0% found this document useful (0 votes)
126 views

SANS_CD_OSINT_POSTER_v1

Uploaded by

iop123
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
126 views

SANS_CD_OSINT_POSTER_v1

Uploaded by

iop123
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

IPV4 and IPv6 Address

OSINT
IPv4 addresses were deployed in 1981 and have 4.3 billion possible addresses.
40.112.72.205
IPv6 addresses were deployed in 1998 and have 340 undecillion possible addresses.
2001:4998:0024:120d:0000:0000:0001:0001
2001:4998:24:120d::1:1
Note: IPv6 addresses are so long, there are rules for shortening them!
P O S T E R The two IPv6 addresses above are actually the same address, the bottom adddress just had any leading zeros removed.

Sites to Research IP Addresses Internal IP Addresses


• M
 axmind.com – Maxmind provides free information about IP addresses, These internal IP addresses are usually of
including the ISP and city-level geolocation accuracy. The premium data little interest to OSINT investigators:
includes user type (cellular, residential, business, etc.). • 10.X.X.X
• I
 PQualityScore.com – IPQS provides 5,000 free lookups a month as well as • 172.16.X.X-172.31.X.X
information on ISP, city-level accuracy, proxy/VPN/Tor status, etc.
• 192.168.X.X-192.168.X.X
• I
 KnowWhatYouDownload.com – I KNOW allows you to see any peer-to-peer
(P2P) file sharing activity from an IP address. • 127.0.0.1 (localhost)

• S
 hodan.io – Shodan is a technology-focused search engine that allows you
to see what services are running on a system and other detailed information.
• S
 earch.Censys.io – Censys is a technology-focused search engine that allows you to see what services are running on a
system and other detailed information on known vulnerabilities and SSL certificates.
sans.org/cyber-defense • G
 reynoise.io – GreyNoise catalogs traffic flowing across the internet, allowing you to determine if activity from an IP address is
Poster Created by Matt Edmondson. ©2024 SANS Institute. All Rights Reserved. targeted towards a specific group or indiscriminately scanning the internet.
CD_OSINT_v1.1_0724
• A
 buseIPDB.com – AbuseIPDB is a central repository for reporting IP addresses that have been associated with malicious
online activity.

OPERATOR FUNCTION EXAMPLE


“[term]”
[term] OR [term]
Search exact phrase in quotes
Search for either term
“HGTV Shows”
tv OR streaming
Shodan Search Syntax
[term] AROUND(n) [term] Search for a term within n words of another term stream AROUND(5) “HGTV Shows” • city:"[city name]" – Searches for devices in a specific city

@[term] Search social media for a handle @hgtv • country:"[country code]" – Searches for devices in a specific country

-[term] Exclude a term “fixer upper” “stream” –HGTV • hostname:"[hostname]" – Searches for devices with a specific hostname

filetype:[type] Only show results with a certain file type, such as xlsx or pdf site:hgtv.com filetype:pdf • net:"[IP range]" – Searches for devices within a specific IP range

Group operations together to control how a • os:"[operating system]" – Searches for devices with a specific operating system
([operations]) site:gov wifi (password OR key)
complex search executes • port:"[port number]" – Searches for devices with a specific port
site:gov • org:"[organization name]" – Searches for devices associated with a specific organization
site: Limit results to a specific site or class of site
site:example.com
• isp:"[internet service provider]" – Searches for devices using a specific internet service provider
intitle:[term] Search for one term in the title of a page intitle:hgtv | site:hgtv.com
• product:"[product name]" – Searches for devices that are using a specific software or hardware product
Search for all of the terms that follow the : in the
allintitle:[term] allintitle:bbc news | site:bbc.com • version:"[version number]" – Searches for devices running a specific version of software or firmware
title of the HTML page
inurl:[term] Find sites with one term in URL inurl:magnolia | site:magnolia.com • has_screenshot:"true" – Searches for devices with available screenshots

