Tools You Can Use for Open Source Intelligence (OSINT) Gathering
Tools You Can Use for Open Source Intelligence (OSINT) Gathering êŽë š
Welcome to the world of Open-Source Intelligence (OSINT). OSINT is all about gathering public information from various online sources.
OSINT can come from social media, websites, search engines, and even public databases. Youâd be surprised at how much valuable information is out there. And itâs information thatâs freely accessible to anyone with the right skills to find it.
OSINT techniques let you tap into this data to uncover patterns, track behaviours, and sometimes even make predictions.
Companies also use OSINT to protect themselves from cyber threats. Law enforcement uses it to investigate cases. And cybersecurity experts use it to identify potential vulnerabilities before attackers do.
In this article, youâll learn the top seven tools used in Open Source Intelligence Gathering.
Note
OSINT should always be used ethically. Respect privacy laws and understand the boundaries of legal data collection. The goal is to gather information responsibly for research, security, or investigative purposes.
Google Dorking â Search Engines on Steroids
Google Dorking is a technique that lets you use Googleâs advanced search operators to find hidden data. These operators can narrow down your search results to exactly what youâre looking for, even if that data isnât easy to find through a basic Google search.
For example, using financial report site: miscosoft.com filetype:pdf
will give us the PDF files that contain the text âfinancial reportâ from the site microsoft.com.
Other common operators include:
site:
to search within a specific website.intitle:
to look for specific words in the title of web pages.inurl:
to find specific terms in URLs.
Here is a detailed tutorial on Google dorking if you want to learn more.
Using Google Dorking, you can find documents, exposed files, login pages, and other information that might otherwise be buried.
Harvesting Emails, IPs, and more using theHarvester
laramies/theHarvester
is a tool specifically designed for OSINT gathering. It can collect email addresses, subdomains, IPs, and more by querying various search engines and databases.
Itâs incredibly useful when you want to quickly gather information on a specific target, like a company or website.
To use theHarvester, you simply enter a domain, and it will scrape data from sources like Google, Bing, LinkedIn, and others. For example:
theHarvester -d kali.org -b bing
This command tells theHarvester to search Bing for information related to kali.org
. In just a few seconds, you can get a list of emails, IP addresses, and other information that may be publicly available.
Extracting Metadata using ExifTool
Metadata is data about data. Files, like PDFs and images, often contain metadata that can reveal useful details.
This could include information like the author of a document, the software used to create it, and even the location where a photo was taken.
exiftool/exiftool
specializes in extracting metadata from files. You can see information about where and when an image was taken, which can be crucial in certain investigations.
Using ExifTool is straightforward:
exiftool file.jpg
This command will display all available metadata for the given file.
Be mindful when using metadata extraction tools, as some metadata may contain sensitive information.
Automating Information Collection using Photon
s0md3v/Photon
is a powerful web crawler designed to automate data collection from websites. Once you specify a target URL, Photon can go through the site, gathering information like links, images, emails, and even files.
Photon is particularly useful for large websites where manual data collection would take too long.
For instance:
python3 photon.py -u https://example.com -o output_folder
This command tells Photon to crawl https://example.com
and save the collected data in a folder called output_folder
.
Here is a sample response from crawling the site archive.org:
Photon can save a lot of time by gathering extensive data for you.
Finding Usernames Across Platforms using Sherlock
Sherlock is a tool that searches for usernames across hundreds of social media platforms and websites. If youâre investigating someone or conducting a security assessment, Sherlock can quickly show you where a particular username exists online.
To use Sherlock:
python3 sherlock username
Replace username
with the username you want to search for. Sherlock will tell you if the username is registered on platforms like Twitter, Facebook, Instagram, and more.
This tool is especially useful for identifying the online presence of a person or entity.
Visualizing Relationships using Maltego
Maltego is a unique OSINT tool that creates visual maps of relationships between people, companies, and entities. By using âtransforms,â Maltego allows you to search across different data sources and map out connections.
Maltegoâs visual approach is helpful for investigations where you need to understand how different elements relate to each other. Itâs popular among law enforcement and cybersecurity experts for mapping out complex networks.
Shodan â Search Engine for Internet-Connected Devices
Shodan is a search engine specifically designed for finding Internet of Things (IoT) devices. It allows you to search for online devices like webcams, routers, servers, and more.
Shodan is widely used in cybersecurity to check for exposed devices that might have security vulnerabilities.
To use Shodan, youâll need an account. Once set up, you can search for devices by IP address, location, or device type.
Shodanâs powerful filtering options make it an essential tool for anyone monitoring connected devices. You can read more about it here.
Conclusion
OSINT offers incredible power for gathering information, but with that power comes responsibility. These tools are designed to help you find public data, but you should always use them ethically and legally.
The goal of OSINT should be responsible data gathering for purposes like research, cybersecurity, or investigations â not for invading privacy or illegal activities.
For more tutorials on cybersecurity, join our weekly newsletter. If you are new to cybersecurity, check out the Hackerâs Handbook.