OSINT: Social Stuff

What is OSINT?

multi-method methodology for collecting, analyzing and making decisions about data acessible in publicly available sources

sock puppets

For some investigations it is beneficial to use sock-puppet accounts, a.k.a., fake identities. Those are built over time and have, e.g., a fake social media presence and should never trace back to your real identity or IP address.

Background information:

People OSINT

image and location OSINT

urlwhat
https://images.google.com/reverse image searching. drag image into google from file browser
https://yandex.com/
https://tineye.com/
http://exif.regex.info/exif.cgiviewing EXIF data, look at lng/lat

This can also include physical security:

people osint

Finding information about people. This might include getting phone numbers, background checks, etc.

Birthdays can be important, e.g., for password-reset questions, you can find them online:

  • google search it, maybe with in-text
  • search for gratulations on twitter/facebook
  • searching for resumees
    • google dorks: filetype:docx, site:google

social media osint

  • twitter, facebook, insta, reddit, snapchat, linkedin, tiktok, etc.
  • maybe check out some tracelabs
  • in general: the newer the network the more insecure they are

Social Account finder: https://whatsmyname.app/#

Businesses OSINT

  • start with linkedin but use a burner account
    • use image search to identify people and go back to linkedin
    • site:linkedin.com/in/ "at company name"
    • search through job openings to get more information about used technology

Account OSINT

Users

Or just use automated tools such as theHarvester or h8mail:

$ theHarvester -d tesla.com -b google -l 500 # (for gathering emails)
h8mail -t [email protected] -bc "/opt/breach-parse/BreachCompilation/" -sk # (search for passwords)

Passwords

  • google dorking

    • site:tesla.com filetype:pdf password
    • site:tesla.com filetype:docx
    • search for backup files
  • dehashed

  • try to enumerate over everything you know (passwords, emails, etc)

  • hashes.org

  • haveibeenpwned.com

  • gathering breached credentials

    • github.com/hmaverickadams/breach-parse
    • DeHashed for more searching
    • hashes.org, put it into google

Tooling