All language subtitles for 6. OSINT by name

af Afrikaans
ak Akan
sq Albanian
am Amharic
ar Arabic Download
hy Armenian
az Azerbaijani
eu Basque
be Belarusian
bem Bemba
bn Bengali
bh Bihari
bs Bosnian
br Breton
bg Bulgarian
km Cambodian
ca Catalan
ceb Cebuano
chr Cherokee
ny Chichewa
zh-CN Chinese (Simplified)
zh-TW Chinese (Traditional)
co Corsican
hr Croatian
cs Czech
da Danish
nl Dutch
en English
eo Esperanto
et Estonian
ee Ewe
fo Faroese
tl Filipino
fi Finnish
fr French
fy Frisian
gaa Ga
gl Galician
ka Georgian
de German
el Greek
gn Guarani
gu Gujarati
ht Haitian Creole
ha Hausa
haw Hawaiian
iw Hebrew
hi Hindi
hmn Hmong
hu Hungarian
is Icelandic
ig Igbo
id Indonesian
ia Interlingua
ga Irish
it Italian
ja Japanese
jw Javanese
kn Kannada
kk Kazakh
rw Kinyarwanda
rn Kirundi
kg Kongo
ko Korean
kri Krio (Sierra Leone)
ku Kurdish
ckb Kurdish (Soranî)
ky Kyrgyz
lo Laothian
la Latin
lv Latvian
ln Lingala
lt Lithuanian
loz Lozi
lg Luganda
ach Luo
lb Luxembourgish
mk Macedonian
mg Malagasy
ms Malay
ml Malayalam
mt Maltese
mi Maori
mr Marathi
mfe Mauritian Creole
mo Moldavian
mn Mongolian
my Myanmar (Burmese)
sr-ME Montenegrin
ne Nepali
pcm Nigerian Pidgin
nso Northern Sotho
no Norwegian
nn Norwegian (Nynorsk)
oc Occitan
or Oriya
om Oromo
ps Pashto
fa Persian
pl Polish
pt-BR Portuguese (Brazil)
pt Portuguese (Portugal)
pa Punjabi
qu Quechua
ro Romanian
rm Romansh
nyn Runyakitara
ru Russian
sm Samoan
gd Scots Gaelic
sr Serbian
sh Serbo-Croatian
st Sesotho
tn Setswana
crs Seychellois Creole
sn Shona
sd Sindhi
si Sinhalese
sk Slovak
sl Slovenian
so Somali
es Spanish
es-419 Spanish (Latin American)
su Sundanese
sw Swahili
sv Swedish
tg Tajik
ta Tamil
tt Tatar
te Telugu
th Thai
ti Tigrinya
to Tonga
lua Tshiluba
tum Tumbuka
tr Turkish
tk Turkmen
tw Twi
ug Uighur
uk Ukrainian
ur Urdu
uz Uzbek
vi Vietnamese
cy Welsh
wo Wolof
xh Xhosa
yi Yiddish
yo Yoruba
zu Zulu
Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated: 1 00:00:03,060 --> 00:00:08,580 In this video, I want to give you kind of a walkthrough of how to do ocean search. 2 00:00:08,700 --> 00:00:11,280 If you have a first name, real name or alias. 3 00:00:11,940 --> 00:00:18,420 Now a lot of times if you do a ohlsson search or listen for the investigations they run, typically 4 00:00:18,420 --> 00:00:22,170 it'll either have an email address, a username or a handle to go by. 5 00:00:23,010 --> 00:00:27,030 And I think most of the time, that's generally where your starting point is going to be. 6 00:00:28,080 --> 00:00:33,570 So generally, the first step I will all take is if I have a real name or alias, I begin searching 7 00:00:33,570 --> 00:00:39,990 doing people searches so people are people spoko and whatnot. 8 00:00:40,290 --> 00:00:41,520 Start running through the name. 9 00:00:42,420 --> 00:00:43,590 Enter the whatever. 10 00:00:43,590 --> 00:00:47,850 If it's real name or alias, run it through those searches and start seeing when it pulls up. 11 00:00:48,840 --> 00:00:57,540 So what I'm looking for is things like verifying their name or handle, finding the real name or potential 12 00:00:57,540 --> 00:01:00,660 aliases places they lived. 13 00:01:01,200 --> 00:01:07,500 Phone numbers, addresses, family members, friends, jobs listed pretty much anything that's going 14 00:01:07,500 --> 00:01:13,680 to help me move forward and clicked up a bigger picture of whoever I'm investigating. 15 00:01:14,820 --> 00:01:18,030 So once I have that initial information, I'm going to do a deeper search. 16 00:01:18,780 --> 00:01:23,180 So people have started coming up on on the that particular count. 17 00:01:23,310 --> 00:01:26,610 Say, I have a real name search point family family members. 18 00:01:27,000 --> 00:01:30,960 I'm going to do the same search on their family members and friends that are listed. 19 00:01:31,380 --> 00:01:42,360 And the reason I'm doing that is if that person posts very little or maybe they they redacted some post 20 00:01:42,360 --> 00:01:43,950 or they're hiding certain things. 