Posted on
in Presentations
In 2018 Tessa88 emerged on the dark web as a sole vendor of data stolen from Dropbox, LinkedIn and Myspace among others. This session will walk the audience through employed research practices step-by-step, showcase methods, tools and techniques that allowed us to leverage OSINT data, and facts which we discovered and confirmed when researching actor’s activity in the dark web.
Learning Objectives:
1: Learn how to leverage OSINT in dark web investigations.
2: Learn how to validate the credibility of the criminal actors.
3: Understand the best techniques for profiling criminal actors.
Pre-Requisites:
Basic understanding of the criminal underground, attack methods employed by hackers and entry level experience with the OSINT research.
Learning Objectives:
1: Learn how to leverage OSINT in dark web investigations.
2: Learn how to validate the credibility of the criminal actors.
3: Understand the best techniques for profiling criminal actors.
Pre-Requisites:
Basic understanding of the criminal underground, attack methods employed by hackers and entry level experience with the OSINT research.
Share With Your Community