Osint: Romance Scams

Posted By: ELK1nG

Osint: Romance Scams
Published 5/2023
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
Language: English | Size: 1.05 GB | Duration: 1h 52m

How to avoid them

What you'll learn

osint

open source intelligence

dating

investigations

Requirements

none

Description

In this course we will be using OSINT (Open source intelligence) to examine social media and dating profiles in order to keep ourselves safe when dating and meeting people. The course is designed for all levels and no OSINT experience needed. We also will be using browser based software and simple techniques to help us determine if someone is being deceptive. Step by step instructions with the how and why is also given to help you understand what is being taught. The goal is to help you identify those scams, deceptive practices, and dangerous situations, hopefully before you wind up being hurt.  Meeting people is hard enough without wondering if the person we are talking to, and trying to meet is being deceptive. Let's take out some of the worry by doing our own research. Phishing emails, social engineering, reverse image checks, deepfake detections, geo location, Google maps, reverse phone lookups, voip numbers, and much much more.I have been in the IT and security field for over 22 years and have taught hacking, security and investigations to all different levels of people. I hope to see you in the course, and above all I hope you all stay safe out there. If you have any questions before taking the course, during or after, feel free to message me.

Overview

Section 1: Introduction

Lecture 1 Introduction

Lecture 2 Mistrust and emotional payload

Section 2: Scams

Lecture 3 Social engineering

Lecture 4 Sock puppets

Lecture 5 Over sharing

Lecture 6 Red flags

Lecture 7 Catfish

Lecture 8 Reporting and embarassment

Lecture 9 Financial scams

Lecture 10 Phishing emails

Section 3: Virus check

Lecture 11 virus total hybrid analysis and virus total

Section 4: Dating sites

Lecture 12 General dating sites

Lecture 13 Verified profiles

Section 5: Snapchat

Lecture 14 Fake Snaps

Section 6: Images

Lecture 15 Deep fakes and Gan detection

Lecture 16 Whats in a image

Section 7: Geo location

Lecture 17 Linkedin

Section 8: Reverse phone lookups

Lecture 18 Types of phones

Lecture 19 Phone and voip

Section 9: Internet archive

Lecture 20 The way back machine

Section 10: Canary tokens

Lecture 21 VPNs

Lecture 22 VPN and Proxy check

Section 11: Before you meet

Lecture 23 Before you meet

Section 12: In closing

Lecture 24 In closing

People dating and meeting people