(aka OSINT for newbies, OSINT 101 or whatever else might get you interrested)
This article is meant as an introduction to OSINT for someone who is new to it. If you have previous experience it might come off as overly simple or lacking details, but hopefully there is still one or two things here for you to pick up too. I have tried to keep this brief and list very few particular tools but rather focus on topics and concepts. If I notice the article gets well received I might update it or follow up with more tool specific information later on. Enjoy!
OSINT (open source intelligence) is originally a military term refering to collection and analysis of publicly available source. As you see it has nothing to do with open source software as one might think if coming into this from the IT sector. The sources can among others include websites, social media, news, public records and any other information that is accessible by anyone. The goal is to gather information and put it together in a way that it can be used for the desired purpose, wether it is decision-making, business or journalism. Much like a puzzle where you connect lots of smaller pieces of information to form a new full picture that is not readily apparent from the individual pieces.
In the current age where information is shared in such an abundance it has become even more important with OSINT. It can now easier than ever be used to gather insights into a broad spectrum of topics such as public opinions market trends, individual behaviour and even to identify potential threats. When getting into OSINT it is important to have a clear idea of the ethics and any laws that might apply to your subject and also the privacy imoplications when people are involved.
Open data sources; this is likely the source you will use the most when starting out with OSINT and especially so if it is for a CTF or other reasons not pertaining to real life. The list of sources will be too long to even fit here so I will rather list some examples to give an idea.
Search engines and specialized search engines
A first start really should be to do a google search of your target as quite often it will reveal alot of other sites to further investigate. Also try search engines such as duck duck go as it does not keep you in a bubble in the same way. For good meassure have a go with bing and ..? too. Also remember there are sometimes local search engines that should be investigated. Any links you find on a target is good to also search around for. For instance if the targets profile on site A mentions 0xbadcoffee.se/myprofile, that is likely to also be mentioned on site B and so on.
Reverse image search; tineye.com, google image search and yandex image search gives much information. One way I have had much success with is doing a reverse search of avatars from social media as for instance they ofter reveal other social medias where they are being used by the user.
Social media monitoring tools
I will not go into any detail at all here as there are just too many of these tools and I personally dont use any of them. If you are working with social media you will likely have a good idea allready. For longer term monitoring of various pages for information gathering you will have to research to find a tool that fits your needs and abilities.
Scraping tools and APIs
Here there are also too many tools to mention that can scrape social media with various success. Depending on the type of research you are doing you may want to look into different tools for the job. Some tools also have build in capabilities for social media collection. I still want to make specific mention the tool OSINTgram for instagram, https://tweetbeaver.com/getfriends.php and nitter.net for twitter on this topic.
Geolocation and mapping tools
Scrape images for EXIF data with any tool of preference, commonly mobile phones will geo tag images with the GPS coordinates when they are taken. Geolocation in itself is a rather large field and there are many techniques such as triangulation of known objects in images to determining time and date based on where shadows fall. These tasks can be done manually or more or less tool aided. This all makes it a too wide topic for this article to dive much further into.
Plotting data on a map is also a wide topic that I will for now only mention, and it can be done by custom maps in Google maps or by using specialized tools. Research further to find the way you prefer to do this.
Data visualization tools
There are many tools to use for visualisation and most of the time it is down to personal preference, and whether or not you are doing the investigation alone or in a team that determines which tool to use. Some tools are, Maltego-ce, hmm what else?
One tool that is worth checking out is https://osintcombine.tools/ where you can load multiple CSV files with up to four columns to visualize your information.
Ethics and legal considerations
When collecting and analyzing information in your OSINT work it is important to be attentive to the ethical hazards. Ethics is this case is in the end up to you but just be aware of the potential integrity impacts on individuals. When is comes to the legal aspect this is something you will have to research in you geographic area as in some areas the mere act of adding PII (personally identifiable information) into databases require permission and is otherwise illegal.
Verification and source evaluation
Remember to value information based on how verifiable it is. DNS information is usually correct (not talking about owner information etc here but the data served) while someones post on reddit or facebook will need to be verified through other sources to be fully trustworthy.
Protecting privacy and personal information
While taking ethical and legal aspects into consideration also make sure that you handle the data carefully. This is very important as your dataset can contain possibly sensitive or incriminating information just as much as the analyzed final data which is perhaps more obvious. There are many ways for keeping your data secure but that is outside of the scope of this article.
Documenting and storing OSINT findings
This is again much down to personal preference or need based on teamwork in the same way as visualization. After analysis it can also be prudent to delete the raw material if it is not needed anymore.
I will just leave this as a bullet list as there is likely little further explanation needed. These are just some examples and in no way an exhaustive list.
As you can see OSINT is a quite large topic that spans many disciplines and also quite easily gets you rabbit holed in several areas. Depending on your reason for getting into OSINT this can be a good or a bad thing.
For now this will have to do, if you enjoyed this article or leaned something new perhaps consider bying me a bad coffee to keep me going. Or if you are in a shopping mood have a look at the referral page for items that support the site via affiliate links at no additional cost to you!