Recon OSINT
03-29, 17:40–18:40 (Europe/Ljubljana), P1

Lecture: Introduction to OSINT and Passive Reconnaissance Techniques


Lecture Content:
✅ What is OSINT and OPSEC? – Introduction to OSINT methodology and the importance of Operational Security (OPSEC) for Protecting the Investigator in OSINT Research.
✅ Fundamentals: Where and How to Start? – First steps in OSINT, covering both technical and procedural aspects (NDA, scope definition, legal considerations, double checking information).
✅ Passive vs. Active OSINT – Understanding the differences and when to apply each approach.

Key OSINT Research Areas:
✅ Business & Technical OSINT – Passive analysis of publicly available business data:
    - Investigation of IP addresses, domains, and company infrastructure.
    - Searching for email addresses, job postings, and business intelligence.
✅ Human OSINT (HUMINT) & Social Media OSINT (SOCMINT) – Gathering information on individuals:
   - Analyzing publicly available social media profiles and user activity.
✅ Geo OSINT (GEOINT) – Geolocation data analysis and its applications in investigations.

OSINT Tools Covered (depends on time):
✅ OSINT Framework, DNSDumpster, Shodan, Censys, Domain Dossier, Hunter.io, Dehashed, Wappalyzer, BuiltWith, Google Dorking, Google Maps, Google Reverse Image Search, Yandex Images, PimEyes, Maltego, theHarvester,.

Practical Demonstration:
- Geo OSINT – How to determine the geolocation of a picture using Image OSINT with help of google maps.
- Social Media OSINT – Basic search methods for gathering publicly available information.

Who Should Attend?
The lecture is suitable for anyone interested in this field, as well as those who want to improve the protection of their publicly accessible data.

Time Considerations:
Given that the lecture is limited to one hour, the focus will be on key concepts, practical examples, and essential tools, providing a solid foundation for further exploration.

I'm an experienced IT professional at 1811Solutions with a background in both technical and sales roles. For the past seven years, I’ve specialized in corporate cybersecurity and now work independently as a consultant, while staying current with broader IT trends.
Because I sell my knowledge, I invest heavily in continuous learning and hold several cybersecurity certifications, including TCM Practical OSINT Research Professional (PJOR), Certified Ethical Hacker (CEH) Master, NIST Cybersecurity Consultant, CompTIA PenTest+, Security+, CySA+, as well as Microsoft certifications (MCSE, MCSA) and others.

I regularly use Open Source Intelligence (OSINT) for business and technical research related to my work. Additionally, I've participated in Trace Labs' "Search Party" Capture The Flag (CTF) events — competitive, gamified initiatives focused on locating real missing persons by analyzing their digital footprints. These events involve teams applying OSINT techniques to gather intelligence that may assist law enforcement in ongoing investigations.

🔗 linkedin.com/in/markolicina