This thesis deals with Data Gathering from Open Sources which can be used in Cyber Security; an analysis of the OSINT tools; a creation of a Data Gathering Tool itself. The theoretical part of the thesis explores Data Gathering within the framework of Ethical Hacking and in which phase of Penetration Testing the Data Extraction is crucial. Following the analysis of the OSINT tools the Practical part of the thesis examines the Created Tool itself which was written in Python programming language. Via API interface the Tool allows interaction with other OSINT tools such as Censys, crt.sh or DNSDumpster. After entering the IP address or domain of the target company the Tool is able to search for basic information such as location, DNS names and...
Third party sources of cyber threat intelligence can be used to identify malicious network traffic i...
The invention of computing devices has brought higher attainment in professional and personal lives....
When talking about Cybersecurity, particularly in security incident response plan and processes it i...
Téma bakalářské práce se zaměřuje na sběr dat z otevřených zdrojů, které lze využít v kybernetické b...
This paper aims to demonstrate the use of Open Source Intelligence (OSINT) techniques to gather publ...
Open-source intelligence (OSINT) tools are used for gathering information using different publicly a...
Underpinning all open-source intelligence investigations is data. Without data there is nothing to b...
Emerge of the Internet as a global platform for sharing and exchanging information world-wide has in...
Cybersecurity is an immense issue nowadays because of the damaging consequences instigated by cyber-...
This bachelor thesis explains the term Open Source Intelligence (OSINT) and their practical usage, b...
The acquisition of intelligence from public open sources, known as Open Source INTelligence (OSINT),...
Open Source Internet Research Toolkit (OSIRT) is an open source tool developed in C# to support offi...
Cyber security incidents have affected organisations from various industries. Malicious actors aim t...
Many organizations in the developing world (e.g., NGOs), include digital data collection in their wo...
The proliferation of the Internet has amplified the use of social networking sites by creating a pla...
Third party sources of cyber threat intelligence can be used to identify malicious network traffic i...
The invention of computing devices has brought higher attainment in professional and personal lives....
When talking about Cybersecurity, particularly in security incident response plan and processes it i...
Téma bakalářské práce se zaměřuje na sběr dat z otevřených zdrojů, které lze využít v kybernetické b...
This paper aims to demonstrate the use of Open Source Intelligence (OSINT) techniques to gather publ...
Open-source intelligence (OSINT) tools are used for gathering information using different publicly a...
Underpinning all open-source intelligence investigations is data. Without data there is nothing to b...
Emerge of the Internet as a global platform for sharing and exchanging information world-wide has in...
Cybersecurity is an immense issue nowadays because of the damaging consequences instigated by cyber-...
This bachelor thesis explains the term Open Source Intelligence (OSINT) and their practical usage, b...
The acquisition of intelligence from public open sources, known as Open Source INTelligence (OSINT),...
Open Source Internet Research Toolkit (OSIRT) is an open source tool developed in C# to support offi...
Cyber security incidents have affected organisations from various industries. Malicious actors aim t...
Many organizations in the developing world (e.g., NGOs), include digital data collection in their wo...
The proliferation of the Internet has amplified the use of social networking sites by creating a pla...
Third party sources of cyber threat intelligence can be used to identify malicious network traffic i...
The invention of computing devices has brought higher attainment in professional and personal lives....
When talking about Cybersecurity, particularly in security incident response plan and processes it i...