Chapters
Transcript
Episode notes
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17
Introduction
00:00 • 2min
What Is Open Source Intelligence?
02:03 • 3min
Social Engineering Attacks - How Do They Use Open Source Intelligence?
04:36 • 2min
Open Source Intelligence: Accessibility, Visibility, and Predictability
06:28 • 2min
How Do I Approach the Target the First Time?
08:33 • 2min
Open Source Intelligence - What's Your Best Approach?
10:33 • 2min
How to Find a UK Decipher Potential Email Address
12:34 • 4min
Defcon Social Engineering Competition Interview With Chris Kersch
16:14 • 3min
OSINT Objectives - How Do You Find Them?
19:32 • 3min
How Does DEF CON Differentiate From a Real Attack?
22:09 • 3min
Osint
25:30 • 1min
What's the Vendor Check-in Process?
26:55 • 3min
Know Before Is Free Fishing Test
30:01 • 3min
Three Sources of Information in the Job Postings
32:41 • 3min
Using ReconNG to Query a Name Server
36:01 • 2min
What Kind of Pretexts Did You Choose on Game Day?
37:50 • 3min
ATHLEAN Insights - Christina Lecotti and Chris Kirsch
40:36 • 3min


