English | MP4 | AVC 1280×720 | AAC 44KHz 2ch | 138 lectures (10h 37m) | 7.08 GB
Discover emails, passwords, online accounts, locations, phone numbers and much more | No Prior Knowledge Required
Zaid and Saad tamed up to bring you the best OSINT course out there and get you certified as an Open Source Intelligence Professional. Combining Zaid’s experience in ethical hacking and teaching over 1 million students world wide, with Saad’s amazing and focused OSINT skills.
This course will teach you how to use Open Source Intelligence (OSINT) to gather information about anything. With no prior knowledge required, this course takes you from a beginner to an expert at performing advanced OSINT techniques, giving you the ability to gather information about individuals, companies, email addresses, phone numbers, social media accounts, physical locations, images and more.
Just like our other courses, this course is highly practical, but it won’t neglect the theory. We’ll start with the basics of open-source intelligence, then we’ll dive and start using OSINT to investigate people, companies and individual pieces of information straight away. You’ll learn everything by example, by gathering real information online — no boring dry lectures. By the end of the course, you will be an expert in open-source intelligence (OSINT).
To achieve this the course is divided into a number of sections, each aims to teach you a specific OSINT technique. You’ll first learn what is OSINT, why it is used, and who uses it. Then you’ll learn how to use OSINT to find real information about targets, starting with just one piece of information (such as a name, email, username) and discovering all kinds of linked information such as hidden accounts, phone numbers, social media presence, leaked information, passwords and much more.
As we proceed, you will be introduced to different OSINT methodologies, tools, and techniques. Everything will be taught through examples and hands-on practicals—no useless or boring lectures!
All the techniques in this course are practical and work against real targets, you’ll understand how to investigate each piece of information individually. Therefore by the end of the course you’ll be able to start with any piece of information and carry out a full investigation to uncover rated data and information.
By the end of the course, you’ll be able to modify these techniques to launch more sophisticated OSINT investigations and adapt them to suit different situations and scenarios.
Here are some of the topics that will be covered in the course:
- People OSINT
- Username OSINT
- Phone OSINT
- SOCMINT – Social Media OSINT
- Maps and Satellite OSINT.
- Image OSINT
- Website OSINT
- Search engines operators.
- Custom search operators.
- Searching with AI
- Setting up an OSINT virtual machine
- Creating a Sock Puppet account
- Searching for leaked / breached databases
- Downloading leaked / breached databases
- Leveraging leaked / breached databases to find sensitive information.
- Finding passwords in leaked / breached databases.
- Scraping & downloading posts from Instagram, Tiktok, Snapchat, etc.
- Finding hidden content, posts, comments, accounts, etc.
- Discovering linked usernames, accounts, phone numbers, emails, etc.
- Tracking phone numbers, images, online accounts, etc.
- Investigating locations with various maps and satellite services
- Discovering subdomains, hidden website owners, linked websites and more!
- Using people search engines
- Reverse image search
- Geolocation of photos
- AI image tracking
- Manual image tracking
- Facial recognition
- Voter records lookup
- Searching Wedding/Baby/Gift registries
- OSINT automation.
- Writing OSINT reports.
You’ll use the following tools to achieve the above:
- Tracelabs OSINT VM
- True People search engine.
- Phoneinfoga
- Sherlock
- Spiderfoot
- Ghunt
- Httprobe
- Sublist3r
- Instaloader
- WPScan
- Google Dorks
- DorkGPT
- Google Hacking Database GHDB
- Exif Tool
- DeHashed
- LeakPeek
- Breach Directory
- Have I Been Pwned
- IntelX Tools
- VirtualBox
- True People Search
- OSINT Industries
- CyberChef
- OpenStreetMap (OSM)
- DNSDumpster
- Wayback Machine
- FOCA
- GeoSpy
- Osintracker
Table of Contents
Introduction to Open Source Intelligence
1 [Teaser] Finding Location, Phone Number + More From a Photo!
2 Course Introduction
3 What is OSINT
Search Engines OSINT
4 Introduction to Search Engines OSINT
Search Engine OSINT – Google Search Operators
5 Discovering Sensitive Information About People
6 Discovering Social Media Profiles Accounts
7 Discovering PDF Documents Associated with Targets
8 Find Hidden Search Results
9 Find Cameras & More With GHDB
10 Enhancing Google Searches with AI
Search Engine OSINT – Bing Search Operators
11 Discovering Additional Information & Online Accounts Using Bing
12 Beyond Google Finding Hidden Information
Digging Deeper with Alternative Search Engines
13 Find More with Special Yandex Operators
14 Expanding Results with Alternative Search Tools
Database Breaches & Leaks – Finding Passwords, Emails, Locations + More!
