xpertnoob.blogg.se

Open source business intelligence platform
Open source business intelligence platform





open source business intelligence platform

He can deduce things depending on what we have and it will probably be true.įor example : If the attacker knows that the target loves coffee too much, he knows where the target lives as he shared it before on social media.

#Open source business intelligence platform full

"Īs we have mentioned earlier, it depends in most cases on Publicly shared information, collecting the data can be useless if the one who is performing this operation is not smart enough to gather the leads together and have a better understanding of the full picture. What is Open Source Intelligence?Īccording to the U.S Department of Defense and the U.S Director of National Intelligence, OSINT is defined as “ Intelligence produced from publicly available information that is collected, exploited, and disseminated in a timely manner to an appropriate audience for the purpose of addressing a specific intelligence requirement. We will also showcase an example from a challenge on our platform.

open source business intelligence platform

In this article, we will discuss what open-source intelligence is, what it is used for, the most famous tools and techniques, and how it can help in a cyberattack. We can say you are collecting data from open sources then perform your analysis to figure out new facts about the target and that is known as “ OSINT ” the open-source intelligence which is used by national security, law enforcement, and business intelligence functions. Passive information gathering is gathering public information about a target, the target will not know you are targeting it. Reconnaissance can take many formats but it can be classified into active and passive information gathering, active means you are interacting with the target, if the target is a person then you may talk to him, if the target is a device you are scanning it, etc. The two previous examples show the importance of information and confirm that “Knowledge is Power”. Reconnaissance is considered the first stage in any cybersecurity activity, if you are a red-teamer you will first identify your target, gather information about the target’s history, services, activities, and will try to know the people who work there.Īlso, if you are a blue team player and investigating after a cyber attack you will first try to gather information to know what this cyber attack was targeting and will try to gather the leads to find who was behind it. Open Source Intelligence Techniques Introduction







Open source business intelligence platform