Summary
During the course of this chapter, you learned how to collect and analyze OSINT from various data sources to identify the network infrastructure of organizations. Additionally, you discovered how to use various online websites such as Shodan, Censys, social media platforms, and even job boards to find data leaks and gain insights into how a threat actor can leverage the data to profile an organization and determine their attack surface.
I hope this chapter has been informative for you and is helpful in your journey in the cybersecurity industry. In the next chapter, Imagery, People, and Signals Intelligence, you will learn how to analyze images and use mapping applications to identify the physical location of a target, collect user credentials from online databases, and identify wireless devices within an area.