Open-Source Intelligence (OSINT) Reconnaissance

Conversations in Social Media; image courtesy of Ethority, 2014
Phases of the OSINT Process; image courtesy of Chiheb Chebbi
  • Source Identification: as the starting point, in this initial phase the attacker identifies potential sources from which information may be gathered from. Sources are internally documented throughout the process in detailed notes to come back to later if necessary.
  • Data Harvesting: in this phase, the attacker collects and harvests information from the selected sources and other sources that are discovered throughout this phase.
  • Data Processing and Integration: during this phase, the attacker processes the harvested information for actionable intelligence by searching for information that may assist in enumeration.
  • Data Analysis: in this phase, the attacker performs data analysis of the processed information using OSINT analysis tools.
  • Results Delivery: in the final phase, OSINT analysis is complete and the findings are presented/reported to other members of the Red Team.

OSINT Tools

Google Searching & Dorking

List of simple Google Dorks; courtesy of Techworm

Whois

Using the WHOIS.net tool for website domain name OSINT
Using the WHOIS.icann.org tool for website domain name OSINT

Command Prompt

Using the tracert command in PowerShell to determine the website IP address
Onyphe IP address scan results

Spokeo

Spokeo people search engine

Shodan

Exploring the Shodan search engine

Datasploit

Datasploit OSINT tool; image courtesy of KitPloit

Maltego

The Maltego OSINT tool; image courtesy of Paterva.com

Social Media

Automater

Automater OSINT tool; image courtesy of SecuirtyOnline.com
Cornell Universityโ€™s arXiv.org for Deep Web OSINT
Using the OnionScan OSINT tool to scan the Dark Web; image courtesy of Mascherari.press

--

--

--

the salty chronicles of one bumbling infosec engineerโ€™s lifelong quest to design less shitty privacy & security while trying his best not to blow up the planet

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

FIVE(F5) Launches on CosoSwap NFT Launchpad

HacktheBox Writeup: Paper

OpenSea users based on information breach

Wisdom From The Women Leading The CyberSecurity Industry, With Sarah Wynn Of Maximus

One-stop Services Encrypted Bank Golff Raises $3 million

The 7 Layer Approach to Security

{UPDATE} Just Escape Hack Free Resources Generator

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
๊ง๐“Šˆ๐’†œ๐Ÿ†‰3๐Ÿ†๐Ÿ…พ๐Ÿ†ƒ๐Ÿ†๐Ÿ†„๐Ÿ†‚๐Ÿ†ƒ๐’†œ๐“Š‰๊ง‚

๊ง๐“Šˆ๐’†œ๐Ÿ†‰3๐Ÿ†๐Ÿ…พ๐Ÿ†ƒ๐Ÿ†๐Ÿ†„๐Ÿ†‚๐Ÿ†ƒ๐’†œ๐“Š‰๊ง‚

the salty chronicles of one bumbling infosec engineerโ€™s lifelong quest to design less shitty privacy & security while trying his best not to blow up the planet

More from Medium

OSINT โ€” Beginnerโ€™s Guide (Part 1)

Dark Web Scraping by OSINT - Scraping & Tools

Free applications and services for security specialistโ€ฆ