inurl:magnolia table • ssl.cert.subject.cn:"[common name]" – Searches for SSL certificates with a specific common name
allinurl:[term] Find sites with multiple terms in URL
site:magnolia.com • http.title:"[title text]" – Searches for web pages with a specific title
intext:[term] Search for occurrences of a term in website text intext:waco | site:magnolia.com • http.html:"[html content]" – Searches for web pages containing specific HTML content
allintext:silo shops • before:"[date]" | after:"[date]" – Searches for devices that were online before or after a specific date
allintext:[term] Search for occurrences of multiple terms in website text
site:magnolia.com
• product:"[product name]" – Searches for devices running a specific product
Find pages that link to a page, but doesn’t seem to link:www.magnolia.com
link:[url] • version:"[version]" – Searches for devices with a specific version number
work consistently site:www.magnolia.com
before:[Date] Find results before or after a specific date or year, • webcam – Searches for internet-connected webcams
before:2020 after:2015-7
after:[Date] or in between a specific date range
[n]..[n] Put .. between two numbers to search a range (not super accurate) nikon $300..$500 Example Shodan Searches
• "default password" – Searches for devices using default passwords
• 
"MongoDB Server Information" port:27017 -authentication – Finds exposed MongoDB databases
• "in-tank inventory" port:10001 – Finds gas station pump controllers

Useful Google Alerts Censys Host Search Syntax


Example Alerts for Force Protection/Situational Awareness
 ingle IP (supports IPv4 and IPv6) – 8.8.8.8
• S
• (hancock) AND (john OR sally OR kevin) AND ("123 main st" OR 530-555-1212 OR 520-555-1212)
 ubnet by CIDR – ip: "­8.0.0.0/­8"
• S
• ([email protected]) AND ("123 main st" OR 530-555-1212 OR 520-555-1212)
 ubnet by IP range – ip: [1.12.0.0 to 1.15.2­
• S 55.255]
Example Alerts for Brand/Reputation Monitoring  y TLD—dns.names – "*.su"
• B
• ("Globex Industries") AND ("scandal" OR "fraud" OR "hate" OR “terrible” OR “scam”)  utonomous System Number (ASN) – autonomous_system.asn:6167
• A
• ("Wonka Industries") AND ("food safety violation" OR "product contamination" OR "factory shutdown")  ingle port – services.port:80
• S
• ("Pied Piper") AND ("patent infringement" OR "intellectual property theft" OR "copyright violation")  ny of these ports – services.port:{22,80,443}
• A
Example Alerts for Cybersecurity Awareness  ervice – services.service_name:SSH
• S
• ("Acme Corporation" OR acmecorp.com) AND ("vulnerability" OR "exploit" OR "zero-day")  abels – labels: c2
• L
• ("industry sector") AND ("cyber attack" OR "data breach" OR "security incident")  ther label options include – ics, login-page and open-dir
• O
• ("supply chain" OR "third-party vendor") AND ("cyber risk" OR "data breach" OR "security vulnerability")

Censys Certificate Search Syntax


Useful OSINT APIs  elf-signed certificates for a domain – (cellebrite.com) and labels=`self-signed`
• S
• Grayhatwarfare.com – Grayhat Warfare monitors for exposed data in cloud buckets.  ertificates issued by a specific organization – parsed.issuer.organization=`Internet Widgits Pty Ltd`
• C
• PeopleDataLabs.com – People Data Labs allows you to search by email address, phone number, name, etc., and retrieve records. Example Censys Searches
• IPQualityScore.com – IPQS allows 5,000 lookups a month for IP addresses, email addresses, etc.  oombas – services.tls.certificates.leaf_data.issuer.common_name: "Roomba CA"
• R
• Shodan.io – Shodan searches for devices connected to the internet, including servers, webcams, and IoT devices.  rute Ratel servers – services.http.response.body_hash="sha1:1a279f5df4103743b823ec2a6a08436fdf63fe30"
• B
• I CS Protocols – services.service_name: {BACNET, CODESYS, EIP, FINS, FOX, IEC60870_5_104, S7, MODBUS}