15 Introduction to Database Breaches & Leaks
16 Understanding the Difference Between Breached & Leaked Database
17 Finding Relevant Breach Leak Databases
18 Finding Emails, Passwords & More
19 Finding Addresses, Phone Number & More
Downloading Leak Breach Databases
20 Setting Up an Isolated Virtual Environment
21 Installing Needed Software to Manage Leaked Databases
22 Downloading & Accessing Leaked Facebook Data
23 Downloading & Accessing Leaked Twitter Data
24 Downloading & Accessing Leaked LinkedIn Data
25 Downloading & Accessing Leaked Snapchat Data
26 Finding Leaked Databases on The Internet
27 Recap
Building a Sock Puppet Identity for OSINT
28 Introduction to Sock Puppet Accounts in OSINT
29 Creating an Untraceable Covert Account
30 How to Keep Your Covert Account Safe & Active
Social Media Intelligence (SOCMINT)
31 Introduction to Social Media OSINT (SOCMINT)
Facebook OSINT
32 Extracting Valuable Information From a Facebook Profile
33 Extracting User ID, Facebook Friends & More
34 Uncovering Emails and More from Facebook Profiles
35 Finding CommentsTags of a Facebook Account
36 Facebook OSINT Recap
Instagram OSINT
37 Extracting the User ID of an Instagram Account
38 Extracting Timestamps from Posts and Comments
39 Uncovering Comments of Private Instagram Accounts
40 Extracting Hidden Information from Instagram Metadata
41 Scraping Instagram Followers
42 Downloading Instagram Posts
Creating an OSINT Virtual Machine
43 Installing Trace Labs OSINT VM
44 OSINT VM Overview
45 The Terminal & Linux Commands
46 Install Essential OSINT Tools
47 Automatically Download Instagram Profiles
Twitter OSINT
48 Extracting X Twitter User IDs
49 Recovering Deleted Tweets and Timestamps
50 Leveraging Search Operators to Find Specific Tweets
51 Discovering Tweets Posted from a Specific Location
52 Twitter OSINT Recap
LinkedIn OSINT
53 Discovering and Analysing LinkedIn Profiles
54 Finding Hidden Names & Extracting Post Timestamps
55 Finding LinkedIn Profile Member IDs
Other Social Media OSINT
56 Snapchat OSINT – Downloading Stories & Extracting Metadata
57 TikTok OSINT – Downloading Videos, Extracting Timestamps, Metadata & More
Username OSINT – Tracking Online Identities
58 Introduction to Username OSINT
59 Tracking a Username Using Advanced Search Techniques
60 Finding Hidden Profiles with Reverse Username Lookup
61 Finding Linked Accounts Across the Web
62 Finding Passwords & Other BreachedLeaked Data Connected to a Username
63 Discovering Additional Online Accounts Automatically
64 Recap
People OSINT – Uncovering Personal Information Online
65 Introduction to People OSINT
66 Finding the Geographic Origins of a Name
67 Find Personal Details Using Advanced Search Techniques
68 Discovering Social Media Accounts Linked to a Person
69 Discovering Phone Numbers, Addresses, DOB, and More
70 Uncover Political Party Affiliations
71 Finding Partners and Maiden Names in Registries
72 Recap
Email OSINT – Finding Email Addresses
73 Introduction to Email OSINT
74 Uncovering Emails From SocialOnline Accounts
75 Finding Emails Using Advanced Search Techniques
76 Uncovering Emails Linked to Usernames
77 Creating and Verifying Possible Email Addresses
78 Uncovering Emails with Browser Tools
79 Finding Business Email Addresses
80 Discovering Emails Within Data BreachesLeaks
81 Recap
Email OSINT – Discovering Info Linked to an Email Address
82 Tracking the Identity Behind an Email Address
83 Leveraging Password Resets to Validate Email Addresses
84 Investigating an Email Address for Red Flags
85 Uncovering Websites & Accounts Linked to an Email Address
86 Discovering More Websites Linked to an Email Address
87 Gmail OSINT – Discovering Phone number, reviews, addresses and more
88 Identify Data Leaks Linked to an Email Address
89 Discovering LinkedIn Profiles Linked to an Email
90 Recap
Phone Number OSINT – Discovering Phone Numbers
91 Tracking a Phone Number Across Online Platforms
92 Uncovering Phone Numbers Linked to Linkedin Accounts
93 Discovering Sensitive Details Linked to a Phone Number
94 Finding Phone Numbers in Leaked Databases
95 Recap
Phone Number OSINT – Finding Details Behind a Number
96 Uncovering Detailed Phone Number Information
97 Revealing Sensitive Information Using Advances Search Techniques
98 Uncovering the Identity Behind a Phone Number
99 Finding the Caller ID in the US
100 Uncovering Accounts Registered with a Phone Number
101 Discovering Leaked Information Linked to a Phone Number
102 Deep Phone Number Scanning & Footprinting
103 Recap
Image OSINT
104 Introduction to Image OSINT
105 Gathering Profile Images for OSINT Investigations
Image OSINT – Reverse Image Search
106 Tracking Images Using Google
107 Discovering Location of an Image
108 Discovering Similar PicturesImages on the Internet
109 Expanding the Search with Specialized Image Engines
Image OSINT – Facial Recognition
110 Track Online PresenceProfiles Using a Photo
Image OSINT – Geo Location Tracking
111 Using AI to Identify an Image Location
112 Discovering Image location Using Search Engines
113 Extracting Location, Device Info and More From Images
Maps OSINT – Using Maps for Geolocation Analysis
114 Introduction to Maps OSINT
115 Uncovering Key Details About Any Location
116 Viewing Satellite Imagery from Different Angles
117 Extracting Key Insights from Eastern Europe Maps
118 Using Apple Maps without an Apple Device
119 Investigating Places with Street-Level Imagery
120 Geo-Locating Images Using OpenStreetMap (OSM)
121 Extract Additional Information Using Google Earth
Website OSINT – Analyzing Website Data for Intelligence
122 Introduction to Website OSINT
123 Discovering Website Owners & Hidden Contact Details
124 Identifying Technologies used in a Website
125 Discovering Subdomains
126 Extracting Information From DNS Records
127 Uncovering Websites Under the Same Ownership
128 Tracking a Website’s Changes and Updates
129 Investigating Website’s Files for Hidden Information
Website OSINT with OSINT TraceLabs VM
130 Discovering Subdomains
131 Investigate a WordPress Websites
132 Automating OSINT Investigations
Reporting
133 Introduction to OSINT Reporting
134 Cleaning and Structuring Notes
135 Reviewing Collected Information & Relationships
136 Creating an OSINT Relationship Map
137 Structuring Open-Source Investigations
Course Exam
Bonus
138 Resources
Resolve the captcha to access the links!