top of page

Talks from Recon 2023

11 Aug 2023

Keynote - Reshaping Reconnaissance: AI's Role in Open Source Intelligence

Matt Edmondson

Keynote - Reshaping Reconnaissance: AI's Role in Open Source Intelligence

12 Aug 2023

Azure AD recon with OSINT tools

Dr Nestori Syynimaa

Azure AD recon with OSINT tools

12 Aug 2023

Bugs, Bounties, & Breaches - Insider Tales from the Trenches

Jason Haddix + 4

Bugs, Bounties, & Breaches - Insider Tales from the Trenches

12 Aug 2023

Unlocking the Power of OWASP Amass: Introducing the Open Asset Model for Comprehensive Attack Surface Mapping

Jeff Foley

Unlocking the Power of OWASP Amass: Introducing the Open Asset Model for Comprehensive Attack Surface Mapping

12 Aug 2023

Easy EASM - the zero dollar attack surface management tool

Jason Haddix

Easy EASM - the zero dollar attack surface management tool

12 Aug 2023

I Am The Disinformation Campaign

MasterChen

I Am The Disinformation Campaign

12 Aug 2023

The Perils of Generative AI: Implications for Open Source Intelligence Research

Andy Dennis

The Perils of Generative AI: Implications for Open Source Intelligence Research

12 Aug 2023

How I Built Recon to Scale with Serverless Architecture

Gunnar Andrews (g0lden)

How I Built Recon to Scale with Serverless Architecture

12 Aug 2023

Riding with the Chollimas: Our 100-Day Quest to Identify a North Korean State-Sponsored Threat Actor

Mauro Eldritch

Riding with the Chollimas: Our 100-Day Quest to Identify a North Korean State-Sponsored Threat Actor

12 Aug 2023

OSINT Privacy Unmasked: Taking Control of Your Digital Footprint in a Hyper-Connected World

Zoey Selman (aka V3rbaal)

OSINT Privacy Unmasked: Taking Control of Your Digital Footprint in a Hyper-Connected World

12 Aug 2023

Finding Hidden Gems In Temporary Mail Services

Berk Can Geyikci

Finding Hidden Gems In Temporary Mail Services

11 Aug 2023

Crushing crumbs of information to eat a whole cake.

Felipe Pr0teus

Crushing crumbs of information to eat a whole cake.

11 Aug 2023

Getting ahead of the bad guys with Internet Scanning data.

Vitor Ventura

Getting ahead of the bad guys with Internet Scanning data.

11 Aug 2023

Bug Bounty Recon - Bypassing Geographic DNS with Ensemble

Anthony Russell

Bug Bounty Recon - Bypassing Geographic DNS with Ensemble

11 Aug 2023

Nosy Cops: Exposing the Hidden Potential of Police Radio

sally, who makes yachts

Nosy Cops: Exposing the Hidden Potential of Police Radio

11 Aug 2023

Mastering OSINT: Advanced Techniques in the Realm of Big Data

Seyfullah

Mastering OSINT: Advanced Techniques in the Realm of Big Data

11 Aug 2023

How I Found Your Password, and Other Advanced Data Hoarding Techniques

M4x 5yn74x

How I Found Your Password, and Other Advanced Data Hoarding Techniques

11 Aug 2023

Leakonomics 101: The Last Year in Data Leaks

Nick Ascoli

Leakonomics 101: The Last Year in Data Leaks

11 Aug 2023

Oh! The OSINT You Can Do!

Joe Gray

Oh! The OSINT You Can Do!

11 Aug 2023

Oh The Places You'll Guo: Using Media Variants to Trace the Organization and Behavior of an Coordinated Inauthentic Influence Operation

Patrick Warren

Oh The Places You'll Guo: Using Media Variants to Trace the Organization and Behavior of an Coordinated Inauthentic Influence Operation
bottom of page