When doing OSINT research, it might occur that the page you’re interested in, isn’t available anymore. Or that you get the request to research something that has already been deleted and no screenshots were taken. If you struggle where to begin or what tools might be helpful to use, here are some of our suggestions to help you start your research. The website I’m researching … Continue reading OSINT on Deleted Content
Recently, I gave a workshop at the SANS Security Awareness Summit in London, where I showed how one can conduct a simple assessment of him or herself by using some basic OSINT. In this post, I wanted to go a bit more in depth on that subject. Your adversary might be looking into you now. Do you even know what can be found online about … Continue reading Using OSINT for your personal threat model
Whether you’re new to OSINT or an experienced OSINT professional, there is one thing we all have in common, and that is OSINT curiosity. It’s that urge to click on everything and understand how things work in the background. It’s that passion which makes you want to learn more and more, and it’s that investigative curiosity that keeps you digging until you’ve finally found that … Continue reading Five Things You Can Do To Stay OSINT Curious
Using the wigle.net wireless networks in OSINT investigations. Understanding privacy implications for using wifi tethering. Continue reading Tracking All the WiFi Things
Hiya….I go by ‘Ginsberg5150’. I love the poetry of Allen Ginsberg and 5150 is…well…you figure that one out. I live in Kansas City. I got started in OSINT through Debt Collections. I know, weird connection. I used to be a collection agent. It was not the greatest job in the world. It kept food on the table and my family taken care of. What it … Continue reading Thank you for not paying your bill….
Today, nearly every part of our lives can be digitised by tracking and logging everything we do. Every journey we take, every purchase we make, or even every heartbeat can be digitised today. Because of the vast amount of personal information that is being collected, stored and also traded by companies and governments, the EU has decided to strengthen data privacy by introducing the European General Data … Continue reading After the GDPR: researching domain name registrations
When doing OSINT research, especially on social networking platforms, it’s important to use a fake profile, or what we like to call a sock puppet for operational security reasons. On this week’s blog, we want to provide you with some tips and tricks on how to build a good sock puppet…for research purposes. Crafting a ‘sock’ Before you create a sock, let’s have a moment … Continue reading The OSINT Puppeteer
Hi! I’m the blue teamer of the group. I like boot cut jeans, application security, and incident response. I also like to phish. Open Source Intelligence (or OSINT) is not something I use on a daily basis. Well, at least not in how you would expect it to be used. I was introduced to OSINT back in the early 2000s. I was an Electronics Technician … Continue reading How I became OSINT curious
Ho ho ho and…Merry Christmas! It’s #OSINTuesday, and here’s our first blog post: Python, Your Friendly OSINT Helper! On this week’s blog, we have three smaller blog posts, each of which discusses Python in relation to OSINT. In the first one, Lorand briefly highlights some advantages and disadvantages of automating OSINT with Python and provides useful online learning resources. In the second blog post, @WebBreacher … Continue reading Python, Your Friendly OSINT Helper
Hi my name is Josh, I’m an OSINT analyst for the financial industry, digital forensics analyst, and former private investigator. I remember the day I realized that I wanted to get into information security and ultimately became OSINT curious. This story goes back to my management days of running a helpdesk for a retail chain. One of my workers told me there was an upset … Continue reading Thanks Ransomware Jerks!