How to OSINT Collection the Data
How To Make Collection
Passive Collection
Search for information from open information sources. Utilizing information sources from the internet such as Google, Datasets, Scarapping platforms and other things, you can also utilize AI, Big Data and ML for your analysis needs. This is very useful if you want to create further analysis as well as your own private platform
PRO
Low risk being detected
From third party or platform
Does not require physical contact or interaction with the target
CONS
Little and too much information
Requires quite long and detailed validation
Data not realtime
Active Collection
Use of various techniques to search for certain insights or information such as scanning, penetration testing, social engineering, human intercation and post-exploit. This can be useful for carrying out further, valid and detailed espionage or collecting your data from the source you have hacked
PRO
Real time data
Acurated data
The data can be guaranteed to be legit and comes from the original source
Minimum for data validation
CONS
Requires interaction with the target
There is a high risk of being detected by related parties or target
Requires adequate skills
Aditional Information
Why ML, Big Data and AI need? For example for threat intelligence and data mapping
Structuring data into ontologies and events
Classifying events and entities, helping human analysts prioritize alerts
Forecasting events and entity properties through predictive models
They were able to make more informed decisions faster
The information they accessed became more relevant and actionable
Their existing security solutions were improved
Last updated