Open Source Intelligence (33)

Circumventing LinkedIn Login Prompt for Anonymous OSINT

As discussed in a previous article, while doing a social media OSINT, LinkedIn is one of the places you want to research. Let’s say that you have a first and last name and access to Linkedin. Unfortunately, you can’t look up people on LinkedIn without an account. Is there a way to make OSINT research on LinkedIn without creating a covert account? In this blog page, we will learn how to bypass Linkedin’s credentialing requirements with Google’s mobile-friendly test.

Introduction to LinkedIn Social Media OSINT

LinkedIn is the most widely used business-related social networking site in the modern world. Before viewing any data, users must first register a free profile on the site. To search for a name, just type the target’s name into the search box and press the enter key. The target’s employer, location, profession, and photo should then appear on the search result. After locating the correct target, clicking the name will take you to that user’s profile. In this article, we’ll look at how to improve our Linkedin people search and how to fine-tune our covert OSINT account settings.

Reverse IP and Domain Lookup

You can use IP addresses to track people across several websites online. You may have IP addresses gathered via online research, email message, or internet connection. Using OSINT, we will explore various methods for obtaining a target’s IP address. We have already covered how to do a simple whois query in a previous blog article. This domain name lookup will provide IP addresses linked with the websites you’re investigating.

Find the Business Information You Need With OSINT Tools

The majority of company paperwork/records are stored in databases. To obtain a result, you must query a database for a search phrase. Despite the fact that there is no one specific mechanism for searching this data. One county may handle the requests quite differently than another, and company records range from state to state. Aside from domestic databases, there are additional commercial options for locating company information. The majority of services offer complete or at least basic details freely. This blog article will look at various free programs that can give you documentation pertaining to a business.

Domain Name Lookup: Your Pivot Point for OSINT Research

During OSINT research, any data that you might use as a pivot point is valuable. As we already know, we can locate websites at certain addresses (which are also known as domains). Domain name research gives additional information on our point of interest. In this blog post, we will learn what is a whois lookup, what type of valuable information we can get from them, and how we can perform a basic whois lookup with the ICANN lookup tool.

Examples of Open Source and Closed Source Data

Open-source intelligence (OSINT) is gathered from publicly accessible data. As you might expect, OSINT entails having quick access to data kept on the internet as well as in other crowded places. In contrast to OSINT, closed source intelligence (CSINT) is information obtained from sources that are not open to the public. In this blog paper, we will examine various examples of open and closed data sources.

OSINT Intelligence Cycle

The intelligence cycle is a concept that depicts the act of converting or developing raw data and information into intelligence in a meaningful way. There are several techniques or methodologies for acquiring OSINT. However, the common structure we will cover in this blog article is one of the most recognized intelligence cycle methodologies. Before delving into each phase, we should discuss the significance of the hypotheses briefly.

Shodan Basic Searches: Find Devices and Vulnerabilities

Shodan, as we discovered in the introduction to the shodan blog page, operates servers across the world that scan Internet-connected devices and collect the banner to determine what systems are operating on the server. These Internet-connected devices will generate various banners based on the services they are running. Shodan servers produce a random IP address to crawl, as well as a random port to verify and validate the random IP and port. The banner information, IP, and port data are all indexed and accessible which makes it a useful tool for an OSINT investigator. Upon finishing the blog post you will be ready to use Shodan in your research. Let’s start learning!

Username Search Tools: Making Online Research Easier

Once you find an email address, you may now have the target’s username. Username details might connect to a lot more information during OSINT research since a particular username may be used as a login credential on other platforms. You can perform a manual search initially. However, it is hard to keep up with a ton of websites. At this point, you may need some tools to facilitate your research. In this blog post, we will take a look at five username search tools you can benefit from in OSINT operations.

Advanced People Search to Get the Most Complete Picture: Top 5 Tools for People OSINT

There are a few tools that can help you do an advanced people search and get the most complete picture possible. Each of these websites has different features and capabilities, so be sure to check them out and see which one is the best fit for your needs. Here are the top 5 tools for people OSINT…

Top 5 Tools for Hunting Breached Passwords

This blog post focuses on various tools that help you find out the password of a breached email address.

Identifying Breached Emails with Have I been Pwned

Once we acquire an email account during an OSINT research one of the first things is to find out if it is dumped before. If it is, we can get valuable intelligence about our target. In this blog post, we are going to learn how we can find out if an email address is breached/leaked before.

Make Email Address Enumeration Easier with Hunter

During your OSINT research, you’ll frequently need to locate the email addresses of your subject. You‘ll also need to identify a company’s email address syntax. How does the company formats the email addresses of its employees? In this blog post, we are going to perform a basic email OSINT with hunter to address these questions.

