encryption
Section 5: Reporting
Lecture 28 Reports
Lecture 29 CSI Reports
Lecture 30 OBS
Lecture 31 Right to be forgotten
Section 6: Searches (Basic)
Lecture 32 Google, Bing, Yandex, Baidu, Duck Duck Go
Lecture 33 Google Dorks
Lecture 34 Google Alerts
Lecture 35 IntelX
Section 7: Map searches
Lecture 36 Google, Bing Maps
Lecture 37 Sun Calculator
Lecture 38 Weather reports
Section 8: Photos
Lecture 39 Analyzing photos
Lecture 40 Car Stickers
Lecture 41 GeoLocation
Lecture 42 Exifdata
Lecture 43 Photo Manipulation and Gan
Lecture 44 Reverse Image Searches
Section 9: Social Media
Lecture 45 Twitter/X
Lecture 46 Facebook
Lecture 47 Snapchat
Lecture 48 Telegram
Lecture 49 Linkedin
Lecture 50 WhatsApp
Section 10: IP Addresses
Lecture 51 IP to Location. VPN check, Tor Lookup
Lecture 52 Canary Tokens
Section 11: Browsers
Lecture 53 Tor
Lecture 54 Extentions
Section 12: Darkweb
Lecture 55 What is the Darkweb and how to browse it
Lecture 56 Searching the Darkweb
Section 13: Leaks and Dumps
Lecture 57 DDOS and Wikileaks
Lecture 58 Pastebin
Lecture 59 Dehashed and HaveIbeenPwned
Section 14: Tracking
Lecture 60 Flight trackers and Boat Trackers
Section 15: Websites
Lecture 61 Things to look for
Lecture 62 Wayback Machine
Lecture 63 Builtwith
Lecture 64 Whois
Section 16: Crawling and searches
Lecture 65 Spiderfoot
Lecture 66 Maltego
Lecture 67 Metagoofil
Section 17: Virus and Malware
Lecture 68 Hybridanalysis and Virustotal
Section 18: Phones
Lecture 69 LAN, Mobile, VOIP
Lecture 70 Phoneinfoga Phonefy
Section 19: Email
Lecture 71 Email Validation and Phishtool
Section 20: Media
Lecture 72 News sites and Media Bias
Lecture 73 Fact checking with Snopes
Section 21: People searches
Lecture 74 People Searches
Section 22: Crypto
Lecture 75 Bitcoin wallet
Section 23: Deaths and hospitals
Lecture 76 Finding death records (Ancestry, calling, obituary)
Section 24: Test time
Lecture 77 Let's use what you learned
Lecture 78 Example Solution (Video)
Section 25: Places to practice
Lecture 79 Places to practice what you learned
Section 26: Build a USB OSINT Toolkit
Lecture 80 Build a OSINT USB
Section 27: OSINT And AI
Lecture 81 AI and OSINT
Section 28: Thank you
Lecture 82 A Word of Thanks to you all
People interesting in OSINT (Open source intelligence) IT admins, investigators, law enforcement, home users, etc.