From 90′s to 20′s | Espionage to Intelligence - Birth Of OSINT

Presented at ToorCon San Diego 19 (2017), Sept. 3, 2017, 2 p.m. (20 minutes)

Starting from Espionage and ending at OSINT, our data gathering techniques has been developed magnificently. In 90′s, the security posture of national security, law enforcement agencies, Cyber Security agencies was totally different. At that time gathering, data about someone was very difficult due to fewer Internet resources.But, this digital era has overcome the techniques used for information gathering in 90′s by Intelligence Gathering. It includes gathering data from various public sources and their API. Activities which one performs in its entire lifespan is recorded by various public sources.Intelligence Gathering includes human, geo-location, open-source, signals, digital and financial intelligence. The CIA, NSA, and RGA are using OSINT for collecting data as collateral information. In order to debunk people myth’s about information gathering, I made an open source tool called as OSINT-SPY which I will release after this talk. OSINT-SPY can find information about a person, email, an organization, person’s geolocation, domain names, publically available devices on the internet and so on. It can be used by Data Miners, Infosec Researchers, Penetration Testers and cyber crime investigator in order to find deep information about their target. In this talk, my main focus will be to demonstrate different techniques to gather information from public API, resources and understanding the need of implementing OSINT in any organization because open sources may often be useful in penetrating across closed borders than open societies.

Presenters:

  • Sharad Kumar
    Sharad Kumar is a cyber security researcher. His hard coded skills include Web Application Penetration Testing, Network Pentesting, Android, IOS Pentesting, Digital Forensics, Malware Analysis and shell coding.He is an active member of the cyber security community and has attended top cyber security conferences around the globe like BLACKHAT, RSA, COCON, HAKON etc. He has given various seminars, talks and online training to the USA, Scotland students.He is working as Cyber Security Engineer and Penetration Tester at Tutorialspoint.

Links:

Tags:

Similar Presentations: