The Dark Art of OSINT


Details
The first stage in the cyber kill chain is reconnaissance. Before attacking an organization you need to discover its weaknesses and vulnerabilities.
During this Meetup we're going to examine popular some tools and strategies of OSINT -- open source intelligence gathering. You'll learn how to locate publically available information that could be used against your company and employees.
- Searching public Git repos for credentials and keys
- Subdomain enumeration
- Google dorking
- Automating compromised account discovery
- Job post TMI
- People searching
This month will also feature a lightning talk, Classical Insight, Modern Application. Kung fu expert, Dan Borden, teaches us how to apply lessons from The Book of Five Rings to DevSecOps.
Speakers
Dan Borden, IT Manager @Yello
Lukasz Czechura, Information Security Officer @Yello
Schedule
6:00 - 6:30p - Networking + food and beverages
6:30 - 6:45p - Lighting Talk: Classical Insight, Modern Application
6:45 - 7:30p - The Dark Art of OSINT
7:30 - 8:00p - Q&A, networking

The Dark Art of OSINT