Running Away from Security - Web App Vulnerabilities and OSINT Collide

Running Away from Security - Web App Vulnerabilities and OSINT Collide

via YouTube Direct link

What could someone do with it?

13 of 32

13 of 32

What could someone do with it?

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Running Away from Security - Web App Vulnerabilities and OSINT Collide

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 An Experiment
  3. 3 If anyone in the world knew...
  4. 4 Our Data on the Internet
  5. 5 Selling Our Data
  6. 6 It all started with some exercise
  7. 7 The issue is in the Numbers
  8. 8 Look at the page source
  9. 9 Responsible disclosure attempt
  10. 10 Strava Response
  11. 11 But how could I get the data?
  12. 12 Make 800,000+ requests for random activities
  13. 13 What could someone do with it?
  14. 14 OSINT in a Nutshell
  15. 15 Let's meet Sandra K. on Strava
  16. 16 Finding Sandra K.
  17. 17 What about other fitness sites?
  18. 18 Let's meet Janna on fitbit
  19. 19 Garmin's site
  20. 20 There is a Double Standard
  21. 21 Need to belong/be social
  22. 22 This is Trisha on fitbit
  23. 23 Trisha Recap
  24. 24 Putting it all together: Mind Map
  25. 25 Recon-ng: Profiler Module Search 190 sites per username x 3 names = 30secs
  26. 26 These apps aren't just for fitness!
  27. 27 What are these "patrols"?
  28. 28 Nature Preserve Patrol
  29. 29 Soft Drink Anyone?
  30. 30 The unexplainable
  31. 31 What is your OSINT profile?
  32. 32 Protect yourself.

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.