OSINT (Open Source Intelligence)

Tanishq Sachin Shah
3 min readDec 12, 2023

--

From the Shadows to the Spotlight…

In today’s data-driven society, knowledge is power. The ability to gather, analyze, and understand information can provide a significant competitive advantage to firms, organizations, and individuals. Open-source intelligence (OSINT) is a rapidly increasing information-gathering tool.

OSINT is the collection and analysis of publicly available information. This information can come from a wide range of sources, including news articles, social media, government websites, and even commercial data. OSINT can be used for a variety of reasons.

OSINT can be gathered using a variety of approaches. Among the most common techniques are:

  1. Search engines, such as Google, Bing, and DuckDuckGo, can be used to find information on a wide range of topics.
  2. Social media sites such as Facebook, Twitter, and LinkedIn can be used to obtain information about people and organizations.
  3. Public databases: Information about individuals and organizations can be found in public databases such as government websites, court records, and business directories.
  4. Data brokers are people who sell information about people and businesses. This data can be used to verify identities, locate contact information, and obtain additional information.

“OSINT is like being a detective without a badge…or a gun…or a license”

Getting Started with OSINT

If you are interested in learning more about OSINT, here are a few resources to get you started:

Let’s see OSINT in action

Imagine you’re tasked with investigating a new business partner. You need to gather information about their background, experience, and any potential red flags. This is where OSINT (Open Source Intelligence) comes in.

Steps -

  1. Define your objective and scope: Clearly identify what you want to achieve and the specific information you need. This will guide your search and ensure you’re gathering relevant data.
  2. Gather Information: Use a combination of OSINT techniques mentioned earlier. Here’s a breakdown of each:
  • Search Engines: Utilize Google, Bing, and DuckDuckGo for comprehensive searches. Search for variations of their name, combined with keywords like “professional history,” “education,” “past companies,” or “affiliation.”

“I’m not stalking…I’m just conducting a thorough open-source intelligence investigation.”

  • Social Media: Check Facebook, LinkedIn, Twitter, and other relevant platforms for their profiles, posts, and connections. Carefully analyze their online presence to build a picture of their interests, activities, and professional network.
  • Public Databases: Look for government websites, court records, business directories, and professional licensing databases. These resources can reveal valuable information about their education, certifications, legal history, and business activities.
  • Data Brokers: For a more comprehensive search, consider using paid data brokers like Spokeo, PeopleFinders, or BeenVerified. These services often have access to deeply buried information but require careful evaluation and consideration of privacy concerns.
  • Social Media OSINT Tools: Utilize tools like Social Bearing, IDcrawl, or Maltego to analyze social media profiles and connections. These tools can help you identify potential patterns, affiliations, and hidden networks.
  • Image Search: Use tools like Facecheck.id or TinEye to perform reverse image searches on their photos. This can help you uncover additional information about their activities and connections.

3. Organize and Synthesize: Create a structured report with clear sections for different aspects of their background. Include links to sources, screenshots, and any relevant documents.

4. Organize and Synthesize: Create a structured report with clear sections for different aspects of their background. Include links to sources, screenshots, and any relevant documents.

5. Draw Conclusions and Recommendations: Based on your analysis, summarize your findings and highlight any potential risks or concerns.

“I’m not a hacker…I’m just really good at Google.”

--

--

Tanishq Sachin Shah
Tanishq Sachin Shah

Written by Tanishq Sachin Shah

Triage Analyst @HackerOne | Blogger | Penetration Tester | Red Team | Skating Coach

No responses yet