You look at your watch as the time edges closer to the start of your security assessment. Your customer contracted with you to perform a black box penetration test of their internet-facing systems. With no information about their networks and systems to start with, you have to find targets to attack. Where do you begin? In this webcast, you will learn some well-known and some more-obscure methods of finding targets that may be in scope for your internet assessments using Open Source Intelligence (OSINT) tools and techniques.
Join Micah Hoffman, author of the new SEC487: Open-Source Intelligence Gathering and Analysis (https://www.sans.org/course/open-source-intelligence-gathering) course in the second installment of a three part series of webcasts on the practical applications of using Open Source Intelligence (OSINT) in our daily lives.