AI Resources for OSINT SANS OSINT Training Courses


• C
 hatGPT – ChatGPT is a large language model (LLM) useful SEC497: P ractical Open-Source SEC587: Advanced Open-Source Intelligence
for helping with writing Python code, analyzing code, Intelligence (OSINT) (OSINT) Gathering and Analysis
writing reports, generating biographical information for
SEC497 is based on two decades of experience with OSINT With OSINT being the engine of most major investigations
sock puppet accounts, and more.
research and investigations supporting law enforcement, in this digital age, the need for a more advanced course was
intelligence operations, and a variety of private sector businesses inevitable. The data in almost every OSINT investigation
• C
 laude AI – Claude AI is a LLM similar to ChatGPT but with becomes more complex to collect, exploit, and analyze.
ranging from small start-ups to Fortune 100 companies. The goal
an emphasis on writing quality content. is to provide practical, real-world tools and techniques to help To address this reality, OSINT practitioners must be able
individuals perform OSINT research safely and effectively. One to perform OSINT at scale and possess the means and
• W
 hisper – Whisper is a transcription engine which of the most dynamic aspects of working with professionals from methods to check and report on the reliability of their
generates text output from audio/video files. It different industries worldwide is getting to see their problems analysis. In SEC587 you will learn how to perform advanced
automatically detects what language is being used in and working with them to help solve those problems. SEC497 OSINT gathering and analysis as well as understand and
draws on lessons learned over the years in OSINT to help others. use common programming languages such as JSON and
the video and can be utilized offline. It is capable of
The course not only covers critical OSINT tools and techniques, it Python. SEC587 also will go into dark web and financial
translating the text and the generated text files can be also provides real-world examples of how they have been used (cryptocurrency) topics as well as disinformation, advanced
used as subtitles when playing the source video. to solve a problem or further an investigation. Hands-on labs image, and video OSINT analysis. This is an advanced, fast-
based on actual scenarios provide students with the opportunity paced course that will give seasoned OSINT investigators new
• F ace Swap – Face Swap is an artificial intelligence (AI) to practice the skills they learn and understand how those skills techniques and methodologies and entry-level OSINT analysts
model capable of morphing multiple profile pictures to can help in their research. SEC497 includes 29 hands-on labs and that extra depth in finding, collecting, and analyzing data
generate a “fake” profile picture that appears real. a Capstone Capture-the-Flag event. sources from all around the world.
GIAC Certification: GIAC Open Source Intelligence (GOSI)
• C
 oncierge – Concierge is an open-source LLM which is
able to run on low-powered hardware and ingest new
Blueprint Podcast Blog Blue Team GitHub
information to incorporate into its analysis via retrieval- sans.org/blueprint sans.org/blog github.com/sans-blue-team
augmented generation (RAG).
Webcasts OSINT Community Videos
sans.org/webcasts sansurl.com/osint youtube.com/@SANSCyberDefense
Command Line Kung Fu Discord
A Discord server is a community space where users can chat, share media, and participate in various activities. Servers are
View the contents of a file Find out how many lines contain that term divided into text channels (for chat) and voice channels (for voice communication). There are both public and private servers.
• Linux – cat file.txt • Linux – cat file.txt | grep -I sans | wc -l Public servers are open to anyone and often focused on specific topics or interests. Private servers require an invitation to
join and are usually for more exclusive or private groups. To find servers, use the “Explore Public Servers” option to search by
• Windows – type file.txt • Windows – type file.txt | findstr -I sans | find /c /v “”
category or interest. Here are some sample Google dorks to find discord content.

Limit results to a line that contains a specific term Send the selected output to a new file QUERY EXPLANATION
• Linux – cat file.txt | grep -I sans • Linux – cat file.txt | grep -I sans > new_file.txt Searches for pages that contain Discord invite links from the primary domain used
site:discord.gg
• Windows – type file.txt | findstr -I sans • Windows – type file.txt | findstr -I sans > new_file.txt for Discord invites
site:discord.gg
 Adds specific keywords related to the topic or interest (e.g., “gaming community”) to
“gaming community” find relevant servers

Dark Web Resources on the Internet Looks for PDF documents containing Discord invite links—can also use filetype:txt,
filetype:pdf “discord invite”
filetype:doc, etc.
• ahmia.fi – Fantastic (and free) dark web search engine site:reddit.com “discord.gg”
 Combines keywords with site-specific searches to find Discord invites posted on
“cybersecurity” Reddit, which often shares server invites
• Tor.taxi – Trusted directory of sites on the dark web
inurl:discord.gg
Uses the inurl operator to search for URLs that contain specific text such as
• Tor.link – Directory of sites on the dark web “music community” “discord.gg” combined with keywords
• Daunt.link – Trusted directory of sites on the dark web site:forum.example.com
 Targets specific forums (replace forum.example.com with the URL of the forum) to
• Torry.io – Dark web search engine “discord invite” find Discord invites

