1. Foundation of OSINT.zip
514.6 MB
1 - Course Introduction
2 - Understanding OSINT
3 - Goals of OSINT Collection
4 - Diving into the Collecting
5 - Taking Excellent Notes
6 - Determining Your Threat Profile
7 - Setting up an OSINT Platform
8 - Effective Habits and Process
9 - Leveraging Search Engines
2 - Understanding OSINT
3 - Goals of OSINT Collection
4 - Diving into the Collecting
5 - Taking Excellent Notes
6 - Determining Your Threat Profile
7 - Setting up an OSINT Platform
8 - Effective Habits and Process
9 - Leveraging Search Engines
2. Gathering Searching and Analyzing OSINT.zip
684.6 MB
1 - Data Analysis Challenges
2 - Harvesting Web Data
3 - File Metadata Analysis
4 - OSINT Frameworks
5 - Basic Data Addresses and Phone Numbers
6 - Basic Data Email Addresses
7 - User Names
8 - Avatars and Reverse Image Searches
9 - Additional Public Data
10 - Creating Sock Puppets
2 - Harvesting Web Data
3 - File Metadata Analysis
4 - OSINT Frameworks
5 - Basic Data Addresses and Phone Numbers
6 - Basic Data Email Addresses
7 - User Names
8 - Avatars and Reverse Image Searches
9 - Additional Public Data
10 - Creating Sock Puppets
3. Social Media Geolocation and Imagery.zip
673.4 MB
1 - People Search Engines
2 - Facebook Analysis
3 - Linkedin Data
4 - Instagram
5 - Twitter Data
6 - Geolocation
7 - Imagery and Maps
2 - Facebook Analysis
3 - Linkedin Data
4 - Instagram
5 - Twitter Data
6 - Geolocation
7 - Imagery and Maps
4. Networks Government Business.zip
626.6 MB
1 - Whois
2 - IP Address
3 - DNS
4 - Findings Online Devices
5 - Wireless Networks
6 - Recon Tool Suites and Frameworks
7 - Government Data
8 - Researching Companies
2 - IP Address
3 - DNS
4 - Findings Online Devices
5 - Wireless Networks
6 - Recon Tool Suites and Frameworks
7 - Government Data
8 - Researching Companies
5. The Dark Web Breach Data and International Issues.zip
465.8 MB
1 - The Surface Deep and Dark Webs
2 - The Dark Web
3 - Freenet
4 - I2P Invisible Internet Project
5 - Tor
6 - Monitoring and Alerting
7 - International Issues
8 - Vehicle Searches
9 - Putting It All Together
2 - The Dark Web
3 - Freenet
4 - I2P Invisible Internet Project
5 - Tor
6 - Monitoring and Alerting
7 - International Issues
8 - Vehicle Searches
9 - Putting It All Together
Section1 - Advanced Attacks.zip
582.7 MB
1 - Introduction
2 - Methodology and Context
3 - File Inclusion
4 - SQL Injection
5 - NoSQL Injection
6 - XSS and XSRF Together
2 - Methodology and Context
3 - File Inclusion
4 - SQL Injection
5 - NoSQL Injection
6 - XSS and XSRF Together
Section2 - Web Frameworks.zip
442.3 MB
1 - Introduction
2 - Content Management Systems
3 - Web Architectures
4 - Languages and Frameworks
2 - Content Management Systems
3 - Web Architectures
4 - Languages and Frameworks
Section3 - Web Cryptography.zip
471.3 MB
1 - Introduction to Web Cryptography
2 - Basic Crypto Concepts
3 - Ciphers and Ciphers Modes
4 - Identifying Crypto
5 - Crypto Exploit Concepts
6 - Attacking Encryption Keys
7 - Attacking Stream Ciphers
8 - Attacking ECB Cipher Mode
9 - Attacking CBC Cipher Mode
10 - Attacking PKCS#7
2 - Basic Crypto Concepts
3 - Ciphers and Ciphers Modes
4 - Identifying Crypto
5 - Crypto Exploit Concepts
6 - Attacking Encryption Keys
7 - Attacking Stream Ciphers
8 - Attacking ECB Cipher Mode
9 - Attacking CBC Cipher Mode
10 - Attacking PKCS#7