8th Layer Insights cover image

Open Source Intelligence (OSINT): The Data We Leak

8th Layer Insights

00:00

How Do I Approach the Target the First Time?

You look for the opportunistic attacks first, I feel. But it also depends on the background of your target and whether they have had security awareness training. So if they don't, you try from opportunistic approaches like phishing emails where you pretend to be somebody else. Or again, if you don't want to use open source intelligence, you just base your approach on psychological principles like the one of curiosity.

Play episode from 08:33
Transcript

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app