background preloader

OSINT Tools - Recommendations List

OSINT Tools - Recommendations List
With the New Year fast approaching I thought now would be a great time to post the first draft of some recommended Open Source Intelligence (OSINT) gathering tools and resources. I will look to maintain this list overtime and have it grow, so if you come across something you think should be on the list, drop me an email or leave a comment for consideration. The reconnaissance phase of any engagement is very important and can often save you alot of time and of course money. If you are really lucky you may even find the information you are looking for freely available posted online. Either way the information you find will only be as good as the tools you use, so with this in mind here is the list based on tools I have come across over the years or have been recommended by other InfoSec peeps. * Please note even though the aim is to provide information for free OSINT Tools, some may require a subscription or commercial fee. Related:  OSINT

Free People Search Engines & People Finder. Find People Free, Locate People and Search People Free. Person Search, Locator, Finder and Searches Online. 8. Cyberstalking tools for reconnaissance - Nine must-have OSINT tools searchSecurity.in Nine must-have OSINT tools 8. Cyberstalking tools for reconnaissance 9 of 10 Karthik Poojary Published: 24 Jul 2012 There are several websites and OSINT tools available online that can be used to find public information about a particular person. More from this story Back to top Latest News Email Alerts Register now to receive SearchSecurity.in-related news, tips and more, delivered to your inbox. By submitting your personal information, you agree to receive emails regarding relevant products and special offers from TechTarget and its partners. Ads by Google More from Related TechTarget Sites All Rights Reserved,Copyright 2009 - 2015, TechTarget

Deep Web Research and Discovery Resources 2013 Bots, Blogs and News Aggregators ( is a keynote presentation that I have been delivering over the last several years, and much of my information comes from the extensive research that I have completed over the years into the "invisible" or what I like to call the "deep" web. The Deep Web covers somewhere in the vicinity of 1 trillion plus pages of information located through the world wide web in various files and formats that the current search engines on the Internet either cannot find or have difficulty accessing. The current search engines find hundreds of billions of pages at the present time of this writing. This report constantly updated at . In the last several years, some of the more comprehensive search engines have written algorithms to search the deeper portions of the world wide web by attempting to find files such as .pdf, .doc, .xls, ppt, .ps. and others. Annotation for the Deep Web

The Internet Scanner: ZMap The Internet Scanner: ZMap ZMap is an open-source network scanner that enables researchers to easily perform Internet-wide network studies. With a single machine and a well provisioned network uplink, ZMap is capable of performing a complete scan of the IPv4 address space in under 45 minutes, approaching the theoretical limit of gigabit Ethernet. With a 10gigE connection and PF_RING, ZMap can scan the IPv4 address space in under 5 minutes. While previous network tools have been designed to scan small network segments, ZMap is specifically architected to scan the entire address space. It is built in a modular manner in order to allow incorporation with other network survey tools. ZMap v2.1.0-RC1 Released ZMap can be used to study protocol adoption over time, monitor service availability, and help us better understand large systems distributed across the Internet. Scanning Best Practices By default, ZMap will perform a TCP SYN scan on the specified port at the maximum rate possible.

OSINT Resources - The Grey Network Why: This site is a guide to resources for finding information on the internet and some tools that allow it to be aggregated and interpreted into actionable intelligence. It is a link to search tools to find information. What: This site has information on Open source data sources. Some open source data may be contained in proprietary search tools. The aggregation of available data can be used to paint a picture of a company, a government or how a criminal network operates. . Where: did this site come from? Who: I decided to share my sources once in a more public forum instead of many time individually. Any opinions expressed on this site are mine. I would like to get any reviews of these search tools or better comments about their capabilities. Definition: Open Source Intelligence is the process of aggregating information on a subject that is available from publicly available sources, either paid or free, but primarily ones available on the internet. $ = Fee based. L= Linux based Trackle .

