Permalink
Cannot retrieve contributors at this time
Name already in use
A tag already exists with the provided branch name. Many Git commands accept both tag and branch names, so creating this branch may cause unexpected behavior. Are you sure you want to create this branch?
DADA/Aula-Slides/Week2_Naked.md
Go to fileThis commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
69 lines (46 sloc)
2.05 KB
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
--- | |
title: "Open Source Intelligence" | |
subtitle: "A152CEM" | |
--- | |
# Introduction | |
## Session Plan | |
1. Discuss Topics | |
2. Activity | |
3. Break | |
4. GOTO 1 | |
# What data is Online? | |
## Introduction | |
This week we are having a look at OS-Int, Also known as Open | |
Source Intelligence. | |
In this lab we are going to take a closer look at tools and techniques that are | |
used to gather information freely and legally available on the internet | |
## Pre Task | |
- Companies can judge you for the data that you leave freely available online. | |
- Data you leave freely available online could also in extreme cases be used | |
against you. | |
- This task can be done solo or in groups, you often find more by talking to | |
your peers. | |
## Tasks | |
In your groups or on your own, use OSInt techniques to investigate | |
yourself and see what you can find. | |
At the end of each session, be prepared for a short (<5 Mins) | |
presentation on your findings in your groups. . . Avoid oversharing. | |
## Tasks | |
- Be respectful of peoples privacy next to you | |
- Share techniques to try and find out as much as you can that’s online about you | |
- Consider ways you could get sensitive information removed/taken down from sites | |
## Demo Time: | |
- https://medium.com/the-first-digit/osint-how-to-find-information-on-anyone-5029a3c7fd56 | |
- https://mango.pdf.zone/operation-luigi-how-i-hacked-my-friend-without-her-noticing | |
## Task 1: (60 Mins) | |
In your Groups/solo: | |
- Investigate yourselves using open source intelligence and see what kinds of data you can see | |
- See how far you can go, can you only using the data you’ve collected find your house for instance | |
- Think of the ways in which you can stop this information from being leaked | |
- Can it be taken off the sites? | |
## Task 2: (30 Mins) | |
- What data did you find? | |
- Many different social media profiles, Location information, Phone numbers? | |
- What do you think you can do to prevent this data from being open source? | |
- Can you limit the data that is collected about you? | |
- In future, what steps might you take to change your online habits? |