Passive
OSINT (short for Open-Source Intelligence Gathering) is a way of knowing your target without any sorts of direct contact or leaving any evidence of the recon.
OSINT (short for Open-Source Intelligence Gathering) is a way of knowing your target without any sorts of direct contact or leaving any evidence of the recon.
Source Identification: As the starting point, in this initial phase the attacker identifies potential sources from which information may be gathered from. Sources are internally documented throughout the process in detailed notes to come back to later if necessary.
Data Harvesting: In this phase, the attacker collects and harvests information from the selected sources and other sources that are discovered throughout this phase.
Data Processing and Integration: During this phase, the attacker processes the harvested information for actionable intelligence by searching for information that may assist in enumeration.
Data Analysis: In this phase, the attacker performs data analysis of the processed information using OSINT analysis tools.
Results Delivery: In the final phase, OSINT analysis is complete and the findings are presented/reported to other members of the Red Team.
Note: In OSINT you should always ask questions like: how, who, when, where and why. Also try to collect and sort everything you find and make a structured map of the intel you have gathered using a mind mapping tool like XMind or Mind Master.
We can use GitHub advanced search keywords and dorks to find sensitive data in repositories.
GitHub dorks work with filenames and extensions
Some examples of GitHub search keywords:
Web Server Type
Web Application Development Environment
Firewall Type
Routers
site: [ companydomain ] careers Q , Keyword or Title 9
site: [ companydomain ] jobs .
site: [ companydomain ] openings
Also, searches of job-related sites such as LinkedIn
Organizations maintain servers that provide public PGP keys to clients. You can query these to reveal user email addresses and details.
Some tips to find real IP addresses hiding behind Cloudflare and Tor
See if a single server or ip is hosting multiple websites/domains:
Search engine for the Internet of everything.
Shodan is the world's first search engine for Internet-connected devices including computers, servers, CCTV cameras, SCADA systems and everything that is connected to the internet with or without attention.
Shodan can be used both as a source for gathering info about random targets for mass attacks and a tool for finding weak spots in a large network of systems to attack and take the low-hanging fruit.
Shodan has a free and commercial membership and is accessible at shodan.io.
The search syntax in the search engine is somehow special and can be found in the help section of the website.
With Shodan you can search for specific systems, ports, services, regions and countries or even specific vulnerable versions of a software or OS service running on systems like SMB v1 and much more.
Here the keywords that are mostly used in Shodan search queries:
I have put together a list of the most used OSINT sources that will usually cover about 90% of your needs in a regular pentest.
Remember there are endless ways to find Intel about your target.
The OSINT process is limited to your own imagination.
pubpeer.com
scholar.google.com
arxiv.org
guides.library.harvard.edu
deepdotweb.com
Core.onion
OnionScan
Tor Scan
ahmia.fi
not evil
Google Alerts
HaveIBeenPwned.com
Dehashed.com
Spycloud.com
Ghostproject.fr
weleakinfo.com/
For analyzing and finding a person's profile across 800+ social media websites
Advanced Twitter scraping tool written in Python that allows for scraping Tweets from Twitter profiles without using Twitter's API.