Intro to OSINT (with Justin Seitz)

Intro to OSINT (with Justin Seitz)

Advanced Persistent Security Podcast

Episode 17

Guest: Justin Seitz

September 06, 2016

If you enjoy this podcast, be sure to give us a 5 Star Review and “Love Us” on iTunes; Like us on Google Play, Stitcher, Sound Cloud, Spreaker, and YouTube.

NOTE: The opinions expressed in this podcast are ours alone and do not reflect those of our employers

Intro to OSINT (with Justin Seitz) Show Notes

Part 1

We introduce Justin and discuss his background. There is a quick discussion about the US Election Database hacks in Arizona and Illinois. Next, we discuss the message that is being sent, motives, outcomes, and whether the election databases are critical infrastructure. We discuss how these attacks could impact the election in November.

Part 2

Justin defines OSINT and provides some real world examples of the applications of OSINT. He talks about the role social media plays in OSINT and how OSINT is used to stop terrorists. He provides an alternative perspective of OSINT and the relationship that is has/does not have with Big Data. We talk about his blog posts dealing with OSINT gathering on the Dark Web using Python and Onion Scan. We talk about correlating SSH keys using Shodan.

Part 3

We discuss image recognition using OSINT. I joke that Saskatchewan will become Canada’s NSA. Justin talks about using image recognition to find ISIS and terrorists via finding the ISIS flag and guns/firearms. Justin identified gang members in Detroit using their hashtags on Twitter and Instagram and discusses police using OSINT to apprehend them.

OSINT Tools and Websites Mentioned

Sarah Jamie Lewis’ Site
Sarah Jamie Lewis’ GitHub
Countermeasure Con
@cmeasurecon
Imagga
PyimageSearch
Onion Scan
OpenCV
Bellingcat

Intro to OSINT (with Justin Seitz)
Justin Seitz

About Justin

A respected cyber security expert who has trained and consulted with Fortune 500s, law enforcement agencies, and governments around the world. Author of two Python books that were translated into 7 languages, Justin has helped to teach tens of thousands of people how to write code to automate computer hacking and OSINT tasks. In October 2014, Justin presented a unique method for tracking ISIS supporters on Twitter and Justin hopes he can share some OSINT secrets with you too.

Contacting Justin:

Twitter: @jms_dot_py
Website: automatingosint.com
Email: justin@automatingosint.com
Link to Justin’s Books:
Black Hat Python: Python Programming for Hackers and Pentesters
Gray Hat Python: Python Programming for Hackers and Reverse Engineers
Automating OSINT Training
hunch.ly

Announcements and Resources

Advanced Persistent Security has partnered with the EC-Council to provide a discounted EC-Council Training Event to our readers and listeners. The codes are only good for the Hacker Halted event in Atlanta, GA September 11-14 and 15-16, 2016. Below are the codes, if you have any questions, Contact Us.

Password Blog Links:

AlienVault
Hosted Locally on Advanced Persistent Security

SEPTEMBER 11TH-14TH, 2016

$1,999 Courses if you register using discount code: HHAPSTRN

Choose one of the following courses and exams:

  1. Certified Ethical Hacker (C|EH)*
  2. Computer Hacking Forensic Investigator (C|HFI)*
  3. Certified Security Analyst (E|CSA/L|PT)*
  4. Certified Chief Information Security Officer (C|CISO)*

All courses include:

  • Official Courseware
  • 1 Complimentary Exam Voucher
  • Certificate of attendance
  • Lunch and coffee breaks throughout the duration of the training
  • Complimentary Pass to Hacker Halted – Atlanta conference (September 15 & 16)

September 15-16, 2016

*Individual conference passes can be purchased for $35 (down from $199) Use code: HHAPSCON

Instructions for registration:

1) Click here

2) Fill in all the necessary info

3) Enter Qty (1) for conference pass – public

4) Enter promotional code HHAPSCON (for $35 Conference Passes) HHAPSTRN (for $1,999 Courses)

Thanks for stopping by and checking out our podcast. We would appreciate if you could subscribe (assuming you like what you hear; we think you will). This is meant to be informative and to provide value to anyone who listens – regardless of their knowledge and/or understanding of IT/Cybersecurity. To learn more about us, check out our “About Us” page.

If you have ANY Cybersecurity needs, please contact us and a member of our staff with promptly reply to your question or concern.


Enter your email address:


Delivered by FeedBurner


Subscribe to our mailing list

* indicates required