Skip to content

NotAnoobis/OSINT-full-guide

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

19 Commits
 
 
 
 
 
 

Repository files navigation

OSINT-full-guide

Hey Folks! I made this repostory to share with you how I conduct a detailed OSINT investigation and to share my notes and checklist. We call these type of engagements INVESTIGATIONS or RESEARCHES not assesments, because you should NEVER interact directly with your target. Also I suggest you to open up the checklist and follow along with the explaination (you can find it in the usage folder)

DISCLAIMER: Only conduct an OSINT research if you have explicit permission to do so. Use the tools and techniques at your own responsability. I am not accountable for any possible damage you make.

Business OSINT

First things first, sign a contract with the client. Only start your work when you have the legal parts covered.

After that, research the company using Google, DuckDuckGo, Yandex to get context. What services/products they offer? Size of the company, possible geolocation, registry data? In this phase you have to recollect all the socials of your target: websites, LinkedIn, Facebook page, Instagram...

Here you can find two great tools to see where a company was registered, the founders, addresses...etc

Using LinkedIn and the website of the company get a list about it's employees. Collect names, email-addresses, phone numbers, websites, everything. Don't worry if you did not find everything, later you will expand this list using additional tools. Using the newly obtained information and the one that you got from the registry you can easily recreate the chain of command of your target. I prefer to use Maltego, but use whatever graphing tool you like.

Download photos from the company's website and socials and extract metadata from them. You can use exiftool which is built-in in Kali-Linux or search for a public one metadata viewer.

You can use https://imginn.com/ to download all the stories from Instagram.

Check for twitter users as well:

For Facebook I use these two tools:

For snapchat you can check snapchatmaps for geolocation: https://map.snapchat.com

If you obtained an address check it out on google maps and make some good screenshots about the location and it's surroundings. Look for security measures: badges to unlock electronic locks, installed video surveillance, fences, guards...etc

Username and email OSINT

Check the company's website and it's socials for possible usernames, look for the links between them. Like if you have a Youtube account you may leave your twitter account in the description for people to follow you and vice versa. In my experience twitter usernames are the best, for looking up other accounts.

Normally, I use sherlock once I got a username for further enumeration:

Then I move to infoga and TheHarvester to enumerate additional addresses. I use the company's domain as a search parameter and I also look up the obtained usernames to see additional information. Search engines can block your IP if you make a big amount of queries in a short period of time, use VPN while using this tools.

After this you should have a list of usernames and email addresses. Make sure to verify them using email-checkers, I'll leave two here as an example:

So, you have some verified email accounts, check if there has been part of a data breach and check if you get the breached passwords. I use dehashed, It's pretty useful, but use whatever tool you can find. This way you can add more value to your report.

Website OSINT

Identify the IP address of the company's website. Use a simply ping command or whatever you like.

Paste the IP in one of the following sites to see if the target's website is the only one hosted on that IP address:

Check what is in the backend of the website. Look for CMS, databases, programming languages, plugins and their version numbers. After obtaining the version number you can look up for public exploits and security flaws, this will give extra value to your report.

If the only website hosted on the IP address belongs to your target, then you can do a quick nmap scan using an ONLINE tool. Never use the one you have on your VM, you can get into a lot of trouble!

Identify additional subdomains and enumerate them as you did before on the main domain:

Use a webproxy like BurpSuite or OWASP ZAP to click throught all the pages of a website and to see additional code.

Use the waybackmachine to see the previous states of a website. You can find interesting things in the previous version of a domain. Make sure to check the source code and look for comments!

Finish the enumeration using Shodan or Cenys. These tools can identify vulnerabilites and any device connected to the Internet. The firewall of the company, IP cameras, smart fridges...etc

If you are not satisfied with the results use Maltego and search for more information about the people, phone numbers, emails, domains...etc. Also, make a good graph about your findings using Maltego as you did with the chain of command.

Wrap everything up, make sure you have an email list, username list, good screenshots about your findings and write your report.Your report must contain the followings:

  1. Cover page
  2. Table of contents
  3. Assesment Overview ((x was tasked by y to research z, this includes…etc))
  4. Summary (use numbers, during the engagements we identified x usernames, y breached users...etc)
  5. Target, info about the target (domain-list, chain of command, phone number, list of usernames..etc)
  6. Technical evidence (Here you put the technique you used, a link to the tool you used, the steps you followed to obtain the results, additional notes and a screenshot about the findings.)
  7. Recommendations (refer to security frameworks like NIST or MITRE.)

About

Detailed OSINT guide for future engagements.

Topics

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published