SEC497: Practical Open-Source Intelligence (OSINT)™

GIAC Open Source Intelligence (GOSI)
GIAC Open Source Intelligence (GOSI)
  • In Person (6 days)
  • Online
36 CPEs
SEC497 is based on two decades of experience with open-source intelligence (OSINT) research and investigations supporting law enforcement, intelligence operations, and a variety of private sector businesses ranging from small start-ups to Fortune 100 companies. The goal is to provide practical, real-world tools and techniques to help individuals perform OSINT research safely and effectively. One of the most dynamic aspects of working with professionals from different industries worldwide is getting to see their problems and working with them to help solve those problems. SEC497 draws on lessons learned over the years in OSINT to help others. The course not only covers critical OSINT tools and techniques, it also provides real-world examples of how they have been used to solve a problem or further an investigation. Hands-on labs based on actual scenarios provide students with the opportunity to practice the skills they learn and understand how those skills can help in their research. 29 Hands-on Labs + Capstone CTF

What You Will Learn

The Gateway to OSINT Mastery

SEC497 is a comprehensive training course on Open-Source Intelligence (OSINT) written by an industry professional with over two decades of experience. The course is designed to teach you the most important skills, tools, and methods needed to launch or further refine your investigation skills. SEC497 will provide actionable information to students throughout the OSINT world, including intelligence analysts, law enforcement officials, cyber threat intelligence and cyber defenders, pen testers, investigators, and anyone else who wants to improve their OSINT skills. There is something for everyone, from newcomers to experienced practitioners.

SEC497 focuses on practical techniques that are useful day in and day out. This course is constructed to be accessible for those new to OSINT while providing experienced practitioners with tried-and-true tools that they can add to their arsenal to solve real-world problems. The course has a strong focus on understanding how systems work to facilitate informed decisions, and includes hands-on exercises based on actual scenarios from the government and private sectors. We will discuss cutting-edge research and outlier techniques and not only talk about what is possible, we will practice doing it! Dive into the course syllabus below for a detailed breakdown of the topics covered.

"[SEC497 is] exactly what I wanted-a hands on, real-world deep dive into OSINT challenges, techniques, strategies and actual tools to use." - Mattie Swain, 10a Labs

What Is Open-Source Intelligence?

Open-Source Intelligence (OSINT) is the practice of collecting and analyzing publicly available data from various sources such as websites, social media, and public records to gather actionable information. OSINT is widely used in cybersecurity, law enforcement, and competitive intelligence to enhance decision-making and threat assessment. By leveraging freely accessible information, organizations can gain critical insights without the need for intrusive measures.

Business Takeaways

  • This course will help your organization:
  • Enhance competitive intelligence through OSINT techniques
  • Improve risk management by identifying vulnerabilities
  • Strengthen incident response with rapid information gathering
  • Identify and mitigate potential threats from publicly available data
  • Streamline data collection and analysis processes for operational efficiency

Skills Learned

  • Perform a variety of OSINT investigations while practicing good OPSEC
  • Create sock puppet accounts
  • Locate information on the internet, including some hard-to-find and deleted information
  • Locate individuals online and examine their online presence
  • Understand and effectively search the dark web
  • Create an accurate report of the online infrastructure for cyber defense, merger and acquisition analysis, pen testing, and other critical areas for an organization.
  • Use methods that can often reveal who owns a website as well as the other websites that they own or operate
  • Understand the different types of breach data available and how they can be used for offensive and defensive purposes
  • Effectively gather and utilize social media data
  • Understand and use facial recognition and facial comparison engines
  • Quickly and easily triage large datasets to learn what they contain
  • Identify malicious documents and documents designed to give away your location

Hands-On Open-Source Intelligence Training

29 Unique, Immersive Hands-On Labs

SEC497: Advanced Incident Response Techniques offers a unique and immersive learning experience, combining theoretical knowledge with extensive hands-on practice. The course covers essential topics for modern incident response, including managing attribution, dealing with potential malware, and utilizing canary tokens. Students will gain proficiency with tools like Hunchly, Obsidian, Instant Data Scraper, and various search techniques. Labs delve into metadata analysis, reverse image searches, facial recognition, translation services, and researching usernames. Keybase, email analysis, Twitter bot analysis, IP address research, WHOIS, DNS investigations, Amass, Eyewitness, Censys, and Shodan are also integral parts of the curriculum. Additional labs include cloud storage assessments, business intelligence, wireless network security, bulk data triage, and using Tor and PGP for secure communications. The course addresses breach data analysis, preparing students to handle real-world cybersecurity challenges.

