강의

멘토링

로드맵

Security & Network

/

Computer Security

Utilizing OSINT's representative search service Criminal IP

The most important part of the security response and security control work is to monitor and remove potential security threats to your company/customer services in advance. Let’s establish and utilize a security threat monitoring plan using the OSINT search service Criminal IP.

(4.9) 15 reviews

594 learners

  • boanproject
보안
OSINT
모니터링
보안프로젝트
Criminal IP
Thumbnail

Reviews from Early Learners

What you will learn!

  • IT Security OSINT Search Utilization

  • Criminal IP Utilization

  • Security Threat Monitoring

Security response, more powerful with open search service!

What about this lecture?

This lecture covers security monitoring using Open Intelligence Service (OSINT) representative Criminal IP and cases of external security threats.

Many security hacking incidents are occurring using Open Source Intelligence (OSINT) search services . The use of open search services is increasing in mock hacking, breach response, and regular security activities. Regular monitoring is essential for unnecessary port access. If services connected to open ports have inadequate access control, default account settings, or inadequate management of the administrator page, criminals can pose a serious security threat to internal systems.

This lecture covers how to proactively monitor and eliminate potential security threats from an offensive perspective before an attack occurs. Let's learn how to quickly respond to security threats using the Criminal IP search service, a leading OSINT service.

📣 What is OSINT?

Open source intelligence (OSINT) refers to information obtained from publicly available sources . It is also called open source intelligence, public information, public information, open source information, or open source intelligence.

The types of intelligence collected by national intelligence agencies like the CIA and private intelligence companies include human intelligence (HUMINT), signals intelligence (SIGINT), imagery intelligence (IMINT), measured intelligence (MASINT), open-source intelligence (OSINT), and technical intelligence (TECHINT). While the CIA originally focused on HUMINT, the importance of TECHINT has grown significantly with the advancement of computers. (Wikipedia)

  • New DDoS attacks are on the rise… What are effective countermeasures? Periodic scanning is essential to determine whether internal server IPs and services are exposed to the public (Daily Security, August 19, 2021)
  • VMware Vulnerability Alert: Hackers Using Shodan to Find Vulnerable Servers (Daily Security, February 28, 2021)
  • Korean IoT Device Vulnerabilities Exposed in Shodan (Security News, October 10, 2018)
  • Is My Privacy Leaking Through the IoT Search Engine Shodan? (iNews, November 16, 2018)

Learning Content

This lecture will cover the Criminal IP search service, a leading OSINT service. Unlike other OSINT search services, this service was developed in Korea and offers detailed monitoring capabilities, including Korean language searches, malware-infected sites, and phishing site searches. We will also cover various recent security threats arising from the use of this search service.

  1. Utilizing the basic search methods and features of the Criminal IP OSINT search service.
  2. Utilizing domain search and phishing site detection services
  3. Security threats caused by open search services
  4. How to Use Python APIs for Automated Tasks (To be updated by March 2023)

📢 Please check before learning!

  • This lecture was conducted during the beta testing period for Criminal IP. After the beta testing period ends, some services may become paid services.
  • Accessing unauthorized systems using the information learned in this course is illegal. Please use it only for research purposes and to monitor the security of your own services.

Features of this course

How to Use the Criminal IP Search Service

This practical guide explains the various functions of OSINT search services, a major activity in security threat monitoring.

Up to Criminal IP ASM, a security monitoring service for enterprises

You can also indirectly explore the security integration monitoring capabilities by including the enterprise ASM service available for use in your enterprise.

The Importance of OSINT Search Services as Seen Through Information Leaks

You can use various services provided by Criminal IP to identify security threats caused by unnecessary ports and insufficient access control.


Created this course
Introducing the knowledge sharer.

Jo Jeong-won (Security Project Representative)

History

  • Security Project Manager and Representative
  • SK Shields Rookie Course Full-time Instructor
  • Former CEO of Oneforall Co., Ltd.
  • Former KB Securities IT Planning Information Protection Department
  • Former A3 Security Mock Hacking Team
  • Security consulting and training for over 200 large and small businesses
  • Multi-Campus IT Security External Expert Instructor
  • Former visiting professor at the Department of Industrial Security, Chung-Ang University
  • Visiting Professor, Seoul Digital University

published books

  • Android Mobile App Simulated Hacking (Acorn Publishing, 2017)
  • Complete Web Hacking Simulator Using Vibox (Hanbit Media, 2016)
  • IT Engineer's Second Job, Book Review (Bifan Books, 2015)
  • Using BuffSuite and Web Simulated Hacking (Hanbit Media, 2015)
  • WordPress Plugin Vulnerability Analysis and Simulated Hacking (Hanbit Media, 2015)
  • How to Live as an IT Engineer 1 (Bifan Books, 2015)
  • Android Mobile Malware and Simulated Hacking Diagnosis (Acorn Publishing, 2014)
  • What is Simulated Hacking? (Wikibooks, 2014)
  • Simulated Hacking Using Kali Linux (Acorn Publishing, 2014)
  • The World of Digital Forensics (Info the Books, 2014)
  • Hacker, the Cracker Detective (Seongandang, 2010)
  • Published over 30 books

Recommended for
these people

Who is this course right for?

  • For those considering security monitoring using OSINT search in practice

  • Anyone who wants to utilize OSINT's representative Criminal IP

  • Anyone who wants to monitor unnecessary ports and vulnerabilities for security threats

Need to know before starting?

  • IT Security Basics

Hello
This is

100,652

Learners

3,030

Reviews

443

Answers

4.7

Rating

67

Courses

보안프로젝트 ( www.boanproject.com )는 IT보안, 빅데이터, 머신러닝, IoT 등 다양한 분야의 온라인 강의, 그룹 강의를 진행하고 있습니다. 

Curriculum

All

22 lectures ∙ (3hr 30min)

Published: 
Last updated: 

Reviews

All

15 reviews

4.9

15 reviews

  • boeun0v0님의 프로필 이미지
    boeun0v0

    Reviews 2

    Average Rating 5.0

    5

    32% enrolled

    • jjhgwx님의 프로필 이미지
      jjhgwx

      Reviews 564

      Average Rating 4.8

      5

      14% enrolled

      Cảm ơn bạn vì khóa học tuyệt vời!

      • hshwang82480님의 프로필 이미지
        hshwang82480

        Reviews 11

        Average Rating 5.0

        5

        32% enrolled

        • unun49729899님의 프로필 이미지
          unun49729899

          Reviews 1

          Average Rating 5.0

          5

          32% enrolled

          • boanproject
            Instructor

            Cảm ơn bạn vì đánh giá tốt ạ!!!

        • kukaeden님의 프로필 이미지
          kukaeden

          Reviews 469

          Average Rating 5.0

          5

          14% enrolled

          Tôi đã có thể học chuyên sâu về Criminal IP. Cảm ơn bạn vì bài giảng hay!

          • boanproject
            Instructor

            Cảm ơn bạn!! OSINT rất quan trọng. Cảm ơn vì đánh giá tốt ạ!!!

        Free

        boanproject's other courses

        Check out other courses by the instructor!