Table of Contents
- Setting up OSINT Environment
- Secure Browsers
- Exploring OS Security
- Online Privacy and Security
- Tail OS in Use
- Using Tor Browser
- Advanced Search Tools
- Sock Puppet Accounts
- Exploring Footprinting
- Investigating E-mails
- Utilizing Social Media
- Tracking Family and Friends
- Mobile Identity Search
- Mining Online Communities
- Investigating Domain and IP
- Detection of Data Leaks
- Understanding Encryption and Digital Certificates
- Access Fake News
- Reverse Image Search
- Geo-location
- Identify Real Images
- Use of Aadhaar and Social Security Number
- Tracking Fraud SMS