21 00:01:45,540 --> 00:01:52,320 Friends and family might not have the same security postures that the person investigating, so I'll 22 00:01:52,320 --> 00:01:55,500 take a look at that person's friends and family that I know about. 23 00:01:56,040 --> 00:01:59,520 Start searching their social media pages and whatnot and start building it. 24 00:01:59,880 --> 00:02:00,450 Much bigger. 25 00:02:00,450 --> 00:02:03,120 Picture that person start clicking more and more information. 26 00:02:03,660 --> 00:02:09,540 So that's why you want to take a look at friends and family that you know that your target is related 27 00:02:09,540 --> 00:02:09,870 to. 28 00:02:11,580 --> 00:02:14,880 I'm going to check out their LinkedIn page, so I'm going to go to LinkedIn, I'm going to put their 29 00:02:14,880 --> 00:02:21,660 name in there, and what I'm doing there is if they created a LinkedIn page, I'm going to take a look 30 00:02:21,660 --> 00:02:25,730 at who they work for, how long they worked there, what they are listening to. 31 00:02:25,730 --> 00:02:35,010 The LinkedIn page jobs experiences, biographical data, phone numbers, addresses, et cetera. 32 00:02:35,820 --> 00:02:42,870 Again, just collecting more information about this individual that I'm doing Olson search on, I'll 33 00:02:42,870 --> 00:02:44,640 check their social media page. 34 00:02:44,850 --> 00:02:46,950 So I'm going to do a deep dive in everything. 35 00:02:46,950 --> 00:02:53,880 So their Twitter, their Facebook, their Instagram whatnot, any social media account that they have 36 00:02:53,880 --> 00:02:56,580 that I know about, I'm going to start doing searches. 37 00:02:57,570 --> 00:03:04,500 So I'm going to take I'm going to copy down their username, their email address, their friends, people 38 00:03:04,500 --> 00:03:10,350 they're following and think that they like posts that they made photos, videos, everything we collect, 39 00:03:10,350 --> 00:03:12,270 everything that they've ever posted. 40 00:03:13,110 --> 00:03:15,260 And again, people that they're following. 41 00:03:15,270 --> 00:03:19,440 I'll take a look at who they're following and see how it links back to them. 42 00:03:19,620 --> 00:03:24,420 I'm going to take a look at their friends, and again, I'm going to go through their friends post because 43 00:03:24,420 --> 00:03:29,640 her friends who get me may not have the same security posture as that person, and they might post something 44 00:03:29,640 --> 00:03:32,430 that the other person didn't want out there. 45 00:03:34,260 --> 00:03:41,100 I'm going to do a deeper social dive again or take a look at their friends, their feeds, their social 46 00:03:41,100 --> 00:03:43,530 media pictures, videos, everything. 47 00:03:43,920 --> 00:03:45,450 I'm going to go to detached. 48 00:03:46,290 --> 00:03:52,740 So in detention, all the information I have on them, their real name, their aliases or email addresses, 49 00:03:52,740 --> 00:03:55,920 their addresses, their telephone numbers and whatnot. 50 00:03:56,370 --> 00:04:01,380 So what I'm looking and detached is I want to see if they're part of data breaches. 51 00:04:03,570 --> 00:04:08,640 If they're part of a data breach, I want to know what data breaches are part of, and the reason for 52 00:04:08,640 --> 00:04:11,430 this is if I know what part of it. 53 00:04:11,580 --> 00:04:15,730 More data breaches are part of it might help me find other accounts they have. 54 00:04:15,750 --> 00:04:17,390 Maybe they're part of a dopey breach. 55 00:04:17,400 --> 00:04:24,150 Maybe the report of a Dropbox breach, if they are now, I know they have most likely have those accounts 56 00:04:24,150 --> 00:04:26,250 when take a look at what their password is. 57 00:04:27,120 --> 00:04:28,350 Once they have their password. 