The capstone for SEC497 is a multi-hour capture the flag event, where students work in small groups to create a threat assessment for a fictional client. This culminating exercise requires applying the skills learned throughout the course across various real-world sites. The final assessment is presented to the instructor, who acts as the client, and provides feedback to each group, ensuring that students are ready to implement their advanced incident response techniques in real-world scenarios.

  • Section 1: Managing Your Attribution; Dealing with Potential Malware; Canary Tokens; Hunchly; Obisidan; Linux Command Line Practice (Optional)
  • Section 2: Search; Instant Data Scraper; Metadata; Reverse Image Search; Facial Recognition; Translation
  • Section 3: Researching Usernames; Keybase; Email; Twitter; Twitter Bot Analysis
  • Section 4: IP Address Research; WHOIS; DNS; Amass and Eyewitness; Censys and Shodan; Buckets of Fun
  • Section 5: Business; Wireless; Bulk Data Triage; Tor and PGP; Breach Data
  • Section 6: Capture the Flag Capstone

"The capstone project was about as applicable as you can get. Having the chance to perform OSINT on a given university was awesome. It really brought all the previous days' learnings together." - Cameron S, Ford Motor Company

"The hands-on labs helped refine my toolbox." - Jason K, Oracle

"Being able to run things hands-on right after learning about it makes the concepts stick better." - Elizabeth Beattie, Domino's Pizza

Syllabus Summary

  • Section 1: OSINT and OPSEC Fundamentals: Safe, Effective Information Gathering and Analysis
  • Section 2: Essential OSINT Skills: Web Fundamentals, Search Techniques, and Image Analysis
  • Section 3: Investigating People: Privacy, Usernames, Emails, and Social Media Analysis
  • Section 4: Investigating Websites and Infrastructure: Ips, DNS, WHOIS, and Cloud Analysis
  • Section 5: Automation, the Dark Web, and Large Data Sets: OSINT Techniques and Tools
  • Section 6: Capstone: Capture the Flag - Collaborative Threat Assessment Challenge

Additional Free Resources

What You Will Receive

  • A Linux Virtual Machine (VM) complete with electronic workbook

What Comes Next?

Depending on your current role or future plans, one of these courses is a great next step in your OSINT journey:

Syllabus (36 CPEs)

Download PDF
  • Overview

    Before diving into tools and techniques to find, gather, and process information, the course starts with a discussion of how to undertake these activities as safely and effectively as possible. This section begins with an overview of the OSINT process and tips on avoiding analytical pitfalls. We then move into Operational Security or OPSEC. This isn't just a list of browser plugins and VPN providers: we'll look at what truly matters when managing attribution. Most of us don't have unlimited budgets and can't achieve "perfect OPSEC" - the good news is that most of us don't have to! We'll discuss the major risks and ways to mitigate them within a reasonable budget.

    A big part of OSINT is going to new sites and downloading files and information. We'll discuss free online resources that can be used to determine if a site is a known security risk before you visit it and to analyze files to determine if they have malicious content. We'll discuss how canary tokens work and create our own with a hands-on lab. Canary tokens are files that can give away our actual IP address and other information about our systems without our knowledge.

    Creating fictitious accounts (aka sock puppets) has gotten tougher over the past few years, with many sites requiring criteria like a real phone number, facial image, etc. We'll discuss the issues and cover current methods for creating these accounts.

    The course section wraps up by examining two tools that can improve your organization and efficiency. Hunchly is a fantastic tool for cataloging online research, and Obsidian is an effective open-source tool for note-taking and various other uses. We'll also cover report writing.

    Many OSINT students have improving Linux skills on their to-do list, so at the end of the section there is an optional lab for Linux command line practice. This gives students who would like to work on these skills the opportunity to do so in a controlled environment.

