1 00:00:08,210 --> 00:00:15,020 Let us continue practicals on information gathering in this spectacle, we are going to see how to gather 2 00:00:15,020 --> 00:00:22,880 information using all and differentiable intel and reconnaissance are among the first steps taken in 3 00:00:22,880 --> 00:00:28,570 cybersecurity research effort here was and plays a big role in the election. 4 00:00:29,570 --> 00:00:34,960 While there are tons of public resources for getting information about any individual or organization, 5 00:00:35,420 --> 00:00:41,510 they are spread throughout different parts of Internet, sometimes mixed with security tools and data, 6 00:00:41,510 --> 00:00:42,770 intelligence, utilities. 7 00:00:43,490 --> 00:00:46,970 That's why the US and the framework plays a vital role. 8 00:00:47,250 --> 00:00:50,720 Let's go to Google and search AWS and the framework. 9 00:00:59,180 --> 00:01:07,280 Click the very first link, which appears on your screen here is the and the framework and the framework 10 00:01:07,580 --> 00:01:13,490 added its name implies is a cyber security framework and a collection of all and sundry tools to make 11 00:01:13,490 --> 00:01:16,220 your intel and data collection tasks easier. 12 00:01:16,940 --> 00:01:23,900 This tool is mostly used by security researchers and testers for digital footprinting or assigned research, 13 00:01:24,050 --> 00:01:26,190 intelligence gathering and reconnaissance. 14 00:01:27,020 --> 00:01:32,240 It provides a simple Web based interface that allows you to browse through different tools. 15 00:01:33,110 --> 00:01:39,410 It also provides an excellent classification of all existing information gathering resources, therefore 16 00:01:39,770 --> 00:01:45,950 making it a great resource for knowing what information security areas you are neglecting to explore 17 00:01:47,060 --> 00:01:47,630 or assign. 18 00:01:47,630 --> 00:01:51,080 The framework is classified based on different topics and goals. 19 00:01:51,680 --> 00:01:57,470 This can be easily seen while taking a look at the and the three available on your screen. 20 00:01:58,460 --> 00:02:03,930 You can see the oil and the framework is a large collection of tools and resources. 21 00:02:04,610 --> 00:02:06,980 Now we will explore some tools. 22 00:02:14,190 --> 00:02:17,670 You can just Imbert any website and call the group said. 23 00:02:21,720 --> 00:02:26,130 As you can see, this is the same data we got through the mitigant. 24 00:02:34,790 --> 00:02:42,560 Even some of the details like address of the administrative technical contact information are also available 25 00:02:42,560 --> 00:02:43,750 to the who is lookup. 26 00:02:44,510 --> 00:02:51,470 Therefore, you must have got how much information gathering is important for a certified ethical hacker. 27 00:03:02,380 --> 00:03:11,380 Well, the certified hacker website is created only for dummy purposes, for testing purposes, it is 28 00:03:11,380 --> 00:03:13,120 not an official Web site. 29 00:03:35,060 --> 00:03:43,370 Now we will see another important and interesting tool in our Sindy, like the terrorism database. 30 00:03:47,440 --> 00:03:49,770 Click access the global terrorism database. 31 00:03:52,000 --> 00:03:58,600 You can just search the name of any terrorist you want and you can get into information about the terrorist. 32 00:04:09,680 --> 00:04:19,120 Well, you can see the entire data of Osama bin Laden, like when he was captured, the attacks carried 33 00:04:19,120 --> 00:04:20,630 out by him and many more. 34 00:04:22,790 --> 00:04:27,560 Even there are some of the filters available, like the trees in country where they were not. 35 00:04:29,720 --> 00:04:37,220 So let us have a quick recap of what we saw in the spectacle we export the hours and the framework for 36 00:04:37,220 --> 00:04:45,950 subdomains, contact numbers, DNS domains, databases, public records, terrorism tools, trade intelligence 37 00:04:45,950 --> 00:04:46,730 and many more.