-
Notifications
You must be signed in to change notification settings - Fork 115
How to OSINT Collection the Data
- Passive Collection
Search for information from open information sources. Utilizing information sources from the internet such as Google, Datasets, Scarapping platforms and other things, you can also utilize AI, Big Data and ML for your analysis needs. This is very useful if you want to create further analysis as well as your own private platform
PRO
- Low risk being detected
- From third party or platform
- Does not require physical contact or interaction with the target
CONS
- Little and too much information
- Requires quite long and detailed validation
- Data not realtime
- Active Collection
Use of various techniques to search for certain insights or information such as scanning, penetration testing, social engineering, human intercation and post-exploit. This can be useful for carrying out further, valid and detailed espionage or collecting your data from the source you have hacked
PRO
- Real time data
- Acurated data
- The data can be guaranteed to be legit and comes from the original source
- Minimum for data validation
CONS
- Requires interaction with the target
- There is a high risk of being detected by related parties or target
- Requires adequate skills
- Aditional Information
Why ML, Big Data and AI need? For example for threat intelligence and data mapping
Structuring data into ontologies and events
Classifying events and entities, helping human analysts prioritize alerts
Forecasting events and entity properties through predictive models
They were able to make more informed decisions faster
The information they accessed became more relevant and actionable
Their existing security solutions were improved