Skip to content
  • 2023 Program
    • Registration
    • Call For Papers
    • Keynote Speakers
    • Briefings
    • Workshops
    • Contests
  • Events
    • EVENTS
    • Social Speak Easy
    • VIP & Speaker Social (Exclusive)
    • Contests
    • Villages
    • Workshop Registration
    • Code of Conduct
  • Sponsors
    • Business Hall
    • Become a Sponsor
    • Code of Conduct
    • 2022 Sponsors
    • 2021 Sponsors
  • About
    • 2021 Speakers
    • 2022 Speakers
    • Volunteer
    • CPE Credit
    • Mission
    • Covid Status
    • Privacy Policy
  • Virtual Summit 2023
    • Virtual Briefings
    • Virtual Workshop
    • Hands on vLabs
    • Virtual Demo Labs
    • Virtual Keynotes
    • Career Fair
Menu
  • 2023 Program
    • Registration
    • Call For Papers
    • Keynote Speakers
    • Briefings
    • Workshops
    • Contests
  • Events
    • EVENTS
    • Social Speak Easy
    • VIP & Speaker Social (Exclusive)
    • Contests
    • Villages
    • Workshop Registration
    • Code of Conduct
  • Sponsors
    • Business Hall
    • Become a Sponsor
    • Code of Conduct
    • 2022 Sponsors
    • 2021 Sponsors
  • About
    • 2021 Speakers
    • 2022 Speakers
    • Volunteer
    • CPE Credit
    • Mission
    • Covid Status
    • Privacy Policy
  • Virtual Summit 2023
    • Virtual Briefings
    • Virtual Workshop
    • Hands on vLabs
    • Virtual Demo Labs
    • Virtual Keynotes
    • Career Fair

OSINT Journey CTF

OSINT

OSINT Journey CTF

In a cybersecurity context, OSINT can be used to recon a target before performing a penetration test or to generate a report of the information a company is leaking through public sources. Cyber criminals use OSINT to collect information on a target before attacking; also, OSINT can be used to help guess a user’s password. Many people use passwords that relate to themselves. For example, a common password creation method is to use the name of your favorite pet followed by the year you were born. This is a very poor password creation technique because this information is easy for a malicious user to obtain from openly available sources, such as your social media accounts. In addition to possible password information, OSINT can reveal information about a company’s internal computer network. For example, a company’s promotional website may include pictures of employees working.

Privacy  |  Disclaimer

© 2022 TexasCyber, All Rights Reserved.