Open-source intelligence (OSINT)
is intelligence collected from publicly available sources. In the
intelligence community (IC), the term “open” refers to overt, publicly
available sources (as opposed to covert or clandestine sources); it is
not related to open-source software or public intelligence.
OSINT includes all publicly accessible sources of information, such as:
– Media
– Web-based communities and user-generated content
– Observation and reporting
– Professional and academic (including grey literature)
– Deep Web – Information hidden from the Surface web currently estimated to represent the majority of content on the Web
OSINT is distinguished from research in that it applies the process
of intelligence to create tailored knowledge supportive of a specific
decision by a specific individual or group.
—
wikipedia
Google dorks to search in Facebook
–
Group Search:
site:facebook.com inurl:group (bofa | “bank of america”)
–
Group Wall Posts Search:
site:facebook.com inurl:wall (bofa | “bank of america”)
–
Pages Search:
site:facebook.com inurl:pages (bofa | “bank of america”)
–
Public Profiles:
allinurl: people “John Doe” site:facebook.com
Google dorks to search in MySpace
–
Profiles:
site:myspace.com inurl:profile (bofa | “bank of america”)
–
Blogs:
site:myspace.com inurl:blogs (bofa | “bank of america”)
–
Videos:
site:myspace.com inurl:vids (bofa | “bank of america”)
–
Jobs:
site:myspace.com inurl:jobs (bofa | “bank of america”)
Google dorks to search in LinkedIn
–
Public Profiles:
site:linkedin.com inurl:pub (bofa | “bank of america”)
–
Updated Profiles:
site:linkedin.com inurl:updates (bofa | “bank of america”)
–
Company Profiles:
site:linkedin.com inurl:companies (bofa | “bank of america”)
You can easily modify the above dorks to search in other social
networks or include more advanced search operators. With most social
networks if you want to find private information you need to login as a
user.
OSINT includes all publicly accessible sources of information, such as:
– Media
– Web-based communities and user-generated content
– Observation and reporting
– Professional and academic (including grey literature)
– Deep Web – Information hidden from the Surface web currently estimated to represent the majority of content on the Web
OSINT is distinguished from research in that it applies the process
of intelligence to create tailored knowledge supportive of a specific
decision by a specific individual or group.
—
wikipedia
Gather information and documents
Extract documents metadata
- exiftool
- metagoofil
- metadata-extractor
- Information gathering types
Passive
During passive information gathering you should never send any type of
traffic directly to the target. Passive I.G. allows the greatest amount
of anonymity.
Active
During active information gathering you are sending requests to remote
services and receiving responses based on the service type. This method
includes, but is not limited to: DNS zone transfers, DNS reverse lookup,
SMTP querying, SNMP enumeration, DNS bruteforcing, banner grabbing and
smtp bruteforcing.
Semi-passive
During semi-passive information gathering you generate, what would be
considered, normal traffic. You may contact the target but the requests
need to look like all of the traffic is being generated from normal
requests.
OSINT Part 2
securityblog.gr
Professional and business social networks
- Zoominfo
- Xing
- Linkedin
- Pipl
- Meettheboss
- Spoke
- searchbug
- entitycube
- EDGAR
People information
Image search
http://securityblog.gr/4046/osint-part-1/
Comentários
Postar um comentário