<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>OSINT Archives - Jean-Christoph von Oertzen</title>
	<atom:link href="https://jeanchristophvonoertzen.com/tag/osint/feed" rel="self" type="application/rss+xml" />
	<link>https://jeanchristophvonoertzen.com/tag/osint</link>
	<description>Exploring the intersection of cybersecurity, psychology, and resilience.</description>
	<lastBuildDate>Wed, 16 Feb 2022 20:30:17 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.3</generator>

<image>
	<url>https://jeanchristophvonoertzen.com/wp-content/uploads/2020/10/favicon-4.png</url>
	<title>OSINT Archives - Jean-Christoph von Oertzen</title>
	<link>https://jeanchristophvonoertzen.com/tag/osint</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Event takeaway: Layer8 Conference</title>
		<link>https://jeanchristophvonoertzen.com/event-takeaway-layer8-conference</link>
					<comments>https://jeanchristophvonoertzen.com/event-takeaway-layer8-conference#respond</comments>
		
		<dc:creator><![CDATA[jean-christoph]]></dc:creator>
		<pubDate>Fri, 08 Oct 2021 22:59:07 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[darknet]]></category>
		<category><![CDATA[data disposal]]></category>
		<category><![CDATA[HUMINT]]></category>
		<category><![CDATA[OSINT]]></category>
		<category><![CDATA[penetration test]]></category>
		<category><![CDATA[social engineering]]></category>
		<guid isPermaLink="false">https://jeanchristophvonoertzen.com/?p=564</guid>

					<description><![CDATA[<p>My key takeaways HUMINT phrases to identify background characteristics an interesting OSINT aspect in conversation is special prononciation of certain words identifying the persons origin List of words of identifiers per language The great casino heist: key takeaways from my first big social engineering engagement &#34;get out of jail&#34;-cards must be signed to work career [&#8230;]</p>
<p>The post <a href="https://jeanchristophvonoertzen.com/event-takeaway-layer8-conference">Event takeaway: Layer8 Conference</a> appeared first on <a href="https://jeanchristophvonoertzen.com">Jean-Christoph von Oertzen</a>.</p>
]]></description>
		
					<wfw:commentRss>https://jeanchristophvonoertzen.com/event-takeaway-layer8-conference/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Webinar takeaway: OSINT: Learn the Methods Bad Actors Use to Hack Your Organization</title>
		<link>https://jeanchristophvonoertzen.com/webinar-takeaway-osint-learn-the-methods-bad-actors-use-to-hack-your-organization</link>
					<comments>https://jeanchristophvonoertzen.com/webinar-takeaway-osint-learn-the-methods-bad-actors-use-to-hack-your-organization#respond</comments>
		
		<dc:creator><![CDATA[jean-christoph]]></dc:creator>
		<pubDate>Wed, 11 Aug 2021 19:14:59 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[OSINT]]></category>
		<category><![CDATA[recon]]></category>
		<guid isPermaLink="false">https://jeanchristophvonoertzen.com/?p=542</guid>

					<description><![CDATA[<p>My key takeaways It&#8217;s all about reducing the attack surface OSINT Setup: use VPN&#8217;s and VM&#8217;s The &#34;OSINT-kill-chain&#34;: Organization Company website (eg press releases) Third-party ressources (eg LinkedIn, Glassdoor, Indeed) Employees (eg Facebook, LinkedIn, Instagram) Other tools (eg Google) Google dorking is still the basic tool for every OSINT investigation remember to concat the dorks [&#8230;]</p>
<p>The post <a href="https://jeanchristophvonoertzen.com/webinar-takeaway-osint-learn-the-methods-bad-actors-use-to-hack-your-organization">Webinar takeaway: OSINT: Learn the Methods Bad Actors Use to Hack Your Organization</a> appeared first on <a href="https://jeanchristophvonoertzen.com">Jean-Christoph von Oertzen</a>.</p>
]]></description>
		
					<wfw:commentRss>https://jeanchristophvonoertzen.com/webinar-takeaway-osint-learn-the-methods-bad-actors-use-to-hack-your-organization/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>twitch takeaway: staying mentaly healthy as an investigator</title>
		<link>https://jeanchristophvonoertzen.com/twitch-takeaway-staying-mentaly-healthy-as-an-investigator</link>
					<comments>https://jeanchristophvonoertzen.com/twitch-takeaway-staying-mentaly-healthy-as-an-investigator#respond</comments>
		
		<dc:creator><![CDATA[jean-christoph]]></dc:creator>
		<pubDate>Sun, 18 Jul 2021 21:45:58 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[mental health]]></category>
		<category><![CDATA[OSINT]]></category>
		<guid isPermaLink="false">https://jeanchristophvonoertzen.com/?p=535</guid>

					<description><![CDATA[<p>My key takeaways Nicole says: Remember H.A.L.T (hungry, angry, lonely, tired) it really does make a huge difference! 5,4,3,2,1 &#8211; A grounding technique to take a step back from the investigation. 5 things I can see 4 things I can hear 3 things I can smell e.g lemon 2 things I can touch 1 thing [&#8230;]</p>
<p>The post <a href="https://jeanchristophvonoertzen.com/twitch-takeaway-staying-mentaly-healthy-as-an-investigator">twitch takeaway: staying mentaly healthy as an investigator</a> appeared first on <a href="https://jeanchristophvonoertzen.com">Jean-Christoph von Oertzen</a>.</p>
]]></description>
		
					<wfw:commentRss>https://jeanchristophvonoertzen.com/twitch-takeaway-staying-mentaly-healthy-as-an-investigator/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Workshop takeaways: OSINT for Cyber Defenders</title>
		<link>https://jeanchristophvonoertzen.com/workshop-takeaways-osint-for-cyber-defenders</link>
					<comments>https://jeanchristophvonoertzen.com/workshop-takeaways-osint-for-cyber-defenders#respond</comments>
		
		<dc:creator><![CDATA[jean-christoph]]></dc:creator>
		<pubDate>Sun, 20 Jun 2021 11:09:27 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[BSides]]></category>
		<category><![CDATA[OSINT]]></category>
		<category><![CDATA[red team]]></category>
		<category><![CDATA[workshop]]></category>
		<guid isPermaLink="false">https://jeanchristophvonoertzen.com/?p=502</guid>

					<description><![CDATA[<p>My key takeaways Always do OSINT with the assumption in mind, that the software you are using is compromised Sock puppet accounts do not use real images like from Google Image Search as this might be considered identity theft in some countries make the email account information match you sock puppet use lastpass to store [&#8230;]</p>
<p>The post <a href="https://jeanchristophvonoertzen.com/workshop-takeaways-osint-for-cyber-defenders">Workshop takeaways: OSINT for Cyber Defenders</a> appeared first on <a href="https://jeanchristophvonoertzen.com">Jean-Christoph von Oertzen</a>.</p>
]]></description>
		
					<wfw:commentRss>https://jeanchristophvonoertzen.com/workshop-takeaways-osint-for-cyber-defenders/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