OSINT (Open-Source Intelligence) With an estimated 80% of required information available for use in an open source for specific information vital for a deep analysis in newspapers, magazines, industry newsletters, television transcripts, and blogs. OSINT makes our work easier, by using OSINT we are able to get important information in just a couple of minutes. Ethical Hacking Training – Resources (InfoSec) OSINT (Open-Source Intelligence) helps us to find, select and acquire information from available public sources. It’s a myth that OSINT is an Open Source Software like nmap. OSINT is unclassified and available, but link-crawling search engines like Google do not always access it. Today it’s common to see corporations using OSINT but perhaps calling it “Competitive Intelligence”. Open Sources of Information: Sources from where we can collect information (seen below): Open Source Information Transition 1455 to 2008 Elements of OSINT The OSINT process includes four key elements: What OSINT can do? ● Email addresses ● OS info

99 Resources To Research & Mine The Invisible Web College researchers often need more than Google and Wikipedia to get the job done. To find what you're looking for, it may be necessary to tap into the invisible web, the sites that don't get indexed by broad search engines. The following resources were designed to help you do just that, offering specialized search engines, directories, and more places to find the complex and obscure. Search Engines Whether you're looking for specific science research or business data, these search engines will point you in the right direction. Turbo10: On Turbo10, you'll be able to search more than 800 deep web search engines at a time. Databases Tap into these databases to access government information, business data, demographics, and beyond. GPOAccess: If you're looking for US government information, tap into this tool that searches multiple databases at a time. Catalogs If you're looking for something specific, but just don't know where to find it, these catalogs will offer some assistance. Directories

Best pCap Tools In the field of computer network administration, pcap (packet capture) consists of an application programming interface (API) for capturing network traffic. Unix-like systems implement pcap in the libpcap library; Windows uses a port of libpcap known as WinPcap. Monitoring software may use libpcap and/or WinPcap to capture packets travelling over a network and, in newer versions, to transmit packets on a network at the link layer, as well as to get a list of network interfaces for possible use with libpcap or WinPcap.The pcap API is written in C, so other languages such as Java, .NET languages, and scripting languages generally use a wrapper; no such wrappers are provided by libpcap or WinPcap itself. The MIME type for the file format created and read by libpcap and WinPcap is application/vnd.tcpdump.pcap. Nload Nload is a commandline tool that allows users to monitor the incoming and outgoing traffic separately.

List of People search engines This is a list of articles about search engines, including web search engines, selection-based search engines, metasearch engines, desktop search tools, and web portals and vertical market websites that have a search facility for online databases. By content/topic General P2P search engines Geographically limited scope Semantic Accountancy IFACnet Business Computers Enterprise Funnelback: Funnelback SearchJumper 2.0: Universal search powered by Enterprise bookmarkingOracle Corporation: Secure Enterprise Search 10gQ-Sensei: Q-Sensei EnterpriseTeraText: TeraText Suite Fashion Fashion Net Food/Recipes Genealogy Mocavo.com: family history search engine Mobile/Handheld Job Legal Medical News People Real estate / property Television TV Genius Video Games Wazap (Japan) By information type Search engines dedicated to a specific kind of information Forum Omgili Blog Multimedia Source code BitTorrent Cloud Search engines listed below find various types of files that have been stored in the cloud and made publicly available. Email

Network Intelligence Gathering This article is all about different information-gathering techniques on the network. It is the most essential and important task of attackers. Knowing the opponents and their interests can be valuable. Here I am going to show you which are the different ways and techniques one can do the network information/intelligence gathering. Let’s think of any thrilling movie theft. What do robbers do before they break into the bank or anything else? The same scenario can also be applied in the information security world. The map below shows the juicy areas in which attackers might be interested. Before starting to footprint anything, we need to keep in mind what or who our target is. Techniques of Intelligence Gathering Information Available in Air There is much information that is publicly available, but no one knows about it. In older days, Company Webpages used to provide valuable information about their security policy and configuration directly to the client side. Want to learn more?? Summary

Open-Source Intelligence : Collection Search Strategies, Techniques & Tools – Analyzing – Reporting & Presenting Results Open-Source Intelligence Now Avaliable Collection Search Strategies, Techniques & Tools – Analyzing – Reporting & Presenting Results For Law Enforcement, Security Professionals and Public Safety Officials Intelligence Best Practices Training for Government - Government Support Contractors - Corporations - Banks This course is available for On-Site Training . We will bring this course to your agency or company. Contact Don Dickson, On-Site Training Manager at (301) 455-5633 or Don.Dickson@GovernmentTrainingInc.com About this course Acquiring open source intelligence (OSINT) requires more than just an ability to use the Internet. This course provides a five step process developed over ten years and augmented by tips, hints, checklists, examples and case studies that will lead the student to information once considered unavailable and unreachable. Shown below is an evaluation by several members of a Federal Agency Intelligence Unit attending our Open Source Training Course. Q 5. Q 6. Q 7. Ms.

Related: