The OSINTion
The OSINTion
The OSINTion
Support podcast
Episode 6 - Exploring the Intersection of OSINT and Red Teaming with Rey Bango
1 hour 11 minutes Posted Mar 9, 2023 at 9:00 am.
0:00
1:11:31
Download MP3
Show notes

Joe and Ray discuss how OSINT is used in offensive security scenarios, focusing on the importance of doing in-depth research. In order to properly use OSINT, Ray explains that it is essential to identify and map out the risks associated with an organization, as well as to do research to understand the company's structure, assets, and resources. He emphasizes that it is important to look at where the information lies, in order to get an idea of who the key people are within an organization. This could include looking for patterns in social media accounts, websites, and other sources to uncover insight on those individuals. Ray also advises that when doing the legwork, it is important to not only look at public sources, but to dig deeper. By using OSINT, companies can better understand their adversaries and develop a more effective security strategy. He further explains that it is important to constantly monitor the situation, as adversaries often change their tactics or target different areas. With the right tools and strategies in place, organizations can stay one step ahead of potential threats and be better prepared to respond. 

Links Discussed:  

  • Dehashed: https://www.dehashed.com  
  • HaveIBeenPwned: https://www.haveibeenpwned.com  
  • SecurityTrails: https://www.securitytrails.com  
  • View DNS: https://www.viewdns.info  
  • DNS Dumpster: https://www.dnsdumpster.com  
  • Snapchat Map: https://map.snapchat.com  
  • Trace Labs Kali: https://www.tracelabs.org/initiatives/osint-vm  
  • Raspberry Pis: https://www.raspberrypi.com/  
  • Free Digital Ocean Credit: https://m.do.co/c/ab5f75969c8a  
  • Phone Infoga: https://github.com/sundowndev/phoneinfoga  
  • CSI Linux: https://csilinux.com/  
  • Flare VM: https://github.com/mandiant/flare-vm  
  • Parrot OS: https://www.parrotsec.org/  
  • Kali Linux: https://www.kali.org/ 
  • Axiom: https://github.com/pry0cc/axiom  
  • SANS SIFT: https://www.sans.org/tools/sift-workstation/  
  • Volatility Framework: https://www.volatilityfoundation.org/  
  • Shodan: https://www.shodan.io  
  • Michael Bazzell's Extreme Privacy: https://inteltechniques.com/book7.html  
  • Michael Bazzell's Website: https://inteltechniques.com/  
  • Joe's Podcast with Michael Bazzell: https://osint.mobi/michael-bazzell-podcast  
  • Joe's Podcast with Justin Seitz: https://osint.mobi/justin-seitz-podcast  
  • Justin Seitz's Hunchly: https://www.hunchly.com  
  • Justin Seitz's Python for OSINT Training: https://www.automatingosint.com  
  • Imagga: https://imagga.com/  
  • Infoga: https://github.com/The404Hacking/Infoga  
  • Joe's Podcast with Joe Vest: https://osint.mobi/red-team-podcast  


Contacting Rey:  

  • Twitter: https://twitter.com/reybango  

The OSINTion Links:  

  • https://linktr.ee/TheOSINTion  
  • Twitch: https://twitch.tv/theosintion  
  • YouTube: https://osint.mobi/youtube 

The OSINTion Training: 

  • On-Demand: https://academy.theosintion.com  
  • Live Training: https://www.theosintion.com/courses 


---
Send in a voice message: https://podcasters.spotify.com/pod/show/the-osintion/message
Support this podcast: https://podcasters.spotify.com/pod/show/the-osintion/support