SEC504: Hacker Tools, Techniques, and Incident Handling

Experience SANS training through course previews.
Learn MoreLet us help.
Contact usConnect, learn, and share with other cybersecurity professionals
Engage, challenge, and network with fellow CISOs in this exclusive community of security leaders
Become a member for instant access to our free resources.
Sign UpMission-focused cybersecurity training for government, defense, and education
Explore industry-specific programming and customized training solutions
Sponsor a SANS event or research paper
We're here to help.
Contact UsLearn what OPSEC is, why it's important in the world of OSINT, and some best practices when conducting investigations.
OPSEC stands for Operational Security and is a term derived from the United States Military. Since its introduction, OPSEC has been adopted by many organizations and sectors to safeguard sensitive information in various contexts beyond the military. The objective of OPSEC is to prevent sensitive information from getting into the hands of an adversary, primarily by denying access to the data. First, we want to identify the data that can be compromised and then take steps to reduce the exploitation of this data and minimize the risk.
For some, having a better OPSEC program might mean preventing bad actors from identifying you online or knowing where you live and work. Still, some may need more protection because of the work you do. Both of these mean reviewing your overall digital footprint, those breadcrumbs you leave behind online, the associations to family and friends on your social media, or even images you post online that may disclose your location. Consider this: a threat actor could use information you share online and break into your home when you are away on vacation, and they might know this because you shared photos indicating that you are on vacation with family.
Having good operational security may include modifying one's online behaviour and applying security best practices. It means protecting sensitive data that an adversary could gather and abuse.
Ross Ulbricht is the founder and admin of the darknet marketplace called Silk Road, which sold drugs and weapons and was considered the largest darknet marketplace at the time. In Silk Road forums, ULBRICHT was known as the "Dread Pirate Roberts." One of the several operational security mistakes was in 2011 when ULBRICHT posted a question in a forum looking for an "IT pro in the bitcoin community" and urged candidates to write to rossulbricht at gmail dot com. ULBRICHT made several OPSEC mistakes that led to his eventual arrest, and is currently serving a life sentence.
OPSEC is an analytical process that entails assessing potential threats, vulnerabilities, and risks to sensitive information.
Everyone's OPSEC will look different depending on what they are doing, who they are, and what types of activities they are engaged in. You can ask yourself some questions to understand this in a better way and to identify your current threat model: What information do you want to protect? i.e., House address, work location, family members, and assets.
What can an adversary gain from looking at your online footprint? Who might want to gain access to that information? This can be in the form of people you don't know who are looking for a soft target online or in the form of you applying for a job and the recruiter finding you on social media to see what you post about to get an idea about your character.
Where do you expose yourself too much? Do you have privacy settings on all your social media? What do you post online? These questions may assist with making your assessment.
We all have something to keep from the general public, and if we didn't, we wouldn't password-protect our devices, lock our front doors, or sign out of our emails. Your online footprint says a lot about you, some of what you might not want to be accessible to just about anyone.
OSINT investigators are required to have good OPSEC. This means they should avoid using their personal social media accounts to conduct investigations. The reason for this is to uphold their privacy and security and ensure the investigation's integrity. Research accounts are created to isolate OSINT research, ensuring a separation between the personal and work lives of OSINT investigators. It is essential to emphasize the importance of separating an OSINT investigator's real identity from research accounts.
Read more about Sock Puppets here:https://www.sans.org/blog/what-are-sock-puppets-in-osint.
Those of you who are not conducting OSINT research can also make OPSEC mistakes, including the general oversharing of personal information online, and one example of poor OPSEC is leaving unused social media profiles online (especially when they contain old photos and other information you have posted in the past). The general rule to understand is that we might make mistakes, and the objective should always be to reduce the impact of these mistakes.
Basics for everyone:
It is important to note that OPSEC is an ongoing process that requires continuous evaluation, adaptation, and improvement to address evolving threats and vulnerabilities. For instance, you may move into a job where you need to reassess your threat model. This is why it's crucial to think about this often and reassess as necessary. It is not a one-time activity but rather a mindset and a set of practices that should be integrated into daily operations.
To learn more about OPSEC in terms of OSINT, check out this webcast from Matt Edmonson: Best Practices and Lessons Learned from Starting Up OSINT Teams.
Learn more about SANS' introductory OSINT course: SEC497 Practical Open-Source Intelligence (OSINT).
Ritu Gill is an Intelligence Analyst with 15 years of experience working with Canadian law enforcement, 12 of those years were with the Royal Canadian Mounted Police (RCMP). Her specialties include investigations and open-source intelligence (OSINT).
Read more about Ritu Gill