58 00:04:30,590 --> 00:04:33,080 We're going to go to the next step, we're going to go through. 59 00:04:33,140 --> 00:04:35,360 We're going to rehash that password. 60 00:04:35,390 --> 00:04:40,070 We're going to take the hash password and the hash password, feed it back in the D Hashed again and 61 00:04:40,070 --> 00:04:40,310 again. 62 00:04:40,310 --> 00:04:42,290 See where that comes up again. 63 00:04:43,040 --> 00:04:49,220 And what that does is it gives me again a much, much bigger picture of, you know, what other email 64 00:04:49,220 --> 00:04:50,240 accounts we may have. 65 00:04:51,530 --> 00:04:54,350 People have a tendency of reusing passwords. 66 00:04:54,350 --> 00:05:04,070 So if they had a very unique password, enter back into the hashed, it may split up four or five different 67 00:05:04,070 --> 00:05:09,770 accounts I never knew about, so I could take those accounts again, feedback and hash and see where 68 00:05:09,770 --> 00:05:10,580 those take me. 69 00:05:11,150 --> 00:05:19,820 And if it takes me to something like Ashley Madison or a back page or any number of other sites like 70 00:05:19,820 --> 00:05:24,620 I saw taking a look at those sites for that account and again, sort of building a bigger picture. 71 00:05:25,580 --> 00:05:28,730 Finally, I'm going to compile my report after I collect everything. 72 00:05:29,540 --> 00:05:33,950 And once I have my findings, I'm going to try to clear out stuff that's all relevant. 73 00:05:34,460 --> 00:05:35,570 I'm going to go through. 74 00:05:35,570 --> 00:05:40,400 I'm going to verify the data I have is accurate or at least as accurate as I could. 75 00:05:40,940 --> 00:05:47,390 I can be assured within whatever time limit I have in, I'm going to start compiling two different reports. 76 00:05:48,140 --> 00:05:53,060 I'm going to get compiled exactly report, which is going to be a very non-technical report fiscal to 77 00:05:53,060 --> 00:05:54,290 get straight to the point. 78 00:05:54,320 --> 00:06:00,110 And that's going to be for people that are non-technical, general, your CEO, CFO and whatnot. 79 00:06:01,130 --> 00:06:04,220 And then I'm going to have the detailed report. 80 00:06:04,220 --> 00:06:11,990 The detailed report is going to be steps I've taken software, things like I. 81 00:06:12,620 --> 00:06:15,890 I used Bousquet order in a VM. 82 00:06:15,890 --> 00:06:17,690 I have the VM on a USB drive. 83 00:06:18,530 --> 00:06:23,140 These are the people that ask me to start are certain specifications. 84 00:06:23,180 --> 00:06:24,530 My start date, my end date. 85 00:06:24,530 --> 00:06:25,670 These are my contacts. 86 00:06:26,720 --> 00:06:29,330 These are the exact steps I took. 87 00:06:29,960 --> 00:06:32,540 Here's a bunch of screenshots. 88 00:06:32,540 --> 00:06:34,070 Here's media they found. 89 00:06:34,070 --> 00:06:37,700 Here's all the email accounts I found, et cetera, et cetera. 90 00:06:37,700 --> 00:06:41,330 It's going to be very detailed step almost step by step. 91 00:06:42,980 --> 00:06:51,470 That way, if someone comes back and they want to see what process I took, if they're going to try 92 00:06:51,470 --> 00:06:58,880 to verify if it goes to court in there and someone might try to discredit me, I'm going to try to make 93 00:06:58,880 --> 00:07:00,200 that as detailed as possible. 94 00:07:00,200 --> 00:07:07,850 That way, I can kind of cover myself and to prove that the course I took was a valid path to take. 95 00:07:08,360 --> 00:07:16,940 So again, this is a general outline of how I would search someone by their name or alias. 96 00:07:17,600 --> 00:07:23,420 And hopefully this works as kind of a template for you, or at least give you idea how to create your 97 00:07:23,420 --> 00:07:29,030 own kind of template for when you do use an investigation. 98 00:07:29,780 --> 00:07:30,560 Thank you for watching. 10260

Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.