• h
 ttps://github.com/fastfire/deepdarkCTI – intitle:”discord invite”
Uses the intitle operator to search for pages with specific words in the title, useful
Incredible list of URLS for dark websites including: “technology” for finding blog posts or articles mentioning Discord invites

- Forums such as Dread, XSS, Exploit, etc. site:discord.com


Combines site and inurl operators with a specific keyword to narrow the search to
inurl:invite “art community” Discord’s own domain for invites related to art communities
- Ransomware blogs
site:twitter.com “discord.gg”
 Targets social media platforms where users share Discord invites by combining the
- Marketplaces
“book club” site operator with keywords
site:pastebin.com
 Pastebin and similar sites are often used to share collections of links and can be a
Tor Browser as a Proxy “discord.gg” source for Discord invites

When you start the Tor Browser, it automatically opens a proxy listener on port 9050 and/or 9150. Any application that can be site:facebook.com
 Targets specific community-driven platforms like Facebook to find groups that share
configured to use this proxy will have its traffic routed through Tor and will be able to access the dark web. “discord.gg” “fitness” Discord server links

This functionality has many uses including being able to use Chrome/Firefox etc. and their plugins to gather information from site:discord.gg “FPS gaming”
 Searches for pages containing Discord invites specifically mentioning “FPS gaming”
dark websites as well as add the ability to access the dark web with your Python code. site:reddit.com/r/cybersecurity

Targets the Reddit cybersecurity community for shared Discord invites
“discord.gg”

Detecting AI Content
filetype:txt “discord.gg”

Searches for text files containing Discord invites related to study groups
“study group”
intitle:”discord
 invite” Finds blog posts or articles with titles indicating they contain Discord invites related
As AI models become more sophisticated, detecting AI-generated content has become more challenging. “tech news” to tech news

METHOD DETAILS
AI-generated content often includes repetitive phrases, sentences, or ideas. This happens because
Look for repetitive
the model might generate similar outputs based on its training data. Identifying repetitive
Telegram
phrases and ideas.
patterns, especially unusual repetition, can be a strong indicator of machine-generated text. Telegram is a cloud-based instant messaging app that allows users to send messages, share media, and create groups and
AI might produce content with sudden changes in tone or style. For example, a paragraph might channels for broadcasting messages to large audiences. It is known for its focus on privacy, encryption, and speed. These
Check for inconsistent Telegram channels are often used by members of the criminal underground to exchange ideas and information such as breach
switch from formal to informal language abruptly. These inconsistencies occur because AI models
writing styles. data and information stealer logs. Additionally, they serve as marketplaces where illicit goods and services, including stolen
might pull from varied data sources, leading to a lack of uniformity in writing style.
credentials, hacking tools, and illegal substances, are bought and sold. Telegram has a built-in search functionality which can
AI models sometimes use words or phrases in ways that seem slightly off or uncommon. This help you find users and channels. You can also use Google dorks to help find Telegram content.
Identify odd word choices
can include the use of synonyms that don't fit the context perfectly or awkward sentence
or phrasing.
constructions that a native speaker wouldn't typically use. QUERY EXPLANATION
AI-generated text might lack the depth and nuance of human writing. While it can produce site:t.me
 Searches for pages that contain Telegram links from the t.me domain
Assess the depth of
coherent and informative content, it often misses the detailed insights, unique perspectives, or
content. Adds specific keywords related to the topic (e.g., “cybersecurity”) to find relevant
expert knowledge that a human writer would provide. site:t.me “cybersecurity”
Telegram links
AI-generated content can include inaccurate information. It's essential to cross-check facts
Looks for PDF documents containing Telegram invite links—can also use filetype:txt,
Verify factual accuracy. with reliable sources. AI may generate plausible-sounding but incorrect facts, especially when filetype:pdf “telegram invite”
filetype:doc, etc.
discussing niche or complex topics, making thorough verification critical.
site:reddit.com “telegram
 Combines keywords with site-specific searches to find Telegram invites posted on

