OSINT (Open-Source Intelligence) in cybersecurity involves collecting and analyzing publicly available data to identify vulnerabilities, monitor threats, and enhance security. Sources include websites, social media, public records, and forums. It aids in vulnerability management, threat intelligence, and incident response.
Scenario:
The database was first discovered on a Telegram group where leaked databases are shared. Your task is to find the earliest mention of this breach on a publicly accessible forum.
visit this link for the file
https://drive.google.com/file/d/1bTNIWSuWSc0d5782hMLdxdwNW5d7z1fP/view?usp=sharing
Scenario:
Find the information some employees have also account in india mart and data breach have the credential.
Scenario:
Attackers use leaked databases for targeted phishing attacks. Your goal is to identify a pattern in the leaked email addresses to determine which businesses are most at risk.
Scenario:
One of the numbers in the database has been linked to a fraud operation that sells fake electronics on IndiaMART. Your job is to find which number is flagged as suspicious.
Scenario:
A leaked email address ((you find in previous task )@hack.com) has been discovered in a past breach. However, your job is not just to find its breach history but to identify the real LinkedIn account linked to this email.
Scenario:
A suspicious company has been flagged for potential fraud, operating under multiple aliases with conflicting business details. It has been linked to a network of shell companies involved in tax evasion and financial fraud. Your mission is to uncover the business that does not legally exist.
Scenario:
The full database from IndiaMART has been leaked and is now being sold through Telegram channels. Your task is to find a listing of this database being sold on a Telegram marketplace.
Scenario:
Some businesses appear more than once in the database with different details, possibly indicating fake accounts.
Scenario:
Your job is to determine how the breach happened.