| |||||
| |||||
Search Irongeek.com:
Help Irongeek.com pay for bandwidth and research equipment: |
OSINT is often mentioned, but not really covered. Occasionally mention is made of a particular tool, but the aspiring
professional is left to their own means to discover how to use the tool, or
determine what information is of value. Given a sample case, a real world person, the talk will include
some dox freely available in the wild and discuss and demonstrate how some of
the information found can easily be used in a penetration test or by an
attacker. The purpose of this discussion is multi-parted. By and large it
will show some aspiring individuals how to go about gathering some of the
information. It will also serve as a warning to those in the audience who might be simply
curious about infosec and security in general, how easy it can be to find some
information about particular individuals. BIO: James is a full time systems administrator. A former
CCDC Alum, he is currently actively engaged with preparing the team for next
year. He works as an assistant to Georgia Weidman at Bulb Security, and is an
ambitious, aspiring, infosec professional.
15 most recent posts on Irongeek.com:
|
If you would like to republish one of the articles from this site on your
webpage or print journal please contact IronGeek.
Copyright 2020, IronGeek
Louisville / Kentuckiana Information Security Enthusiast