background preloader

OSINT Framework

Related:  Veille & fact-checkOSINT

Google hacking From Wikipedia, the free encyclopedia Hacker technique Basics Devices connected to the Internet can be found. A search string such as inurl:"Mode=" will find public web cameras. History The list of Google Dorks grew into a large dictionary of queries, which were eventually organized into the original Google Hacking Database (GHDB) in 2004.[6][7] Google Dorking has been involved in some notorious cybercrime cases, such as the Bowman Avenue Dam hack[12] and the CIA breach where around 70% of its worldwide networks were compromised.[13] Star Kashman, a legal scholar, has been one of the first to study the legality of this technique.[14] Kashman argues that while Google Dorking is technically legal, it has often been used to carry out cybercrime and frequently leads to violations of the Computer Fraud and Abuse Act.[15] Her research has highlighted the legal and ethical implications of this technique, emphasizing the need for greater attention and regulation to be applied to its use. Protection

Who posted what? OSINT Search Tool by IntelTechniques | Open Source Intelligence Live Events Online Resources Blog Podcast Books Contact OSINT Tools - Recommendations List | Subliminal Hacking With the New Year fast approaching I thought now would be a great time to post the first draft of some recommended Open Source Intelligence (OSINT) gathering tools and resources. I will look to maintain this list overtime and have it grow, so if you come across something you think should be on the list, drop me an email or leave a comment for consideration. The reconnaissance phase of any engagement is very important and can often save you alot of time and of course money. If you are really lucky you may even find the information you are looking for freely available posted online. Either way the information you find will only be as good as the tools you use, so with this in mind here is the list based on tools I have come across over the years or have been recommended by other InfoSec peeps. * Please note even though the aim is to provide information for free OSINT Tools, some may require a subscription or commercial fee.

YouTube Metadata MW Metadata normal grabs singular details about a YouTube video and its uploader, playlist and its creator, or channel. Submit a link or id to a video, playlist, or channel Accepted formats Also accepts direct ids: video_id, playlist_id, channel_id Export & Share Save this result as a zip file or load from a previous export. Contains file(s) about.txt - Metadata about this result. video.json - Raw video data. playlist.json - Raw playlist data. channel.json - Raw channel data. filmot.json - Archive data if retrieved. Share this result: What happened to export? Video The video submitted. Reverse image search all four thumbnail images. Playlist Channel

Intelligence X The OSINT (Open Source Intelligence) & forensic tools on the left side help in investigations. These tools are free to use. Looking for discovery of email addresses, subdomains and URLs? Use our brand new free phonebook.cz. General Search Engines Important: Make sure that popups are allowed. Disclaimer: We are not responsible for any 3rd party services and their results. Validate Email Addresses Loading, please wait... Status: Ready Use this tool to check if a list of email addresses is valid. Email Lookup Domain Lookup IP Lookup Bitcoin Lookup Image Lookup & Analysis This tool allows you to perform a reverse-search and analysis of an image. Reverse Image Search Engines: Image Analysis Tools: Username Lookup Person Lookup by Full Name Telephone Number International Phone Number An international phone or fax number must include the country prefix without the + sign (for example CZ "420", US "1"). U.S Phone Number Location 2 Map File This tool allows you to search for files. Reverse Google Analytics ID Search

Batch geocoder for journalists tinfoleak | Free dossier of a twitter user 8. Cyberstalking tools for reconnaissance - Nine must-have OSINT tools searchSecurity.in Nine must-have OSINT tools 8. Cyberstalking tools for reconnaissance 9 of 10 Karthik Poojary Published: 24 Jul 2012 There are several websites and OSINT tools available online that can be used to find public information about a particular person. More from this story Back to top Latest News Email Alerts Register now to receive SearchSecurity.in-related news, tips and more, delivered to your inbox. By submitting your personal information, you agree to receive emails regarding relevant products and special offers from TechTarget and its partners. Ads by Google More from Related TechTarget Sites All Rights Reserved,Copyright 2009 - 2015, TechTarget

The Ultimate OSINT Collection Creating an Effective Sock Puppet for OSINT Investigations – Introduction – Jake Creps Introduction and Philosophy In recent light of the epic failure by Surefire Intelligence to frame Robert Mueller for sexual assault allegations, I feel it’s important to discuss and unpack how to make a good sock puppet for OSINT operations. If you aren’t familiar, just google Jacob Wohl or Surefire Intelligence and you will likely be flooded with information about the scandal. For further details on the unraveling of the socks Wohl made, check out Aric Toler’s threat on Twitter @arictoler from Bellingcat. Now, without further ado, let’s get started on constructing a sock puppet for OSINT investigations. The first thing you have to do is clearly define your intent. Option 2 is creating an avatar that’s focused around an idea rather than a unique identity. But enough on theory and philosophy. The Setup Depending on who you ask, there’s an endless list of things you can do to remain anonymous while conducting investigations online. Dedicated Computer Encrypted Email Phone Number Blog Bonus

’s Invitation Is Waiting For Your Response: An Investigative Guide To LinkedIn Whether you’re investigating a company purporting to have damning information on Robert Mueller or conducting research on anti-Islamic State foreign fighters in Iraq and Syria, LinkedIn can serve as a useful resource for online researchers across a wide variety of subjects. This guide aims to provide helpful tools and techniques for identifying LinkedIn profiles and for extracting information that will then allow you to pivot to other social media profiles belonging to the target. Some of the useful information you might glean from the social network for professionals include: Biographical details, including employment history, education and other affiliationsPersonal and work contact information Approximate locationProfile photoUsername Personal websiteEmployer’s websiteMembers of an individual’s social network Lock Your Profile Down Before beginning an investigation, there are a few steps you should take so that you can access as much content as possible and ensure your anonymity. Summary

Related:  Osint Generalapproved tools/linksOSINT - Open Source IntelligenceOutilsOSINT ResourcesMYOSINT - OSINT Frameworks & Resourcesbarbar33OSINT