In this slideshare, we’ll discuss threat data collection and methods. To discover more about threat intelligence, visit: www.eccouncil.org/cyber-threat-intelligence
2. Open Source Intelligence (OSINT)
Human Intelligence (HUMINT)
Cyber Counterintelligence (CCI)
Indicators of Compromise (IoCs)
Malware Analysis
Threat Intelligence Data Collection Methodology
3. Search Engines
Web Services
Website Footprinting
Emails
Whois Lookup
DNS Interrogation
Automating OSINT effort
Threat Data Collection
Through Open Source
Intelligence (OSINT)
4. Social Engineering Tools
Threat Data Collection through Human Intelligence
(HUMINT)
Human-based Social Engineering Techniques
Interviewing and Interrogation
5. Threat Data Collection through Cyber
Counterintelligence (CCI)
Honeypots
Passive DNS Monitoring
Pivoting Off Adversary’s Infrastructure
Malware Sinkholes
YARA Rules