How to trace social media users across multiple platforms

According to Brandwatch, people have on average 7.6 social media accounts. This is a useful statistic to keep in mind when you’re digging into social media profiles. During an investigation, it’s not uncommon to encounter closed accounts. You might deal with this by searching for friends and family members to find information but, as an alternative, you can search for other social media accounts owned by your target. Ideally, you should do both but in this quick tutorial, I will focus on the latter.

Assuming that we already know the username(s) of our target, I will show you three different but very similar tools with which you can trace your target across multiple social media platforms.

It is important to stress that tools like these will not find the needle in the haystack for you – they just save you lots of time, which in turn can be used for other tasks, such as the actual analysis of all the information collected.

In total, I’ve selected three tools that I recently have come across on Twitter and the web:

Namecheckup

UserRecon

Sherlock

Please note that this list is not exhaustive and if you know any other tools – let us know on Twitter using the #OSINTCurious or in the comments section below!

Namecheckup.com

This tool was actually built to allow users to check the availability of social media usernames and domain names across many platforms. Nevertheless, it’s a great tool that perfectly fits our investigative needs.

The website has a nice interface, it’s super easy to use and doesn’t need any explaining. To demonstrate its viability and highlight a common challenge, here’s a quick example with the UK’s prime minister, Boris Johnson (BorisJohnson – see Figure 1).

Figure 1: Searching for ‘BorisJohnson’

For our purposes, we are only interested in the grey coloured boxes – these are the ones where the username is taken. As a next step you would have to verify the account. To do so, simply click on a greyed box of interest and proceed with your verification steps.

Coming back to Boris Johnson, the suggested Twitter account was correctly identified (Figure 2); however, the suggested Instagram account is not Boris’s account (see Figure 2). This is something you will probably often see. In this case, try change the username and repeat the search. Or, go directly to the platform of interest and search for him or her, using different usernames as well as the real name. In this case, I decided to go directly on Instagram and search for Boris Johnson, which eventually gave me his correct account (Figure 2).

Figure 2: from left to right – Boris Johnson on Twitter; and Boris vs Boris

Refining your searches is a normal and important process. If you don’t have a single hit, it does not necessarily mean your target is not on social media. He or she might use a username which is totally different than the actual name.

UserRecon

The second tool I’d like to present is UserRecon, which was developed by @linux_choice. According to the GitHub page, it covers 75 social media platforms. To use it, we first have to clone or download the repository. So, navigate to the GitHub page and clone the repository:

git clone https://github.com/thelinuxchoice/userrecon.git

If you’re not familiar with cloning repositories from GitHub, just follow these steps (for Mac and Linux users):

1. Download the UserRecon repository onto your Desktop (or wherever you like) – see Figure 3

Figure 3: downloading Github repository

2. Now open the Terminal app on your computer

3. Use the cd command to change from your present working directory (pwd) to the downloaded folder, called userrecon-master. I downloaded it onto my Desktop, so I used the following command as displayed in Figure 4.

Figure 4: changing directories

If you’re unfamiliar with such commands, make sure to check out our 4-part 10 minute tips on Basic Linux Commands.

4. To run the script, we first need to make it executable. To do so, run the following: chmod 755 userrecon.sh (Figure 5).

Figure 5: making the script executable

5. Now we can run the script by using this command: ./userrecon.sh and hit enter (make sure you’re still in the userrecon-master folder OR provide the absolute path to the script when you’re not in the same folder)

6. The banner should pop up and prompt you for the username input (Figure 6)

Figure 6: UserRecon welcome banner

UserRecon is super easy to use and it’s a great tool for quickly tracing a username across multiple social media sites. Once the script has finished, it saves all found accounts in a text file, which is pretty convenient. To open it you can use this command:

open USERNAME.txt

As with similar tools, however, UserRecon generates false positives, too. Here’s a quick example with my Twitter username lorandbodo. In total, it has found 16 social media sites associated with the username lorandbodo. Upon further inspection, only four of those were correctly identified. The other 13 sites are false positives. This is something you need to take into account when using such tools. In fact, do not fully rely on any automated solutions. These can support investigations but they will not replace the investigator.

Sherlock

The last tool I want to demonstrate is Sherlock, which is provided by the Sherlock Project. Similar to UserRecon, Sherlocks allows you to easily trace users across many platforms. In fact, at the time of writing this blog post, Sherlock covers 306 social media platforms. It is a very powerful Python-based command line tool, which is also actively maintained by its developers. If you don’t know much about your target, I highly recommend Sherlock as it covers a large number of platforms and you might find relevant information on social media platforms other than the usual big ones that come to mind, such as Facebook, Instagram, TikTok & Co.

Figure 9: Sherlock in use, available at: https://github.com/sherlock-project/sherlock

Sherlock is easy to use and doesn’t need much explaining. To install it, simply follow the steps on the GitHub page. Nevertheless, there are two things that I’d like to highlight:

First, you can trace multiple usernames across all platforms. This is particularly useful when dealing with multiple targets or trying different variations of a single username. To do so, just add the usernames separated by a s space to the end of the command. So, for example:

Python3 sherlock.py lorandbodo dutch_osintguy technisette

If you want to conduct your searches under high OPSEC, Sherlock has got you covered, too. You can make requests over a proxy, a list of proxies and even the TOR network. For more information go check out the GitHub page.

Before I end this how-to guide, there is another tool I want to highlight. It’s called WhatsMyName and was written by Micah (@webbreacher). You can actually find WhatsMyName in other tools, such as  Spiderfoot, Recon-NG and Sn0int. For a quick how-to with Spiderfoot, check out this new tutorial. And for a quick 10 minute OSINT tip with Recon-NG, check out our video.

Thanks for reading this blog post and if you like to share other tools and strategies on how to trace usernames across the web, please do so on Twitter, using #OSINTCurious or comment below!

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

This site uses Akismet to reduce spam. Learn how your comment data is processed.