{"id":20019,"date":"2021-02-07T13:41:27","date_gmt":"2021-02-07T08:11:27","guid":{"rendered":"https:\/\/valeurbit.com\/blog\/?p=20019"},"modified":"2021-02-12T17:46:16","modified_gmt":"2021-02-12T12:16:16","slug":"open-source-intelligence-osint","status":"publish","type":"post","link":"https:\/\/valeurbit.com\/blog\/open-source-intelligence-osint\/","title":{"rendered":"Open Source Intelligence (OSINT)"},"content":{"rendered":"\n<p>OSINT  is a technology for searching, accumulating and analyzing data collected from available sources on the Internet.&nbsp;It sounds too general, so we will try to reveal the essence of the term in a more human language.<\/p>\n\n\n\n<p>Back in 1947, one of the CIA analysts, Ken Sherman, said that about 80% of the information the country collects from open sources on the Internet.&nbsp;A little later, the head of the United States DIA, Samuel Wilson, said that 90% of intelligence data is also obtained from open sources, and only the remaining 10% comes from the professional work of agents and spies.&nbsp;Here is such a modern &#8220;James Bond&#8221;, enclosed in an Internet search line.<\/p>\n\n\n\n<p>OSINT allows you to complete about 90% of the tasks facing private detective agencies.&nbsp;So, the network contains the most valuable data sources: ad sites, marketplaces, blogs, forums of interest, government projects, online banking systems, social networks.&nbsp;It is only important from the total &#8220;sum&#8221; to be able to isolate really important and useful information, which can sometimes be compared to sifting a mountain of earth through a sieve to filter gold rocks.&nbsp;It is necessary to understand that sometimes information is much more valuable and essential than a pile of precious metal.&nbsp;Some data can drag on for millions and billions.<\/p>\n\n\n\n<p><strong>So what is OSINT anyway?<\/strong><\/p>\n\n\n\n<p>The technology allows you to collect maximum information from open sources for a complete professional analysis.&nbsp;At the same time, the data can be placed in various forms: articles, discussion posts on forums, video and audio files, documents, pictures, animations, gifs, etc.<\/p>\n\n\n\n<p>Before finding an answer to a question or satisfying a need for knowledge, users search for information and subject it to high-quality analysis, which sometimes takes too much time.&nbsp;But getting accurate results for the layman becomes a difficult task at all.&nbsp;Open source tools can help with this and can be run concurrently.&nbsp;They will gather data for you from available sources, leaving you with only the work of comparison and analytics.<\/p>\n\n\n\n<p><strong>BASIC TOOLS AND TECHNIQUES<\/strong><\/p>\n\n\n\n<p><strong>1. Shodan<\/strong><\/p>\n\n\n\n<p>While everyone is actively using Google to answer the simplest everyday questions, the unrealistically cool Shodan search engine allows hackers to view the exposed assets.&nbsp;So, the service will immediately show you a selection of results that most fully meet your request in terms of meaning.&nbsp;Most often, the system is used to find assets connected to the network. <\/p>\n\n\n\n<p>The tool has an open source code, allows you to conduct high-quality analytics on security issues, check the vulnerabilities of a specific target (openness of personal data, available passwords and ports, IP address, etc.).&nbsp;Shodan also provides the most responsive community search.<\/p>\n\n\n\n<p><strong>2. Google Dorks<\/strong><\/p>\n\n\n\n<p>The service has actually been launched since 2002, but admit it, have you heard of it?&nbsp;It demonstrates remarkable performance and is a truly intelligent query-driven tool.&nbsp;The service is open source, helping users to quickly navigate the results or search index. <\/p>\n\n\n\n<p><strong>3. Maltego&nbsp;<\/strong><\/p>\n\n\n\n<p>Built into Kali Linux, Paterva&#8217;s powerful and intelligent tool is open source and designed for serious goal research through transformation.&nbsp;It is written in the Java programming language.&nbsp;To use, you will need free registration on the manufacturer&#8217;s website, after which you can proceed to creating digital prints of the selected target on the network. The tool allows you to convert IP, find and determine AS number, network blocks.