→ https://github.com/TCM-Course-Resources/Open-Source-Intellingence-Resources

OSINT is a multi-methods methodology for collecting, analyzing and making decisions about data accessible in publicy available sources to be used in an intellifence context.

Intelligence Lifecycle

  • Planning and Direction
  • Collection
  • Processing and Exploitation
  • Analysis and Production
  • Dissemination and Integration

Sock Puppets

The point of Sock puppet is to not draw attention to yourself. So, create fake accounts, fake credentials, fake identity. etc

Resources

Creating an Effective Sock Puppet for OSINT Investigations – Introduction: https://jakecreps.com/sock-puppets/

The Art Of The Sock: https://www.secjuice.com/the-art-of-the-sock-osint-humint/

Reddit - My process for setting up anonymous sockpuppet accounts: https://www.reddit.com/r/OSINT/comments/dp70jr/my_process_for_setting_up_anonymous_sockpuppet/

Fake Name Generator: https://www.fakenamegenerator.com/

This Person Does not Exist: https://www.thispersondoesnotexist.com/

Privacy.com: https://privacy.com/join/LADFC - *Referral link. We each get $5 credit on sign up.

Creating Sock Puppet

  1. Come up with a persona for the sockpuppet account
  2. Use fake name generator = ‘https://www.fakenamegenerator.com/’
  3. Use This Person does not exist to create a image in AI = ‘https://www.thispersondoesnotexist.com/’
  4. Get a burner phone, any brand that accept a mint mobile SIM card
  5. Get a burner credit card from = https://privacy.com/
  6. Set up amazon account.
  7. Buy two Mint Mobile SIM cards
  8. Send to an Amazon Pickup box, which can be anonymous
  9. Get a VPN that u can set to the physical area the same as your sockpuppet
  10. Set up the Mint Mobile trial account somewhere away from your home
  11. Use the Mint Mobile to set up all websites u need
  12. At least a google and protonmal account
  13. After that, set up all the accounts with your trial mint SIM, set up 2FA on all accounts
  14. After the 2FA, change the phone number to one you have more permanent access such as MySudo or Google Voice
  15. Make sure everything works
  16. Destroy the SIM card
  17. Wipe the phone.

Search Engine Operators

Google - https://www.google.com/

Google Advanced Search - https://www.google.com/advanced_search

Google Search Guide - http://www.googleguide.com/print/adv_op_ref.pdf

Bing - https://www.bing.com/

Bing Search Guide - https://www.bruceclay.com/blog/bing-google-advanced-search-operators/

Yandex - https://yandex.com/

DuckDuckGo - https://duckduckgo.com/

DuckDuckGo Search Guide - https://help.duckduckgo.com/duckduckgo-help-pages/results/syntax/

Baidu - http://www.baidu.com/

- intext:<term that shows inside a webpage>
- inurl:<term that shows in url>
- intitle:<term that show in title of articles>
- site:<example.com>
- filetype:pdf, docx, xlxs, etc
-  # <exclude some term of the search>
+ # <add some term to the search>
“” # <search specifics terms>

Image OSINT

Reverse Image Searching

Google Image Search: https://images.google.com

Yandex: https://yandex.com

TinEye: https://tineye.com

Viewing EXIF (exchangeable image file) Data

→ http://exif.regex.info/exif.cgi

Physical Location OSINT

Look at satelites images, street view

On site reconassaince with drones

Geographical Locations

GeoGuessr: https://www.geoguessr.com

GeoGuessr: The Top Tips, Tricks and Techniques

→ https://somerandomstuff1.wordpress.com/2019/02/08/geoguessr-the-top-tips-tricks-and-techniques/’

Email OSINT

Resources

Hunter.io: https://hunter.io/

Phonebook.cz; https://phonebook.cz/

VoilaNorbert: https://www.voilanorbert.com/

Email Hippo: https://tools.verifyemailaddress.io/

Email Checker: https://email-checker.net/validate

Clearbit Connect: https://chrome.google.com/webstore/detail/clearbit-connect-supercha/pmnhcgfcafcnkbengdcanjablaabjplo?hl=en

Same lesson:

