Open-Source Intelligence (OSINT) Overview

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/26

flashcard set

Earn XP

Description and Tags

These flashcards cover essential vocabulary related to Open-Source Intelligence (OSINT) and its applications in Cyber Threat Intelligence (CTI).

Last updated 10:22 AM on 4/20/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

27 Terms

1
New cards

Open Source Intelligence (OSINT)

Intelligence collected from publicly available sources, excluding classified information.

2
New cards

Common OSINT Categories

Includes media, internet, public government data, and professional/academic publications.

3
New cards

Cyber Threat Intelligence (CTI)

The process of collecting and analyzing data to understand and mitigate cyber threats.

4
New cards

backdoor

allows an attack to control the system

5
New cards

botnet

infects computers to receive instructions from same command-and-control server

6
New cards

downloader

malicious code that exists only to download other malicious code

7
New cards

information-stealing malware

sniffers, keyloggers, password has grabbers

8
New cards

launcher

malicious program used to launch other malicious programs

9
New cards

rootkit

malware that provides persistent privileged access to a computer while conceal the existence of malicious code, usually paired with a backdoor

10
New cards

scareware

frightens a user into buying something

11
New cards

spam-sending malware

attacker rents machine to spammers

12
New cards

worms or viruses

malicious code that can copy itself and infect additional computers

13
New cards

hash

an algorithm that takes an arbitrary input of bits of any size and produces a unique, fixed-size output

  • not reversible

  • output is unique and of fixed length → reduces og data

  • also called checksum or digital fingerprint

14
New cards

malware hash

hash calculated for a malware file

  • used to identify, share, and group malware

    • ex) anti-virus software

15
New cards

malware signature

refers to a unique sequence of bytes indicative of malicious behavior

16
New cards

malware signature: YARA

creates descriptions of malware families based on textual/binary patterns

  • each rule (description) consists of a set of strings and a boolean expression which determine it logic

17
New cards

National Vulnerability Database (NVD)

A U.S. government repository that provides access to vulnerability management data.

18
New cards

Common Vulnerabilities and Exposures (CVE)

Publicly disclosed computer security flaws identified in the NVD.

19
New cards

Common Vulnerability Scoring System (CVSS)

A method used to supply a qualitative measure of severity for vulnerabilities.

20
New cards

Common Platform Enumeration (CPE)

structured naming scheme for information technology systems, software, and packages

21
New cards

Shodan

A search engine for the Internet of Things (IoT), allowing identification of devices accessible on the open internet.

22
New cards

Hacker Forums

Online discussion sites where hackers share tools, ideas, and knowledge regarding exploitation.

23
New cards

Darknet Marketplaces

Commercial websites on the dark web that primarily act as black markets for various illegal products, including malware.

24
New cards

IRC (Internet Relay Chat) Channels

An application facilitating plaintext communication, often used by hacker groups for real-time discussion.

25
New cards

Carding Shops

Online platforms for distributing stolen credit/debit card information and related data.

26
New cards

OSINT Value in CTI

OSINT provides external insights into potential breaches, discussions around organizations, and available exploit tools.

27
New cards

OSINT Challenges

Issues include universal access to data, difficulty in identifying important sources, and complications in data collection.