Analyze sentence AI models may use more complex or unnatural sentence structures compared to human writers.
invite” “cybersecurity” Reddit, often shared in discussions
structure and linguistic Look for overly complex sentences, unusual grammar patterns, or repetitive sentence structures.
patterns. These linguistic anomalies can signal that the text is machine-generated. Uses the inurl operator to search for URLs that contain specific text, such as “t.me”,
inurl:t.me “trading group”
combined with keywords
Frequent, high-volume content posting without a corresponding number of human interactions
Monitor posting behavior. can be a sign of AI-generated content. Analyze the posting frequency and engagement metrics. AI- site:forum.example.com
 Targets specific forums (replace forum.example.com with the URL of the forum) to
generated posts might flood a platform with content at a rate that is impractical for human users. “telegram invite” find Telegram invites
AI-generated content might attract different engagement patterns compared to human content. intitle:”telegram invite”
Uses the intitle operator to search for pages with specific words in the title, useful
Examine user engagement
For instance, such content might receive fewer meaningful comments or generate engagement “cryptocurrency” for finding blog posts or articles mentioning Telegram invites
patterns.
that seems automated. Human users tend to engage in more nuanced and varied ways.
site:twitter.com “t.me”
 Targets social media platforms where users share Telegram invites by combining the
“book club” site operator with keywords
Specific Prompt Error Messages to Search For
Pastebin and similar sites are often used to share collections of links and can be a
site:pastebin.com “t.me”
• “As an AI language model” • “Cannot provide a phrase” source for Telegram invites
• “I'm sorry, I cannot generate” • “Violates OpenAI's content policy” site:facebook.com
 Targets specific community-driven platforms like Facebook to find groups that share
“telegram invite” “fitness” Telegram server links
• “Not a recognized word”
site:t.me “hacking group”
 Searches for pages containing Telegram invites specifically mentioning “hacking group”
site:reddit.com/r/OSINT


Resources for Researching Cryptocurrency Transactions


Targets the Reddit OSINT community for shared Telegram invites
“telegram invite”
filetype:txt
 “t.me” “study group” Searches for text files containing Telegram invites related to study groups
• B
 readcrumbs.app – Breadcrumbs provides attribution (Coinbase, Binance, etc.) on over 50 million Ethereum and intitle:”telegram
 channel” Finds blog posts or articles with titles indicating they contain Telegram invites
Bitcoin addresses. Breadcrumbs offers free plans and paid plans much cheaper than other solutions in the space. “tech news” related to tech news
• B
 lockchain.com – The blockchain.com explorer offers visibility into blockchains for Bitcoin, Bitcoin Cash, and

Business Research Resources


Ethereum.
• W
 alletexplorer.com – Wallet Explorer groups cryptocurrency addresses together by wallet ID. It can
help determine what site (dark web marketplace, cryptocurrency exchange, etc.) an address is tied to.
• T
 he Organized Crime and Corruption Reporting Project (OCCRP) • OpenCorporates
• Chainabuse.com – Chainabuse is a site where scam-related cryptocurrency addresses are reported and researched. The OCCRP provides an index of country specific resources for OpenCorporates crawls the web, aggregates corporate
researching businesses across the world. ownership information, and structures it for free public use.
• O
 penSanctions.com – OpenSanctions is an international database of persons and companies of political,
https://id.occrp.org/databases OpenCorporates.com
criminal, or economic interest. The site contains datasets from over 120 sources, some of which have
cryptocurrency wallet addresses for sanctioned individuals and/or groups. • T
 he UK’s Companies House • O
 pen Sanctions
In addition to UK coverage, the UK Companies House has a Open Sanctions is a free international database of persons
• A
 rkhamIntelligence.com – Arkham Intelligence is a site with a large amount of information on which
page listing several company registries from other countries. and companies of political, criminal, or economic interest
site/service a wallet address is tied to. It has its own cryptocurrency (ARKM) which it uses for an Intel
www.gov.uk/government/publications/overseas- that provides raw data from over 60 sources in downloadable
Exchange where users can post bounties for information and/or sets of information for sale. Common
registries/overseas-registries formats. OpenSanctions.org
listings include bounties to help identify the individuals behind cryptocurrency scams and users selling
lists of wallets tied to known investment firms to see where and when they move funds. • C
 hinese Business Registries • S
 EC EDGAR Database
Chinese Business Registries can provide details about Chinese www.sec.gov/edgar/search-and-access
companies including telephone numbers, email addresses, EDGAR is a database of corporate filings maintained by the

The Admiralty Code The Admiralty Code for Evaluating


the Credibility of Evidence
historical names, date of formation, legal representative,
shareholders, executives, officers, directors, Chinese Unified
Social Credit Score, and document filing history.
Securities Exchange Commission (SEC) that can be difficult to
search, but provides a wealth of information. Investigative journalist
organization Bellingcat recently released a Python tool that can
A1 B1 C1 D1 E1 F1
LIKELY VALIDITY OF THE CLAIM

