Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Twitter OSINT Hacking: Ethical Hackers and OSINTeers
Training Overview
Description of Training
Video Overview (1:42)
Section 1: Course Introduction
1. Course Introduction and Welcoming
2. Twitter and Open Source Intelligence (0:56)
3. Disclaimer
Section 2: Twitter OSINT Hacking Introduction
4. What is Hacking Exactly? (1:53)
5. Different Types of Hackers (2:12)
6. Hacking Stages (1:30)
7. What is OSINT Hacking? (1:00)
8. Why Twitter? (0:42)
9. Twitter OSINT Hacking Methods (1:15)
Section 3: Setup Our Hacking Environment Ready and Learn Kali Linux Before We Start
10. Section Goal (0:39)
11. What is virtual machine? (2:29)
12. Set up Virtual Box (3:18)
13. Installing Kali Linux (5:01)
14. Kali Linux Configuration (8:18)
15. Installing Extension Pack (4:30)
16. Taking the First Snapshot (2:36)
17. Kali Linux Graphical User Interface (8:21)
18. Kali GUI Important Keyboard Shortcuts (6:05)
19. Kali Linux Command Line Interface (10:26)
20. Kali CLI Important Keyboard Shortcuts (6:50)
21. Change The Passwords (4:37)
Section 4: The Way To Create Undetectable Realistic Fake Identity
22. Section Goal (0:39)
23. Create a Realistic Fake Identity (12:56)
Section 5: Twitter and Hackers Tricks and Mindset
24. Section Goal (0:39)
25. Hackers Starting Tips (3:20)
26. The Targeted Company Page (16:33)
27. The Targeted Person's Profile (8:58)
Section 6: Twitter and What Real Advanced Hackers Do
28. Section Goal (0:34)
29. The Power of Asterisk (3:47)
30. The Listing Search Trick (3:17)
31. The Power of Hashtag and OSINT Hacking (2:42)
32. Reveal Tweets, Conversations and Replies Among Targeted Parties (9:13)
33. Filtration Trick and Hackers Mind (7:43)
34. The Power of Logics (3:25)
35. Reveal Tweets and Information Within Specific Distance (4:26)
36. The Spoken Languages and OSINT (7:45)
37. The Power of Excluding (3:50)
38. Date Range Trick and OSINT Hacking (6:02)
39. Target's Geographical Location and Revealing More Tweets and Information (6:43)
40. Combining The Tricks (10:00)
Section 7: Reveal More Deeper Information
41. Section Goal (0:39)
42. Get All The Tweets With Much More Details (9:41)
43. Finding The Exact Location and More Information (7:56)
44. Reveal More Information - TwoPCharts (5:51)
45. Reveal A Lot of Information from Conversations Much Faster and Easier (4:25)
46. Get Even More Information (6:02)
47. Target's Non-Active Time (1:10)
48. Hardening Twitter OSINT Attacks (3:49)
Section 8: Security and Privacy Hardening
49. Section Goal (0:40)
50. Protect Your Account and Information (8:00)
Section 9: Finishing UP
51. Congratulations
Audio Version of the Training
Audio Download
42. Get All The Tweets With Much More Details
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock