Introduction to OSINT

TEAM

Section 1 - Introduction to OSINT 

Open source intelligence (OSINT) is the process of searching, collecting and analyzing information from publicly available sources such as websites, social networks, public databases, news resources.

OSINT (Open Source Intelligence) plays an important role in many areas of activity: Intelligence and Security: Obtaining information from open sources about the security risks of the state and social strata. This includes monitoring all resources where users attract such activity (social networks, online forums on various topics, news sources).
Law enforcement: can use open source intelligence to gather information about suspected witnesses of crimes. OSINT specialists can obtain public statements, more specific information, and determine any criminal connections during an investigation.
Search activities: obtaining information about injured people who require assistance (determining the location of missing people).
Business intelligence: market and competitor analysis, customer feedback. Gaining new opportunities in personal business decisions.

Section 2 - Approaches to Open Source Intelligence

There are two main approaches to open source intelligence.

Active approach - the process of active research, through direct contact with sources. Direct contact with the subject under study, with scientists, experts or witnesses to a particular event.

"The researcher in the active approach must be fully prepared and have ethical principles"

The passive approach to open source intelligence is the analysis of open and available sources of information. This includes the analysis of available databases, the study of social networks, and the review of materials from archives, news and publications. It is important to take a critical approach in analyzing such information, as it may not partially or completely correspond to our objectives.

Section 3 - OSINT in Information Security

 OSINT in information security plays an important role in identifying potential threats and vulnerabilities, as well as in risk analysis. For example, when conducting an internal audit or network security check, using OSINT allows you to obtain information about the company and its employees from open sources. This helps to identify possible problems, such as weak passwords, leaks of confidential information, and other threats that can become an entry point for intruders.

Identification of risks and vulnerabilities The main advantages of using OSINT in information security include the ability to quickly detect potential threats and vulnerabilities, as well as the analysis of intruder trends. This can be the purchase of paid subscriptions on closed forums, as well as the purchase of exploits themselves.

OSINT for Red Team OSINT techniques are also actively used by the Red Team to detect potential threats in information technology. They collect information about the company's users, such as email addresses, names and probable user names, to identify potential vulnerabilities and conduct risk analysis.

Section 4 - Tools and Techniques in OSINT

The use of search engines in Open Source Intelligence (OSINT) is an integral part of the process and should be one of the first tasks of the researcher.


The most effective technique for advanced use of search engines (in our example, Google) is called Google Dorking.


Google Dorking


Google Dorking is a way to search for information using special queries and filters in Google. This type of search allows you to reduce the selection and describe the search query more specifically, thereby obtaining more relevant results.


Considering that the settings of many sites allow search robots to dive quite deeply into their structure, we can receive confidential or vulnerable information in such results.


I'll show you a couple of examples.


The site: operator limits the search… In our case, we

We search only by domain codeby.net

You can view all operators on the Wikipedia page.


Also, here are a few more resources on the topic of Google Dorking.


Shodan

Shodan is a Google-like search engine that primarily focuses on searching for devices connected to the Internet using various filters.


Reconnaissance: Shodan can be used to find information about a specific device or company such as IP address, location, open ports, etc. This can help in gaining valuable information.

Device and System Identification: SHODAN provides information about the type and version of devices used on the network. This can help identify specific devices and their characteristics, as well as identify potential vulnerabilities.

Search for public information: Shodan can be used to search for public information related to a particular device such as the device name, type, manufacturer, etc. This can help in getting a more complete picture of the device and its functionality.

Overall, Shodan in the OSINT area provides valuable information that can be used for security analysis.

Whois


Whois is a network protocol used to determine the owner of a domain name, IP address, or autonomous system used on the Internet. There is a Whois database that contains information about registered domains, their owners, and contact information.


When you register a domain name, you are required to provide contact information that is entered into the Whois database. This may include your name, email address, phone number, and postal address. The database also contains information about the domain registrar and the date of registration.


I'll show you an example:

“whois” is a command line utility that allows you to obtain information about registered domains and IP addresses using the Whois protocol.

What data/information can we extract from this output?


The company that registered the domain is MarkMonitor Inc (Registar). The contacts that should be used in case of violations related to this domain are also indicated. abusecomplaints@markmonitor.com (Register Abuse Contact Email).


+1.2086851750 (Registar Abuse Contact Phone).


Also, the servers of the specified site are issued, you can get the owner's full name. What other tools can be used?


  1. Whois.ru
  2. Whois.com
  3. Who.is
  4. Reg.ru
Wayback Machine

Wayback Machine is a collection of archived copies of web pages and other resources saved from the time of their creation and available for public viewing. It is one of the most popular tools for searching and viewing past versions of web pages.


The Wayback Machine builds its archive by regularly scanning and indexing millions of web pages. The search is performed on the site via the search bar. The system then displays a list of available archive copies of that page at different times. Users can select a specific date and time and view the saved version of the page as it looked at the time of scanning.


I wondered what the codeby.net page looked like in March 2018. You're welcome!

What useful information can we extract from the Wayback Machine service?


Studying website changes: The Wayback Machine allows you to track the evolution of websites over time. You can see how the design, structure, and content of a site have changed. This can be useful for analyzing a company's development strategy, changes in products or services, and identifying industry trends.


Checking Facts and Evidence: The Wayback Machine can be used to check the accuracy of information provided on a website in the past. This is especially useful in cases where a page has been modified or removed.

Finding outdated contact information: If a website owner has previously listed contact information on pages, the Wayback Machine can help you find this information. This can be useful for contacting previous owners or administrators of the site.

Detecting Policy Changes: Using the Wayback Machine, you can find out what changes have occurred to a website's privacy policy, terms of use, or other legal documents. This can be useful for understanding what data is being collected and how it is being used.

Section 5 - Practical Task Let's look at the task "Crypto Investor" from the OSINT category from 


Crypto investor

“I invested in cryptocurrency and accidentally sent all my coins to an unknown wallet” - this is the description we are greeted with at the beginning of the task. Let's get started!


When we open task.txt, we are greeted by something incomprehensible:19a317da0d9538497bdd818f0f3132f9825ab73bbc2814a667cc9cfc3fdc419a

The hint tells us that cryptocurrency and Telegram are related.


When you search Google for the words Blockchain and Telegram, the first result is TON (The Open Network)
19a317da0d9538497bdd818f0f3132f9825ab73bbc2814a667cc9cfc3fdc419a—this set of numbers corresponds to the transaction number What to do next? Find any Explorer on TON. For example, https://tonscan.org/, where we will get information about the transfer.

And press Enter!

Having carefully studied the transaction details, we see that the Message field contains the line we are interested in.

Section 6 - Where to practice?
Codeby School offers its own OSINT course called “Combat OSINT”. You can find more information about the course on their platform: https://osintoffensive.codeby.school/ For those interested in GEOINT practice, I can recommend the GeoGuessr platform: https://www.geoguessr.com/ . With GeoGuessr, you can develop your skills in determining the area you are in.

Don't forget about our https://www.hackerspuzzle.com/ platform, where you can complete various tasks and learn new skills.
Tags

#buttons=(Ok, Go it!) #days=(20)

Our website uses cookies to enhance your experience. Check Now
Ok, Go it!