Osint

OSINT/Information Gathering Overview

What you are looking for:

  1. Breached data in website tools and databases.
  2. Valid usernames and emails addresses.
  3. Job postings, resumes.

OSINT Intelligence Lifecycle

  1. Planning and Direction
  2. Collection
  3. Processing and Exploitation
  4. Analysis and Production
  5. Dissemination and Integration

See OSINT for more info.

Note: To be continued…