The Admiralty Code (AKA NATO System) is a relatively Credible – Qcc.com & Qixin.com make aquiring information from EDGAR much easier. The tool is
simple scheme for categorizing evidence according to its A2 B2 C2 D2 E2 F2 accept
available here: https://github.com/bellingcat/EDGAR
credibility. It was initially used by the British Admiralty for A3 B3 C3 D3 E3 F3 Uncertain –
the assessment of evidence used in naval intelligence, but
A4 B4 C4 D4 E4 F4
Executive Summary (AKA Key Findings, Bottom Line Up Front (BLUF), etc.)
investigate/wait
it is now used in many police departments, intelligence
agencies, and defense-related organizations, including the A5 B5 C5 D5 E5 F5 Non-credible –
reject
U.S. Army. (U.S. Army Field Manual 2-22.3, 2006) A6 B1 C6 D6 E6 F6 Unfortunately, no matter how great a report is, some people know as well, but that’s often not the case. You likely have
EXPECTED RELIABILITY
OF THE SOURCE
will only spend a few minutes reviewing it. To make sure that we knowledge or context that others viewing the report may not,
convey the most importing findings to those individuals, we need so you need to convey that information where possible to help
THE SOURCE THE CONTENT an executive summary section at the beginning of our report. answer the “so what?” question.

 o doubt of authenticity,
N  onfirmed by other independent sources,
C Methodology Appendices
A Reliable trustworthiness, or competency, 1 Confirmed logical in itself, consistent with other One of the key components of digital forensics is that if two One of the most difficult parts of report writing is meeting
has a history of complete reliability information on the subject forensics practitioners receive the same evidence, analyze the needs of a majority of people who read your report. As a
 Minor doubt about authenticity,  Not confirmed, logical in itself, consistent with it, and reports their findings, they should both come to very general rule, shorter reports are preferred over large ones.
2 Probably true similar conclusions. OSINT is similar, and the methodology The executive summary meets the needs of those only spending
B Usually trustworthiness, or competency, other information on the subject
reliable has a history of valid information section is where you describe at a high level the methods used a few minutes with your report, while the main body of the
 ot confirmed, reasonably logical, agees with
N in your research and analysis. report meets the needs of someone spending a little more
most of the time 3 Possibly true
some other information on the subject time. But what about another OSINT practitioner who receives
 oubt of authenticity,
D Methodology helps others understand how something was
4 Doubtfully
 ot confirmed, possible but not logical, no other
N a task based off your report? The report you generate may be
C Fairly trustworthiness, or competency, accomplished so another practitioner can verify the results.
true information on the subject the end of the journey on that particular topic, but someone
reliable but had provided valid information When results are scarce, the methodology section is more else may receive that report and use it as the starting point
in the past  ot confirmed, not logical in itself, contradicted
N
5 Improbable important than ever to let others know what you tried. This not for their own research.
by other information on the subject only conveys how much effort you put into your research, but can
 ignificant doubt about
S
In the case of your report being a starting point, that individual
D Not usually authenticity, trustworthiness, or  Unintentionally false, not logical in itself, help others avoid wasting time trying the same techniques you did.
would likely appreciate more details, including some of the
reliable competency, but had provided 6 Misinformation contradicted by other information on the subject, Findings “raw” information, that anyone else reading the report would
valid information in the past confirmed by other independent sources
likely just gloss over. To help meet this goal, appendices are
The findings section likely represents the bulk of your report,
 acking authenticity,
L  Deliberately false, contradicted by other a fantastic tool. Raw output from tools or other sources that
and in addition to your writeup, it can include images,
E Unreliable trustworthiness, or competency, 7 Deception information on the subject, confirmed by other are summarized in your report can be placed in an appendix
screenshots, tables, etc.
has a history of invalid information independent sources and included as an attachment with your report. Having an
One of the most important things for an analyst to provide is executive summary, a concise report, and additional raw
F Cannot
 be No basis for evaluating the 
8 Cannot be No basis for evaluating the reliability
an explanation of why things are important. Analysts who focus information included as appendices can help ensure that your
judged reliability of the source judged of the source
on a particular area often believe that what they know, others report meets the diverse needs of all readers.

You might also like