Reconnaissance from PEH

Password OSINT

Hunting Breached Password

Dehashed: https://dehashed.com/

WeLeakInfo: https://weleakinfo.to/v2/

LeakCheck: https://leakcheck.io/

SnusBase: https://snusbase.com/

Scylla.sh: https://scylla.sh/

HaveIBeenPwned: https://haveibeenpwned.com/

Hunting Usernames and Accounts

NameChk: https://namechk.com/

WhatsMyName: https://whatsmyname.app/

NameCheckup: https://namecheckup.com/

Search for People

WhitePages: https://www.whitepages.com/

TruePeopleSearch: https://www.truepeoplesearch.com/

FastPeopleSearch: https://www.fastpeoplesearch.com/

FastBackgroundCheck: https://www.fastbackgroundcheck.com/

WebMii: https://webmii.com/

PeekYou: https://peekyou.com/

411: https://www.411.com/

Spokeo: https://www.spokeo.com/

That’sThem: https://thatsthem.com/

Voter Records: https://www.voterrecords.com

Phone Numbers:

TrueCaller: https://www.truecaller.com/

CallerID Test: https://calleridtest.com/

Infobel: https://infobel.com/

Discovering Birthdates:

google = “name or username” intext:”happy birthday” site:twitter, face, linkedin etc

Searching Resumes:

google = “name” resume site: linkedin.com

Social Media OSINT

Twitter

"" = specific terms
from:<user>
to:<user>
from:<user> since:<year-month-day> until:<Y-M-D>
geocode:<lat, lon, radius>
advanced search

Resources

Social Bearing - https://socialbearing.com/

Twitonomy - https://www.twitonomy.com/

Sleeping Time - http://sleepingtime.org/

Mentionmapp - https://mentionmapp.com/

Tweetbeaver - https://tweetbeaver.com/

Spoonbill.io - http://spoonbill.io/

Tinfoleak - https://tinfoleak.com/

TweetDeck - https://tweetdeck.com/

Facebook

Sowdust Github - https://sowdust.github.io/fb-search/

IntelligenceX Facebook Search - https://intelx.io/tools?tab=facebook

Instagram

Wopita - https://wopita.com/

Code of a Ninja - https://codeofaninja.com/tools/find-instagram-user-id/

InstaDP - https://www.instadp.com/

ImgInn - https://imginn.com/

Snapchat

Snapchat Maps - https://map.snapchat.com

Website OSINT

BuiltWith - https://builtwith.com/

Domain Dossier - https://centralops.net/co/

DNSlytics - https://dnslytics.com/reverse-ip

SpyOnWeb - https://spyonweb.com/

Virus Total - https://www.virustotal.com/

Visual Ping - https://visualping.io/

Back Link Watch - http://backlinkwatch.com/index.php

View DNS - https://viewdns.info/

Search for reverse ip lookup, whois, dns report, ip location finder, port scanner, etc

Subdomains

Pentest-Tools Subdomain Finder - https://pentest-tools.com/information-gathering/find-subdomains-of-domain#

Spyse - https://spyse.com/

crt.sh - https://crt.sh/

Extra

Shodan - https://shodan.io

city:<x>
port:<x>
org:<organization>

Wayback Machine - https://web.archive.org/

Hunting Businesses

Open Corporates - https://opencorporates.com/

AI HIT - https://www.aihitdata.com/

indeed - https://br.indeed.com/

  • Go to linkedin

search for:

information, location, etc
employes
badges

in google:

site:linkedin.com/in/ “* at company”

Wireless OSINT

WiGLE - https://wigle.net/

Lab building

VMWare Workstation Player - https://www.vmware.com/ca/products/workstation-player/workstation-player-evaluation.html

VirtualBox - https://www.virtualbox.org/wiki/Downloads

TraceLabs OSINT VM - https://www.tracelabs.org/initiatives/osint-vm

TraceLabs OSINT VM Installation Guide - https://download.tracelabs.org/Trace-Labs-OSINT-VM-Installation-Guide-v2.pdf

