As an Open Source Collection Specialist OSCS , you will manage the systematic collection of publicly available information in a given region or a subject area to meet customer needs.
The information is known as Open Source Intelligence OSINT and includes traditional mass media, the internet, specialized journals, studies, conference proceedings, geospatial information, and more. In some cases, OSCSs act as collectors themselves. Some OSCSs work in traditional library environments, while others work in geographic- or subject area-based components. Interesting info, thanks for sharing. SoundKonverter to do the ripping, conversion, and tagging.
This tools uses online CD databases, and you can edit the metadata before saving the files; for example, if you "prefer title" case to "start case". Flacon when you originally have one big audio file and a cue sheet, but you want to split the file into separate tracks. Sonic Visualiser to "view" audio data and check mastering quality. And a related one: Spek. How I digitized my CD collection with open source tools Opensource.
Clean off your shelves by ripping your CDs and tagging them for easy playback across your home network. Image credits :. Silver Spoon. Modified by Jason Baker. CC BY 3. Get the highlights in your inbox every week. More Great Content. My favorite open source tools to meet new friends.
Quarantine hasn't been all bad—it's allowed people to create fun online communities that also help others. Chris Collins Correspondent. Build an open source theremin. Create your own electronic musical instrument with Open. What is PentestAid? Our Update. Open Source Intelligence Tools. Case Management. Dark Web. Domain Name. Email Address. Financial Intelligence. Geospatial Intelligence. IP Address. Language Translation. People Search. Shodan provides you a lot of information about the assets that have been connected to the network.
The devices can vary from computers, laptops, webcams, traffic signals, and various IOT devices. This can help security analysts to identify the target and test it for various vulnerabilities, default settings or passwords, available ports, banners, and services etc. Google is one of the most commonly used search engine when it comes to finding stuff on the internet.
For a single search, the results can be of various hundred pages sorted in order of relevance. The results vary from ads, websites, social media posts, images etc. Google Dorks can help a user to target the search or index the results in a better and more efficient way. Let us say that the user wants to search for the word usernames but only requires the results with PDF files and not websites. This is done as below:. A harvester is an excellent tool for getting email and domain related information.
This one is pre-bundled in Kali and can be very useful in fetching information. Below is an example of the output when we try to search for emails for Microsoft in PGP server. You can explore more as per requirement. Metagoofil is written by Christian Martorella and is a command line tool that is used to gather metadata of public documents. The tool is pre-bundled in Kali Linux and has a lot of features searching for the document type on the target, local download, extraction of metadata and reporting the results.
For example: Users can scan for a particular kind of documents on a particular domain. Metagoofil —d nmap. Recon-ng is a great tool for target information collection. This is also pre-bundled in Kali. The power of this tool lies in the modular approach. For those who have used Metasploit will know the power of modular tools.
Different modules can be used on the target to extract information as per need. Just add the domains in the workspace and use the modules. For starters, here is a sample of the tool helping you.
Social networking websites hold a lot of information but it will be really boring and time taking task if you need to check whether a particular username is present on any social media website. To get such information there is a website www.
It will search for the presence of a particular username on more than websites. The users can check for the presence of a target on a particular website so as to make the attack more targeted.
0コメント