Using Maltego for OSINT
Elevating cyber intelligence with Maltego to create productive graphs.
OSINT is extremely powerful when it is applied correctly – it is as much a process as it is a methodology. It produces intelligence that supports decision makers in taking a particular course of action under often critical situations, for example; in international conflicts, law enforcement to trace suspects, businesses to assess an operating environment or whether to form a joint venture, new opportunities, security and military operations, financial institutions in KYC assessments and many more applications. It has become a strategy that many organisations now utilise providing speed and cost effectiveness to their intelligence operations.
Leveraging data from open sources can provide valuable insights through processing, but this can become very overwhelming when dealing with large quantities of data under time pressure. This is where Maltego steps in, it allows for the aggregation of data which can be linked together exposing relationships, events, locations, dates, assets, technology, organisations, people and the web such as websites, domains and social media.
This course will take you through all the steps from managing graphs, dealing with high volumes of data, making data relevant, using transforms to discover data and include it in graphs, making use of alternative tools to import data from outside Maltego, collaboration with team members and production of reports. Following these steps and processes provided, will be a game changer in terms of your own abilities placing you ahead of the pack in terms efficiency and professionalism.
As Simon Sinek says “the purpose of a car is not to buy gas, the purpose of a car is to go somewhere”, this is the same with OSINT, it has to go somewhere, Maltego is the car and information is the fuel.
What you will get:
If you are interested in the course or require additional information please email us at csi@thecyberinst.org
Welcome
Introduction
Maltego Handbook
Installation
Companion Files and Material
Part 1
Part 2
Introduction to the graph
First transform run
Sidebar
Installing First Transforms
Investigate Menu
Application Menu
Options
Simulation 1
Path features 1
Path features 2
Introduction
ASET Introduction
Part 1
Part 2
Part 3
Simulation 2
Introduction
Installing Python
Local Transform 1
Local transform 2
Installing Hunchly
People online types
Reconnaissance
People options graph
Applying ASET
Simulation 3
Setting up and using programmable search engines in Maltego
Working with group entities
Anatomy of a Group
Extracting and working with data
Simulation 4
Introduction
Adding Entities to use
Twitter 1
Twitter 2
Simulation 5
Instagram 1
Instagram 2
Instagram 3
Instagram 4
Simulation 6
Facebook 1
Facebook 2
Facebook 3
Preparation for Facebook
Introduction
Geolocating
Metadata
Simulation 7
TinEye
Simulation 8
Image Analyzer
Pasting Data
Simulation 9
Finding common data
Simulation 10
Importing geolocation data
Simulation 11
Report Introduction
Exporting graph
Generating reports
Home work
Introduction
Email formats
Domains 1
Domains 2
Simulation 12
Spams and scams
Home work
Introduction
Discover deleted data
Simulation 13
Introduction
Person email address
Company stalker
Build your own
Introduction
Case Management
Hunchly transforms 1
Hunchly transforms 2
Images
Searching
Introduction
Server
Graph sharing
Conclusions and last thoughts
Andrew Fordred
csi@thecyberinst.org