Working with Tools

Image and Location OSINT

apt install libimage-exiftool-perl

Emails and breachead Data

breach-parse - https://github.com/hmaverickadams/breach-parse

theHarvester -d tesla.com -b google -l 500

# -d = domain
# -b - source
# -l = length
./breach-parse.sh @tesla.com tesla.txt

h8mail -t shark@tesla.com -bc "/opt/breach-parse/BreachCompilation/" -sk

Username and Account OSINT

whatsmyname -u <username>

sherlock <username>

Phone Number OSINT

phoneinfoga scan -n 14082492815
phoneinfoga serve -p 8080

Social Media OSINT

pip3 install --upgrade -e git+https://github.com/twintproject/twint.git@origin/master#egg=twint
pip3 install --upgrade aiohttp_socks
  • Twint - https://github.com/twintproject/twint

Twint:

-u = user
-s = somethin the user specifically said
--year
--since "Y-M-D hour:min:sec"
--folowers
--following

Website OSINT

  • wappalyzer firefox extension
  • whatweb
whois <domain>

nano ~/.bashrc

export GOPATH=$HOME/go 
export GOROOT=/usr/lib/go
export PATH=$PATH:$GOROOT/bin:$GOPATH/bin

source ~/.bashrc
  • go get -u github.com/tomnomnom/httprobe
  • go get -u github.com/tomnomnom/assetfinder
  • GO111MODULE=on go get -u -v github.com/projectdiscovery/subfinder/v2/cmd/subfinder
  • go get -u github.com/sensepost/gowitness
  • export GO111MODULE=on
  • go get -v github.com/OWASP/Amass/v3/…
subfinder -d <domain>
assetfinder <domain>
amass enum -d <domain>
cat <domain>.txt | sort -u | httprobe -s -p https:443
gowitness file -f ./alive.txt -P ./pics --no-http

Subfinder - https://github.com/projectdiscovery/subfinder

Assetfinder - https://github.com/tomnomnom/assetfinder

httprobe - https://github.com/tomnomnom/httprobe

Amass - https://github.com/OWASP/Amass

GoWitness - https://github.com/sensepost/gowitness/wiki/Installation

Exploring OSINT Frameworks

  • FinalRecon
  • LittleBrother
  • Maltego
  • recon-ng
  • Marketplace search
marketplace install <module>
modules load <module>
info
options set SOURCE <domain>
run
show hosts
back

profiler module

- Sn0int
- Spiderfoot
- WikiLeaker

Extra tool

Hunchly - https://hunch.ly

its a chrome extension works like burp, you activate and then go to web to search pages while the hunchly get data that we want

photon -u <domain>

Automating Website OSINT


#!/bin/bash

domain=$1
RED="\033[1;31m"
RESET="\033[0m"

info_path=$domain/info
subdomain_path=$domain/subdomains
screenshot_path=$domain/screenshots

if [ ! -d "$domain" ];then
  mkdir $domain
fi

if [ ! -d "$info_path" ];then
  mkdir $info_path
fi

if [ ! -d "$subdomain_path" ];then
  mkdir $subdomain_path
fi

if [ ! -d "$screenshot_path" ];then
  mkdir $screenshot_path
fi

echo -e "${RED} [+] Checkin' who it is...${RESET}"
whois $1 > $info_path/whois.txt

echo -e "${RED} [+] Launching subfinder...${RESET}"
subfinder -d $domain > $subdomain_path/found.txt

echo -e "${RED} [+] Running assetfinder...${RESET}"
assetfinder $domain | grep $domain >> $subdomain_path/found.txt

#echo -e "${RED} [+] Running Amass. This could take a while...${RESET}"
#amass enum -d $domain >> $subdomain_path/found.txt

echo -e "${RED} [+] Checking what's alive...${RESET}"
cat $subdomain_path/found.txt | grep $domain | sort -u | httprobe -prefer-https | grep https | sed 's/https\?:\/\///' | tee -a $subdomain_path/alive.txt

echo -e "${RED} [+] Taking dem screenshotz...${RESET}"
gowitness file -f $subdomain_path/alive.txt -P $screenshot_path/ --no-http

Additional Resources

TraceLabs - https://www.tracelabs.org/

Innocent Lives Foundation - https://www.innocentlivesfoundation.org/

Alethe Denis - https://twitter.com/AletheDenis

Joe Gray - https://twitter.com/C_3PJoe

IntelTechniques - https://inteltechniques.com/

OSINT Flowcharts - https://inteltechniques.com/blog/2018/03/06/updated-osint-flowcharts/