&nbsp;With little bother, you can discover specific phrases and target locations.<\/p>\n\n\n\n<p><strong>4. TheHarvester<\/strong><\/p>\n\n\n\n<p>A narrowly focused, but no less useful tool for finding subdomains, emails, IP addresses and other useful things from a huge array of publicly available information.<\/p>\n\n\n\n<p><strong>5. Recon-Ng<\/strong><\/p>\n\n\n\n<p>A useful tool for conducting field surveys using a modular approach.&nbsp;It will come in handy for users who are familiar with Metasploit firsthand.&nbsp;The tool has built-in modules that allow you to get information in accordance with the request and needs.&nbsp;Its modules can be used by marking up domains in the workspace.&nbsp;The latter are created to perform special operations, such as searches for domains associated with the original or target.<\/p>\n\n\n\n<p><strong>6. SpiderFoot<\/strong><\/p>\n\n\n\n<p>Another useful exploration tool, also open source for Windows and Linux.&nbsp;It is written on the basis of the Python language, has a very convenient configuration, works great on almost any platform, and is built into graphical interfaces.<\/p>\n\n\n\n<p>A useful feature is the ability to use requests from more than a hundred OSINT resources.&nbsp;Collect email data, logins, IPs, domain names, and more faster and better.&nbsp;You can also learn about network blocks, web servers and much more that is not available to the average user.<\/p>\n\n\n\n<p><strong>7. Creepy<\/strong><\/p>\n\n\n\n<p>A special tool for conducting geolocation exploration, collecting data mainly from social networks, image and photo publishing hosting sites.&nbsp;Based on the results of the work, the service publishes reports on the map using a special search filter.&nbsp;Reports can be downloaded in CSV or KML format in order to export them to special analytical programs.<\/p>\n\n\n\n<p><strong>WHAT IS NEEDED FOR OSINT TO WORK IN MODERN REALITIES<\/strong><\/p>\n\n\n\n<p>The algorithm of work in the system is very simple and assumes the following sequence of steps.&nbsp;The latter has been developed and tested for its effectiveness over many years.<\/p>\n\n\n\n<p>1. Collect all the initial information about the target that is publicly available (personal data, email addresses, photos, contacts, etc.).<\/p>\n\n\n\n<p>2. Define tasks for yourself: what questions need to be solved, what information is not enough to form a complete picture.<\/p>\n\n\n\n<p>3. Decide on OSINT tools that work effectively for your specific needs.<\/p>\n\n\n\n<p>4. Set up your search and then analyze all the collected data.<\/p>\n\n\n\n<p>5. Start a new search based on the new information received.<\/p>\n\n\n\n<p>6. Confirm or disprove your guesses.<\/p>\n\n\n\n<p>We can conclude that OSINT is the technology of our present and future.&nbsp;Those who figured out its tools and principles of work will always be one step ahead in the competition and personal safety issues.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>OSINT is a technology for searching, accumulating and analyzing data collected from available sources on the Internet.&nbsp;It sounds too general, so we will try to reveal the essence of the term in a more human language. Back in 1947, one of the CIA analysts, Ken Sherman, said that about 80% of the information the country&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v16.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Open Source Intelligence (OSINT) | ValeurBit Infosec<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/valeurbit.com\/blog\/open-source-intelligence-osint\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Open Source Intelligence (OSINT) | ValeurBit Infosec\" \/>\n<meta property=\"og:description\" content=\"OSINT is a technology for searching, accumulating and analyzing data collected from available sources on the Internet.&nbsp;It sounds too general, so we will try to reveal the essence of the term in a more human language. Back in 1947, one of the CIA analysts, Ken Sherman, said that about 80% of the information the country...