Top 5 Tools to Use for Email OSINT

There are several methods for locating someone’s email address on the web such as looking at their about page, going through their social media accounts, and so on. However, these manual approaches may be unreliable too time-consuming. That’s why you may need some tools to address this problem. This blog will describe what email OSINT is and what tools and methods are available to gather the email addresses of your target business or individual.

Performing Reverse Image Searches

In our previous blog post, we made an introduction to reverse image search. On this blog page, we will perform a reverse image search of the following image on 3 platforms which are TinEye, Yandex, and Google image search, and will take a look at the results.

OSINT Performing Mindset

In this blog article, we will go through the fundamental phases of OSINT research.

Introduction to Shodan

Shodan (which is an abbreviation of Sentient Hyper-Optimized Data Access Network) is a smart search engine that excels in discovering where Internet-connected devices are placed and who is utilizing them. Shodan gathers information primarily over the following ports: HTTP, FTP, SSH, Telnet), and SNMP. Shodan enables both consumers and businesses to safeguard their IoT devices by determining which ones are susceptible to external attacks or configuration issues. This search engine may be used to discover information on live IoT devices all across the world. In this blog post, we will explore Shodan and take a look at various search terms.

Introduction to Google Dorking

Search engines are the primary source of information on the Internet, search engines can be crucial in providing Key Information about a target organization. Search engines have automated scanners known as crawlers, which crawl any active website on the internet and append the information retrieved to the search engine index. When a user enters a query the search engine index returns a list of pages. Many search engines out there allow advanced search options in which the user can extract target-specific information such as login pages and Organization details.

Top 5 Reverse Image Search Tools

A reverse image search feeds a picture to a search engine for analysis, whereas a conventional internet search includes typing words into a search engine for relevant results. It operates by uploading a picture or entering its URL into a reverse image search engine, which will check its database for additional areas where such an image exists online and show all of them. Thus, you can determine the source of images. The findings may differ based on the website you chose. In this blog post, we will take a look at the top 5 tools that you can use for reverse image search.

OSINT sources and tools: The Internet Archive and The Wayback Machine

The Wayback Machine is a free online digital archive of the internet. The archive was created in 1996 and launched in 2001 by the Californian non-profit organization Internet Archive. Internet Archive provides public access to various digitized materials for free. Apart from websites, their collection includes articles, books, images, software applications, games, music, videos, and much more. Currently, the Wayback Machine has more than 704 billion web pages archived.

Google Earth Historical Imagery

In this blog post, we will explore Google Earth Pro’s Historical Imagery feature.

Introduction to Google Earth

In this blog page, we will make an introduction to Google Earth Pro which is a great free online tool for conducting OSINT studies, especially when looking at time-series data.

Practicing Google Advanced Operators for OSINT

For years, investigators have used the internet, search engines, and social media to gather data that may be useful. Google Dorking is a valuable tool in open-source intelligence research, especially when looking for person-of-interest research. In a previous blog post, we made introductory practices to Google advanced operators for OSINT. In this blog post, we will continue exploring Google’s advanced search techniques.

Improving Search Results with Google Keywords

In this blog article, we will learn how to improve a basic search using Google keywords for improved results.

Digital Images: Exif Analysis

During an OSINT examination, images might provide valuable information about a target. In this blog article, we’ll look at what is EXIF data and how we can display it.Metadata includes descriptive (which is usually concealed) data about the file to which it belongs. The metadata of a file comprises the author’s name, file size, location, creation date/time, and notes.

What is Social Media OSINT?

In this blog post, we will make an introduction to social networks OSINT, and define what is SOCMINT. We will also discuss whether social media content is OSINT or not, and how social networks OSINT is valuable.

Top 5 OSINT Tools to Fact-check Social Media Content

This blog post will provide you with what is fact-checking and what are some tools that you can utilize in fact-checking social media content.

The Basics of Geolocation for OSINT

In this blog post, we are going to discuss the fundamentals of geospatial analysis so that you can have a better awareness while geolocating a target in OSINT research.

Hands-on with Google Maps: Performing Geospatial OSINT

This blog article will go through how to utilize Google Maps in detail with performing geolocating tasks.

OSINT Information Gathering Types

This blog page provides you with different types of OSINT collecting methods and emphasizes the importance of privacy during the open intelligence collection process.

The Advantages of Performing OSINT for Threat Intelligence

In this blog post, we will learn the various benefits of Open-Source Intelligence.

A Brief Introduction to OSINT

In this blog article, we will provide a brief overview of Open Source Intelligence (OSINT). Although we will explore thoroughly each section in future blog posts, upon completion of this blog page your questions will be answered such as:

Investigating Crypto Crimes: An Introduction

Illicit actors operating anonymously within the blockchain ecosystem have fostered newer methods of money laundering. There has been a gradual increase in ransomware attacks where cyber infiltrators get into your systems and block your access to the data and the system. Attackers then threaten to leak sensitive information to the public forum unless negotiated with a ransom. This ransom is paid using cryptocurrency, particularly Bitcoins!