Introduces the Command Line, and explains and demonstrates, live and on-line, requests to locate and gather intelligence.
Introducing command line investigations with Bash and multiple resources that might be exploited
The practitioner will have the capability to deploy command line investigations on Linux and Windows and have awareness of the resources that might be investigated and the capability to locate intelligence.
Module 17 does differentiate but only in the Live Online Training, where investigation opportunities that are available only to Law Enforcement officers are introduced.
OSINT PROCESSING FROM THE COMMAND LINE
THE COMMAND LINE PROMPT
WHY PROCESS FROM THE COMMAND LINE?
COMMAND LINE DEPLOYMENT PREPARATION
PYTHON
VIRTUALIZATION
COMMAND LINE PROCESSING FROM ANY BROWSER
AUDIT & PRESERVATION
GHUNT
GHUNT INSTALLATION
PROCESSING WITH GHUNT
OSINTGRAM
OSINTGRAM INSTALLATION
PREPARING TO PROCESS WITH OSINTGRAM
PROCESSING WITH OSINTGRAM
SOCIAL ANALYZER
SOCIAL ANALYZER INSTALLATION
PROCESSING WITH SOCIAL ANALYZER
COMMAND LINE TO GUI
IKY – I KNOW YOU
IKY INSTALLATION
PREPARING TO PROCESS WITH IKYKEYBASE DEVICES
PROCESSING WITH IKY
SOCIAL SCAN EMAIL
KEYBASE SOCIAL
SOCIAL SCAN USER
HOLEHE
SHERLOCK
CONCLUSION
PACKAGED DEPLOYMENT