Главная
Study mode:
on
1
Intro
2
SECTF Trophy
3
What is OSINT?
4
Where can one gather OSINT?
5
Major OSINT Resources
6
Gathering OSINT
7
More of "Where"
8
Goals of OSINT
9
An example of OSINT
10
Collecting OSINT
11
OSINT Goldmines
12
Mitigations
13
TRAIN YOUR PEOPLE!!!
14
Final training rant
15
Collection Considerations
16
Know Your Enemy
17
A note about OPSEC
18
Opting out links
19
Secure Internet Usage
20
Streisand Effect
21
Types of Deception
22
Disinformation Accounts
23
A final layer of OPSEC
24
A note about public records and info
25
What NOT to do
26
Deceptive Technologies
27
Honeypots
28
Canaries
29
About Encryption
30
Through the Hacking Glass (TTHG) - a Peerlyst project
31
Future Speaking Engagements
32
Donating My Birthday
Description:
Explore deceptive techniques to counter OSINT attempts in this 47-minute conference talk from BSides NOVA 2018. Delve into the world of Open Source Intelligence (OSINT), learning about major resources, collection methods, and goldmines of information. Discover mitigation strategies, including the importance of training personnel and understanding the enemy. Examine various types of deception, such as disinformation accounts and deceptive technologies like honeypots and canaries. Gain insights on secure internet usage, the Streisand Effect, and encryption. Learn what to avoid when protecting information and consider the implications of public records. The talk also touches on the Through the Hacking Glass (TTHG) project and concludes with information on future speaking engagements.

Deceptive Techniques to Derail OSINT Attempts

Add to list
0:00 / 0:00