file please

Using all you have learned, use the methods/tools learned within this course to investigate an organization of your choosing.  Write a 3–4-page paper, identifying items you have uncovered within the open-source world. Remember you must apply all you have learned from this course. 

 

*Please refer to the APA template for assignment submission. 

I have attached some file to help you doing the subject. Like all the discussion we did to give any idea of the stuff we learned through this class.

Below are all the homework we did through this week to give an idea of what we did in class with the discussion

Please the exercise is on the top at least 3 full page without the reference and tiltle page

Thank you, please help.


This was assignment 1

Instructions: Identify an organization that you will investigate over the course labs. However, do not choose a government organization, individual, or entity that may be considered a violation of privacy.

Task: Identify 15 factors about the organization that could provide information about the organization, and how you would research these.

Submittal: Submit using the Grid Association Matrix. (only focus on page 1 of the grid association matrix)


This was Asignment 2

You will write a 2-3 page paper.

Task: Describe how the interrogation process can be used to supplement your organizations collection plan.

This was assignment 3

Visit the website Google Hacking Database (https://www.exploit-db.com/google-hacking-database). You will write a 2-3 page paper.

Task: Identify 15 dork strings:

        1. What syntax will be necessary to gain the information?
        2. What information do you expect to gain from the dorks?
        3. When you ran the dorks, what was returned? Did you receive any errors? If so, what were they? What actions did you take to correct the errors?  Were you able to recover from the errors?

Instructions: You will write a 2-3 page paper.

Task: Describe how OSINT can be used to supplement your organizational collection plan. Describe how Google Dorks can play a part in your collection plan as well. Which dorks would you use? 


This was assignment 4 a-b


A Instruction: Review the view on Google Dorking.

Task: Google Dorking

  1. https://youtu.be/6dRT5VEvIo8 Links to an external site.- can also be found at TryHackMe | Google DorkingLinks to an external site.

  2. Write a 2 page report on how Google Dorking can used for good and evil.



B Lab 01 (Google Hack)

Google hacking, also named Google dorking, is a computer hacking technique that uses Google Search and other Google applications to find  security holes in the configuration and computer code that websites use.

Google hacking involves using advanced operators/keywords in the Google search engine to locate/filter out desired results from the Google database.

Google Hacking Database (GHDB) – collections of google dorks that we can use to gather/get interesting information from google.

https://www.exploit-db.com/google-hacking-database/Links to an external site.

 

From the exploit-db website, select 3 DIFFERENT categories of vulnerabilities. Perform the selected dork strings in the Google search engine and capture (screenshot or copy/paste) the information from each of dork string that you used and place it in a Microsoft Word document to be submitted. 

Assignment 5 a-b

A Instructions: Review your collection plan submitted in Week 1. You will write a short 2-3 page paper.

Task: Write a review of your collection plan and techniques, answering the following.

  1. Identify if your collection plan and techniques have changed since your initial collection plan was created.

  2. Identify why the techniques used initially may vary from what you would use today.

  3. What if any, interesting fact have you gained from the discussion questions?

B Instructions:  Write a short 2-3 page paper based on the organization you selected in week 1.

Task: You are an analyst, and you need to describe the following to your supervisors:

  1. Identify why you need to report your findings.

  2. How should the findings be structured to gain the attention of your organization? 

  3. Describe why you selected the structure you did?

This assignment 6 a-b

Instructions: Review the OSINT Resource Tools List

Task: Write a 2-3 page paper reviewing 10-15 different Tools.

  1. Identify the types of data that can be retrieved.

  2. Provide feedback on the sites utility.