    Exercises
    • Managing Your Attribution
    • Dealing with Potential Malware
    • Canary Tokens
    • Hunchly
    • Obsidian
    • [Optional] Linux Command Line Practice
    Topics
    • The OSINT Process
    • Avoiding Analytical Pitfalls
    • OPSEC
    • Dealing with Potential Malware
    • Canary Tokens
    • Creating Accounts
    • Hunchly
    • Effective Note Taking
    • Report Writing
    • Introduction to Linux
  • Overview

    Section Two presents a range of fundamental skills that all OSINT practitioners should have, regardless of the industry they work in. We'll start with a brief overview of curated lists of OSINT resources and quickly move into understanding the fundamentals of how the web works and utilizing search engines effectively. We'll cover methods to find other sites owned and operated by the same individuals, how to see content that the site owners may not want you to see, and, as always, the OPSEC implications and how to do undertake these tasks safely. We'll also cover the why and how of setting up persistent monitoring alerts.

    Multiple methods will be presented to archive content from websites, view historical content from websites, and get other sites to visit websites on your behalf. We'll talk about collecting and preserving Internet data and how to convert raw data into useable formats for processing and analysis. Well discuss how to gather useful intelligence from metadata, even if the data initially appear insignificant or do not appear at all, and look at useful sites for mapping, imagery, and analysis.

    The course section will then turn to image analysis, with a discussion of methodology, tools that can help us, and some real-world examples. From there, we'll move into facial recognition and real-world examples and resources we can use to find people online. We'll conclude with a discussion about translation resources.

    At the end of the section there will be an optional capstone. Participants will start off with raw chat logs from a Russian ransomware group and go through the process of converting the logs into a usable format for analysis.

    Exercises
    • Search
    • Instant Data Scraper
    • Metadata
    • Reverse Image Search
    • Facial Recognition
    • Translation
    • [Optional] Day 2 Capstone
    Topics
    • OSINT Link and Bookmark Collections
    • Web Fundamentals and Search Engines
    • Web Archives and Proxy Sites
    • Collecting and Processing Web Data
    • Metadata
    • Mapping
    • Image Analysis and Reverse Image Searches
    • Facial Recognition
    • Translations
  • Overview

    Section Three of the course focuses on investigating individuals or groups. We'll start by discussing privacy and then get into techniques to research usernames and email addresses across popular sites to discover an individuals accounts. The section then covers how to determine if email addresses are potentially tied to fraud and the places where the individual(s) connected to the email addresses may have been.

    Many OSINT investigations start with a selector such as a phone number or address and require that the researcher tie that selector to an individual or group. We'll cover numerous resources and techniques you can use to do this, including some that can help identify the owner of a prepaid phone number.

    The remainder of the section will focus on social media sites, including advanced Facebook searches and ways to see deleted Twitter data and analyze Twitter bots. We'll also cover methods to view content on social media sites when you don't have an account on that site; searching and analyzing alternative social media sites; geolocation of social media data; and trends, sentiment, and reputation.

    Exercises
    • Researching Usernames
    • Keybase
    • Email
    • Twitter
    • Twitter Bot Analysis
    Topics
    • Privacy
    • Usernames
    • Email Addresses
    • Addresses and Phone Numbers
    • Introduction to Social Media
    • Facebook
    • Twitter
    • Other Social Media Sites
    • Geolocation
    • Trends, Sentiment, and Bots
  • Overview

    Section Four covers investigating websites, IP addresses, and other infrastructure, including the cloud. For students who don't consider themselves tech savvy, we'll take the time to explain what the elements are and how they work, and well provide numerous real-world examples of how these elements have helped in investigations. This course section is critical even for analysts who don't focus on technical topics because understanding how these technical elements work reduces the likelihood of falling down rabbit holes during their research.

    For students who focus more on technology topics, such as those who work in Cyber Threat Intelligence, we'll cover a variety of tools and resources to learn as much as we can about such topics as:

    • Where in the world an IP address is located, and whether it is a VPN/proxy/Tor node
    • Why IPv6 is different and why that might be good for your investigation
    • Historical WHOIS data
    • Understanding DNS records
    • Why certificate transparency is excellent for defenders&and attackers
    • What we can learn from email headers
    • Subdomains for enumeration and, potentially, de-anonymization
    • Technology-focused search engines like Shodan and Censys
    • Cyber Threat Intelligence
    • Finding sensitive data in the cloud

    This course section is a mix of understanding how things work, studying real-world examples and case studies, looking at some cutting-edge research, and using tools in creative ways to achieve things most people did not know were possible.