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/valeurbit.com\/blog\/open-source-intelligence-osint\/\" \/>\n<meta property=\"og:site_name\" content=\"ValeurBit Infosec\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/valeurbitinfo\/\" \/>\n<meta property=\"article:published_time\" content=\"2021-02-07T08:11:27+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-02-12T12:16:16+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@valeurbit\" \/>\n<meta name=\"twitter:site\" content=\"@valeurbit\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/valeurbit.com\/blog\/#organization\",\"name\":\"Valeurbit Infosec\",\"url\":\"https:\/\/valeurbit.com\/blog\/\",\"sameAs\":[\"https:\/\/www.facebook.com\/valeurbitinfo\/\",\"https:\/\/www.instagram.com\/valeurbit\",\"https:\/\/www.linkedin.com\/company\/valeurbit-infosec\/\",\"https:\/\/twitter.com\/valeurbit\"],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/valeurbit.com\/blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/valeurbit.com\/blog\/wp-content\/uploads\/2021\/02\/Valeurbit-new-logo-center.png\",\"contentUrl\":\"https:\/\/valeurbit.com\/blog\/wp-content\/uploads\/2021\/02\/Valeurbit-new-logo-center.png\",\"width\":1080,\"height\":512,\"caption\":\"Valeurbit Infosec\"},\"image\":{\"@id\":\"https:\/\/valeurbit.com\/blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/valeurbit.com\/blog\/#website\",\"url\":\"https:\/\/valeurbit.com\/blog\/\",\"name\":\"ValeurBit Infosec\",\"description\":\"Cyber Security Company\",\"publisher\":{\"@id\":\"https:\/\/valeurbit.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":\"https:\/\/valeurbit.com\/blog\/?s={search_term_string}\",\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/valeurbit.com\/blog\/open-source-intelligence-osint\/#webpage\",\"url\":\"https:\/\/valeurbit.com\/blog\/open-source-intelligence-osint\/\",\"name\":\"Open Source Intelligence (OSINT) | ValeurBit Infosec\",\"isPartOf\":{\"@id\":\"https:\/\/valeurbit.com\/blog\/#website\"},\"datePublished\":\"2021-02-07T08:11:27+00:00\",\"dateModified\":\"2021-02-12T12:16:16+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/valeurbit.com\/blog\/open-source-intelligence-osint\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/valeurbit.com\/blog\/open-source-intelligence-osint\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/valeurbit.com\/blog\/open-source-intelligence-osint\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/valeurbit.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Open Source Intelligence (OSINT)\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/valeurbit.com\/blog\/open-source-intelligence-osint\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/valeurbit.com\/blog\/open-source-intelligence-osint\/#webpage\"},\"author\":{\"@id\":\"https:\/\/valeurbit.com\/blog\/#\/schema\/person\/185479f8b92e71762e00ce81adc56043\"},\"headline\":\"Open Source Intelligence (OSINT)\",\"datePublished\":\"2021-02-07T08:11:27+00:00\",\"dateModified\":\"2021-02-12T12:16:16+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/valeurbit.com\/blog\/open-source-intelligence-osint\/#webpage\"},\"wordCount\":993,\"publisher\":{\"@id\":\"https:\/\/valeurbit.com\/blog\/#organization\"},\"articleSection\":[\"Valeurbit\"],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/valeurbit.com\/blog\/#\/schema\/person\/185479f8b92e71762e00ce81adc56043\",\"name\":\"Yash Kudal\",\"sameAs\":[\"https:\/\/valeurbit.com\/blog\"],\"url\":\"https:\/\/valeurbit.com\/blog\/author\/yash\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","_links":{"self":[{"href":"https:\/\/valeurbit.com\/blog\/wp-json\/wp\/v2\/posts\/20019"}],"collection":[{"href":"https:\/\/valeurbit.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/valeurbit.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/valeurbit.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/valeurbit.com\/blog\/wp-json\/wp\/v2\/comments?post=20019"}],"version-history":[{"count":0,"href":"https:\/\/valeurbit.com\/blog\/wp-json\/wp\/v2\/posts\/20019\/revisions"}],"wp:attachment":[{"href":"https:\/\/valeurbit.com\/blog\/wp-json\/wp\/v2\/media?parent=20019"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/valeurbit.com\/blog\/wp-json\/wp\/v2\/categories?post=20019"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/valeurbit.com\/blog\/wp-json\/wp\/v2\/tags?post=20019"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}