The OSINT advantage: Find your weak spots before attackers do
ATT&CK techniques detected
T1589.002Email Addresses
43%
“check breach databases such as have i been pwned to see if company emails appear in known leaks. - they also use google dorks to search for publicly exposed documents ( e. g., “ filetype : xls ceo email " ) - they scan for unprotected servers using shodan or censys. - using malte…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1592Gather Victim Host Information
31%
“a plethora of open - source and proprietary tools that automate data collection and analysis. some of the most common ones are : - shodan and censys : these are staples among search engines for internet - connected devices, such as routers and ip cameras. they help you see what ’…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
Summary
Here’s how open-source intelligence helps trace your digital footprint and uncover your weak points, plus a few essential tools to connect the dots