OSINT
Open Source Intelligence
What is OSINT?
Definition: Open Source Intelligence (OSINT) is derived from publicly available information that is collected, exploited, and disseminated in a timely manner to address specific intelligence requirements.
Advantages of OSINT:
Cost-Effective: Mostly free to use.
Wide Availability: Offers unlimited potential on any topic.
Up-to-Date: Generally current and can be shared with anyone.
Disadvantages of OSINT:
Disinformation Risk: Information might be inaccurate or misleading.
Volume of Data: Identifying relevant and reliable sources can be challenging due to the vast amount of publicly available information.
Uses of OSINT:
For Threat Actors: They use OSINT to identify potential targets and exploit weaknesses.
For Security Professionals:
Identify the organization's exposed attack surface (e.g., public IP ranges, open ports, company domains).
Collect information about adversaries (e.g., monitoring threat actor communications).
Examples of OSINT Tools:
OSINT Framework: A collection of OSINT tools categorized by types of information (e.g., username, email address, domain name).
Shodan, Censys, Binary Edge: Search engines that find publicly available devices like webcams, routers, and servers.
OSINT Types
Credential Monitoring:
Tools: Use tools like Have I Been Pwned, GhostProject, and DeHashed to check if your email or credentials have been compromised in breaches.
Action: Regularly monitor these platforms and update your passwords if your credentials are found.
Google Dorks:
Definition: Advanced search queries that use specific operators to find information not readily available on websites.
Example:
searchterm site:example.com filetype:pdf
to find PDF files containing a search term on a specific website.Use Case: Searching for terms like "password" on public platforms like Trello to find exposed sensitive information.
Recommendations:
Reset Credentials: If you've shared credentials publicly, reset them immediately.
Privacy Settings: Set documents and boards on platforms like Trello, JIRA, and GitHub to private.
Protect Assets: Secure publicly exposed assets like routers and databases to prevent unauthorized access.
Last updated