    Exercises
    • IP Address Research
    • WHOIS
    • DNS
    • Amass and Eyewitness
    • Censys and Shodan
    • Buckets of Fun
    Topics
    • IP Addresses
    • Common Ports
    • WHOIS
    • DNS
    • Certificate Transparency
    • Email Headers
    • Subdomains
    • Technology-Focused Search Engines
    • Cyber Threat Intelligence
    • Cloud
  • Overview

    Section Five is a fun mix of topics ranging from researching businesses and transitions to covering wireless for OSINT, including using Wi-Fi names to enrich digital forensics data and research locations. We'll also explore different types of breach data and how it can be used for various OSINT and cyber defender purposes.

    If you work in OSINT long enough, a giant pile of data will eventually be placed in front of you, and someone will ask you whats in it. Depending on your job, this may already be a regular occurrence. This section will cover how to triage and search large datasets effectively and quickly using free or cheap resources.

    We'll also take a deep dive into the dark web, covering how it works, how we can find things, and what we can expect to find. We'll examine a case study of breach data hitting the dark web and tricks we can use to speed up dark web downloads. We'll also have a short section on cryptocurrency that mainly focuses on a resource that allows us to track cryptocurrency transactions with a focus on web 3.0 and NFTs.

    As the course section winds down, we'll talk about different automation options that require no programming. The final portion of the section is called "path forward" and covers a variety of resources that can help you continue your OSINT learning journey.

    Exercises
    • Business
    • Wireless
    • Bulk Data Triage
    • Tor and PGP
    • Breach Data

    Topics
    • Researching Businesses
    • Wireless
    • Breach Data
    • Dealing with Large Datasets
    • Dark Web
    • Cryptocurrency
    • Automation
    • Path Forward
  • Overview

    The capstone for the SEC497 course is a multi-hour capture the flag event which allows students to work together in small groups to create a threat assessment for a fictional client. Preparing this assessment will require that students use the skills learned throughout the course on a variety of real-world sites. The assessment will be delivered to the client (the instructor), who will provide feedback to each group.

GIAC Open Source Intelligence

The GIAC Open Source Intelligence (GOSI) certification confirms that practitioners have a strong foundation in OSINT methodologies and frameworks and are well-versed in data collection, reporting, and analyzing targets.

  • Open Source Intelligence Methodologies
  • OSINT Data Collection, Analysis, and Reporting
  • Harvesting Data from the Dark Web
  • Operational Security Fundamentals and Considerations

More Certification Details

Prerequisites

Basic computer knowledge is required for this course.

Laptop Requirements

Important! Bring your own system configured according to these instructions.

A properly configured system is required to fully participate in this course. If you do not carefully read and follow these instructions, you will not be able to fully participate in hands-on exercises in your course. Therefore, please arrive with a system meeting all of the specified requirements.

Back up your system before class. Better yet, use a system without any sensitive/critical data. SANS is not responsible for your system or data.

