- This person does not exist
- this resume does not exist
- this rental does not exist
- fake name generator
- Random User
- British Name Generator
- Random Word Generator
- Elfqrin Fake ID
- Behind the Name
Cyber Attacks Resulting from OSINT
Search Engines for Passive Reconnaissance.
Email Harvesting for password stuffing & Social engineering attacks
DNS Enumeration
WHY DOES OSINT MATTER?
For the Good…
- Designed to help security professionals to focus on specific areas of interest
- Aids privacy-minded people to learn how exposed they are
- used for ethical hacking & penetrations testing
- Helps to identify external threats
- Provides anonymity when conducting passive recon (Sock Puppet, VPN, TOR)
- Find and Fix weaknesses in the organizational network
On the Dark Side
- Threat actors have access to the same tools and techniques as security professionals
- Identify potential targets and exploit weaknesses
- Become a victim of a sock puppet person.
- Aids in Criminal Phishing attacks and social engineering campaigns
- Highly used by Government intelligence agencies
- Exploit Sensitive information
CLI TOOLS
Credit:
Encoders Pro
Post a Comment