Hello, today I have another review for you and this time from ‘Pentester Academy’.
I have a year access to their site/courses/Labs and am aiming to do one a month over the next year alongside courses from other places too, and for the first one I decided to one on the easier side to ease myself in as well as one that is not too technical for the festive time of year 🙂
The course is ‘OSINT: Fun with Open Source Intelligence’ which was actually a lot more interesting than I thought it would be as I have done some OSINT stuff before.
Who is ‘Pentester Academy’?
“Pentester Academy furthers the careers of cyber security professionals worldwide with in-depth training, attack-defense products and informative content that address the ever-evolving landscape of online threats.
Founded in 2011 by world-renowned security researcher and trainer, Vivek Ramachandran, Pentester Academy has developed into a comprehensive ecosystem of offerings that fully encompass the needs of today’s cyber security professionals and organizations. The Pentester Academy ecosystem now includes: Pentester Academy, Hacker Arsenal, SecurityTube Training, Pentester Academy Press and Pentester Academy TV.
Pentester Academy houses the largest digital library of InfoSec courses in the world! With 200+ hours of comprehensive, highly technical training videos led by world-class trainers and researchers, Pentester Academy is the premier source of online and offline cyber security training and techniques for red and blue teams.
Training topics include:
*Python for Pentesters
*x86/64 Assembly Language and Shellcoding on Linux
*PowerShell for Pentesters
*Wi-Fi Monitoring for Red-Blue Teams
*Embedded IoT Linux for Red-Blue Teams
*Data Science and Machine Learning for InfoSec
*… and many more.”
They actually have a bunch of courses and labs I plan on doing but a lot of them are really on the technical side like the Python and PowerShell ones I plan to take.
So what was involved in the OSINT course I just finished?
*What is intelligence and OSINT
*Grey Areas and Ethics
*Robin Sage – A powerful Social Engineering experiment
*Information is Everywhere
*Lab 1: Using OSINT to build a fake/ puppet profile for intelligence gathering purposes and connecting with individuals of interest
Tools and engines for use in your OSINT searches:
*Thinking and Analysis
*Looking at websites
*Google Custom Searches
*Disposable Search Engines
*FOCA, Cree.py & Maltego
*Lab 2: Building your own Google Custom Search Engine
Scenarios and Cases:
*Counter Intelligence and Defenses
*Fake BBC news site and spreading misinformation
*Attacking the Stock Market
*General Petraeus and Clinton
*Volkswagen emissions scandal
*Mossack Fonseca (Mossfon)
*Intelligence Gathering Recipe
*Lab 3: Gathering intelligence on an organization
What I liked about this course was the wat the teacher Jamal Bandukwala didn’t just explain what OSINT and the tools used was but gave actual real life scenarios that have happened like the cases of Robin Sage, Mossack Fonseca and Hillary Clinton and David Petraeus.
Robin Sage is a fictional American cyber threat analyst. She was created in December 2009 by Robin Casey and Thomas Ryan, two controversial security specialists and white hat hackers from New York City. Her name was taken from a training exercise of United States Army Special Forces.
All in all a really good course to ease myself into Pentester academy and I am looking forward to getting stuck into some more technical orientated stuff in the new year.
Also, if you want 5% off of their bootcamps.
- 5% Discount Code: ALEXG
You’re welcome 🙂
Take it easy,
3 thoughts on “OSINT: Fun with Open Source Intelligence by Pentester Academy (review)”
Curious, who is Robin Casey? I saw a modification to Wikipedia, but I can assure you 200% there was no Robin Casey involved.
This fraud has inspired me to post a long blog about this.
Hey Tom, thanks so much for the comment, would love to read the post you have done can you possibly post the link for me?