MANDATORY SEC497 SYSTEM HARDWARE REQUIREMENTS
  • CPU: 64-bit Intel i5/i7 (8th generation or newer), or AMD equivalent. A x64 bit, 2.0+ GHz or newer processor is mandatory for this class.
  • CRITICAL: Apple systems using the M1/M2 processor line cannot perform the necessary virtualization functionality and therefore cannot in any way be used for this course.
  • BIOS settings must be set to enable virtualization technology, such as "Intel-VTx" or "AMD-V" extensions. Be absolutely certain you can access your BIOS if it is password protected, in case changes are necessary.
  • 8GB of RAM or more is required.
  • 30GB of free storage space or more is required.
  • At least one available USB 3.0 Type-A port. A Type-C to Type-A adapter may be necessary for newer laptops. Some endpoint protection software prevents the use of USB devices, so test your system with a USB drive before class.
  • Wireless networking (802.11 standard) is required. There is no wired Internet access in the classroom.
MANDATORY SEC497 HOST CONFIGURATION AND SOFTWARE REQUIREMENTS
  • Your host operating system must be the latest version of Windows 10, Windows 11, or macOS 10.15.x or newer.
  • Fully update your host operating system prior to the class to ensure you have the right drivers and patches installed.
  • Linux hosts are not supported in the classroom due to their numerous variations. If you choose to use Linux as your host, you are solely responsible for configuring it to work with the course materials and/or VMs.
  • Local Administrator Access is required. (Yes, this is absolutely required. Don't let your IT team tell you otherwise.) If your company will not permit this access for the duration of the course, then you should make arrangements to bring a different laptop.
  • You should ensure that antivirus or endpoint protection software is disabled, fully removed, or that you have the administrative privileges to do so. Many of our courses require full administrative access to the operating system and these products can prevent you from accomplishing the labs.
  • Any filtering of egress traffic may prevent accomplishing the labs in your course. Firewalls should be disabled or you must have the administrative privileges to disable it.
  • Download and install VMware Workstation Pro 16.2.X+ or VMware Player 16.2.X+ (for Windows 10 hosts), VMware Workstation Pro 17.0.0+ or VMware Player 17.0.0+ (for Windows 11 hosts), or VMWare Fusion Pro 12.2+ or VMware Fusion Player 11.5+ (for macOS hosts) prior to class beginning. If you do not own a licensed copy of VMware Workstation Pro or VMware Fusion Pro, you can download a free 30-day trial copy from VMware. VMware will send you a time-limited serial number if you register for the trial at their website. Also note that VMware Workstation Player offers fewer features than VMware Workstation Pro. For those with Windows host systems, Workstation Pro is recommended for a more seamless student experience.
  • On Windows hosts, VMware products might not coexist with the Hyper-V hypervisor. For the best experience, ensure VMware can boot a virtual machine. This may require disabling Hyper-V. Instructions for disabling Hyper-V, Device Guard, and Credential Guard are contained in the setup documentation that accompanies your course materials.
  • Download and install 7-Zip (for Windows Hosts) or Keka (for macOS hosts). These tools are also included in your downloaded course materials.

Your course media is delivered via download. The media files for class can be large. Many are in the 40-50GB range, with some over 100GB. You need to allow plenty of time for the download to complete. Internet connections and speed vary greatly and are dependent on many different factors. Therefore, it is not possible to give an estimate of the length of time it will take to download your materials. Please start your course media downloads as soon as you get the link. You will need your course media immediately on the first day of class. Do not wait until the night before class to start downloading these files.

Your course materials include a "Setup Instructions" document that details important steps you must take before you travel to a live class event or start an online class. It may take 30 minutes or more to complete these instructions.

Your class uses an electronic workbook for its lab instructions. In this new environment, a second monitor and/or a tablet device can be useful for keeping class materials visible while you are working on your course's labs.

If you have additional questions about the laptop specifications, please contact support.

Author Statement

"When I started the first open-source intelligence (OSINT) unit for my organization over a decade ago, I was told we had no budget for tools, equipment, or training. I used to joke that one nice thing about not having a budget was that it made many of my decisions very easy. If there was something I needed, I either built it myself or did without.

Coming from that background forces you to understand how things work and what truly matters. In addition to performing countless OSINT investigations, I've traveled across the world for over a decade teaching operational security (OPSEC) and OSINT to various government agencies and consulted with numerous private companies, ranging from small start-ups to Fortune 100 enterprises. I have helped hunt down international fugitives, identified online infrastructure for a merger and acquisitions due diligence report, and handled numerous tasks in between. This course allows me me share my experience with what works, what does not work, and how we can achieve our goals with minimal effort and cost."

- Matt Edmondson

Reviews

This class is amazing so far! It's exactly what I want - a hands-on, real-world deep dive into OSINT challenges, techniques, strategies, and actual tools to use.
Mattie Swain
Very Informative course and provided pointers to numerous breach data sites which could aid numerous investigations.
Kanika Mittal
I appreciate the realism in all of these labs. Students can easily turn around and do real world OSINT investigations with many of these labs.
Erich Nieskes
The module on dealing with large data sets was very helpful. Getting a deep understanding on the challenges large data sets pose and how to work around them is very helpful and practical.
Jamal Gumbs
Very relevant information is provided that can be deployed immediately even by novice users. Excellent!
Shay Christensen
Business intelligence is a topic near and dear to me and Matt did a fantastic job covering not just the how-tos of collecting and analyzing company data, but also providing the real world context.
Sammy Shin

    Register for SEC497

    Learn about Group Pricing

    Prices below exclude applicable taxes and shipping costs. If applicable, these will be shown on the last page of checkout.

    Loading...