UniqueSINT PART - 1
In Information security there are many branches that we need to learn it is not mandatory to be expert on everything but its necessary to be aware on each branch and today in this blog we are going to learn one of the domain in Information Security
OPEN SOURCE INTELLIGENCE [ OSINT ]
Open-source intelligence (OSINT) is the collection and analysis of data gathered from open sources to produce actionable intelligence
In common words gathering information about a geolocation,person,domain or a organisation through the publicly available data for a better understanding first we need to understand few terms
DIGITAL FOOTPRINT :
A digital footprint is data that is left behind when users have been online
SOCIAL ENGINEERING :
Psychological manipulation to trick users into making security mistakes or giving away sensitive information
There are different methods and steps to find information of our target like the way of approaching to the target depends on the type of target which means if we want to collect data about the website its of different methods but the same methodology is used for everything
Today in this blog im gonna explain you the methods and instructions to approach a target and get maximum information from them by directly or indirectly if i want to say these in technical terms then it sounds like active(directly) and passive(indirectly)
WE MUST GET MAXIMUM INFORMATION THROUGH PASSIVE METHODS SO THAT THE VICTIM IS NOT AWARE OF WHAT WE COLLECT
Many of us surf internet daily maybe for social media interaction,posting blogs,reading news, shopping,excetra
During this we use many websites for different purpose and every website collects information according to their agreement and here all the data they collect can be used in different ways to provide us the best they can
You might think how can we relate this to OSINT.
YES the information that we leave here becomes the public data and using different techniques and methods we can extract info about the person i may not cover everything in this blog there will be a continuation if you guys like my blogs
Most people use SOCIAL MEDIA such as
- Snapchat
- whatsapp or Signal
- Telegram
We start our gathering information through these as most of the social accounts require email to signup
So for us email is more important than contact number
First to understand what im gonna say now for that lets think a situation and we implement our techniques according to them,
We are in linkedin as it is the most used profession searching platform for those want to get job in linkedin there are connections which is referred to as the people who accepted our request to connect.
- Here the important information that we get is :
- victim Full Name(job searching platforms most people dont use fake names)
- Their Email-ID yes we can see our connections email
To get our connection email :
- Go to the profile of the connection
- you can see menu within that you can see contact info
No one can stop other users in seeing our email because its the default feature of the linkedin so better to be careful with whom you are connecting with check their profile before attempting the acceptance of connection
so we got the email and their are different components in email such as the domain like gmail,hotmail,outlook,protonmail,icloud excetra and also we can find their name
from linkedin we got the following details
- The place where the person resides
- The qualification and experience on a particular field
- E-mail ID
- Full name and if they expose more we can get their DOB(date of birth)
Now we start to dig more information through email for example testing123@gmail.com is the victim email there are plenty of information you can get from email lets move onto practical
Everytime hackers from different locations try to hack a organisation with malware or else with their existing vulnerabilities in them and hackers take the advantage of this and demand ransom(like blackmailing for money) if they make a deal with the hackers then they dont expose the company and their customer data to public..if not they leak data to public or else sell the whole company data privately for a certain amount as a price tag the common term for these data stealing is called DATA BREACH this can happen at anytime and anywhere
we use this public data to collect data of our victim for that we need to check whether the victim email is there in the breach database that happened till date
To check the compromised dataset there is a search website to check whether the mail is listed in any of the data breaches that occured
- Haveibeenpwned
- BreachDirectory
- DeHashed
- pwnedrobot
- spycloud
- leakcheck
- ghostproject
- breachalarm
- sitecheck
- scattered secrets
- IntelX
- FireFoxMonitor
- AvastBreachCheck
- whatsmyBreach
for searching leaked passwords
- passwordsearchbot
- MailLeaksBot
- IndiaBot
- When searching in breachdirectory it also shows you partial password and sha1 Hash you can use different sha1 hash cracking sites or rockyou.txt to decrypt this hash
The above information is only for getting details about in which database our victim is leaked his information some databases have email address and passwords,and some have Address,contact number and other juicy content those are really useful.But if you need that data you must have personally i collect all the datasets that are publicly available to us i will add that too in next blog
SITUATION 2 :
Suppose our victim email is not leaked in any of the database then we follow in which websites is the email is linked to such as
Is the email linked to instagram,facebook,twitter,amazon excetra
For this there are instructions to follow but first i will explain the mechanism behind it so that you can understand on how the tool works
There is a github repository and also they made a go language library for that and it is called as HOLEHE
Holehe OSINT - Email to registered accounts
holehe checks whether the email is registered to different websites such as instagram,twitter and more than 120 websites by using forgotten password functionality and important thing is it doesnt alert the users
you can use some telegram bots too those work in the same way like holeheSovaBotTwitter :
- Get the Username of the victim
- edit this link : https://instagram.com/(yourvictimusername)/?__a=1
- you will get public data in json format if it is bussiness account you can get email and contact number too
- AnalyseId
- IDcrawl
- whatsmyname
- you can use the same UniversalSearch
- and sovabot
- maigretOSINT
Method to read deleted or suspended tweets
- copy the twitter username without this symbol
- now add the victim username in the username field below
- link : https://web.archive.org/web/timemap/?url=https%3A%2F%2Ftwitter.com%2F[USERNAME]%2F&matchType=prefix&collapse=urlkey&output=json&fl=original%2Cmimetype%2Ctimestamp%2Cendtimestamp%2Cgroupcount%2Cuniqcount&filter=!statuscode%3A%5B45%5D..&limit=100000&_=1627821432372
- The result will be in JSON format just copy the result you get now(jsonresult)
- paste the result in here link : https://web.archive.org/web/0/(RESULT OF JSON)
- You will be redirected to waybackmachine and can see the tweets
- NOTE : Replace the name DOT with a period " . "
Comments
Post a Comment