Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Twitter OSINT Hacking: Ethical Hackers and OSINTeers
Training Overview
Description of Training
Video Overview (1:42)
Section 1: Course Introduction
1. Course Introduction and Welcoming
2. Twitter and Open Source Intelligence (0:56)
3. Disclaimer
Section 2: Twitter OSINT Hacking Introduction
4. What is Hacking Exactly? (1:53)
5. Different Types of Hackers (2:12)
6. Hacking Stages (1:30)
7. What is OSINT Hacking? (1:00)
8. Why Twitter? (0:42)
9. Twitter OSINT Hacking Methods (1:15)
Section 3: Setup Our Hacking Environment Ready and Learn Kali Linux Before We Start
10. Section Goal (0:39)
11. What is virtual machine? (2:29)
12. Set up Virtual Box (3:18)
13. Installing Kali Linux (5:01)
14. Kali Linux Configuration (8:18)
15. Installing Extension Pack (4:30)
16. Taking the First Snapshot (2:36)
17. Kali Linux Graphical User Interface (8:21)
18. Kali GUI Important Keyboard Shortcuts (6:05)
19. Kali Linux Command Line Interface (10:26)
20. Kali CLI Important Keyboard Shortcuts (6:50)
21. Change The Passwords (4:37)
Section 4: The Way To Create Undetectable Realistic Fake Identity
22. Section Goal (0:39)
23. Create a Realistic Fake Identity (12:56)
Section 5: Twitter and Hackers Tricks and Mindset
24. Section Goal (0:39)
25. Hackers Starting Tips (3:20)
26. The Targeted Company Page (16:33)
27. The Targeted Person's Profile (8:58)
Section 6: Twitter and What Real Advanced Hackers Do
28. Section Goal (0:34)
29. The Power of Asterisk (3:47)
30. The Listing Search Trick (3:17)
31. The Power of Hashtag and OSINT Hacking (2:42)
32. Reveal Tweets, Conversations and Replies Among Targeted Parties (9:13)
33. Filtration Trick and Hackers Mind (7:43)
34. The Power of Logics (3:25)
35. Reveal Tweets and Information Within Specific Distance (4:26)
36. The Spoken Languages and OSINT (7:45)
37. The Power of Excluding (3:50)
38. Date Range Trick and OSINT Hacking (6:02)
39. Target's Geographical Location and Revealing More Tweets and Information (6:43)
40. Combining The Tricks (10:00)
Section 7: Reveal More Deeper Information
41. Section Goal (0:39)
42. Get All The Tweets With Much More Details (9:41)
43. Finding The Exact Location and More Information (7:56)
44. Reveal More Information - TwoPCharts (5:51)
45. Reveal A Lot of Information from Conversations Much Faster and Easier (4:25)
46. Get Even More Information (6:02)
47. Target's Non-Active Time (1:10)
48. Hardening Twitter OSINT Attacks (3:49)
Section 8: Security and Privacy Hardening
49. Section Goal (0:40)
50. Protect Your Account and Information (8:00)
Section 9: Finishing UP
51. Congratulations
Audio Version of the Training
Audio Download
37. The Power of Excluding
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock