OSINT (Open Source Intelligence) Tools
OSINT (Open Source Intelligence) Tools
SOURCE
INTELLIGENCE)
TOOLS
(SCENARIO &
STEP TO USE)
BY IZZMIER IZZUDDIN
Commonly used OSINT (Open Source Intelligence) tools that are often utilized in
Security Operations Centres (SOCs) or by cybersecurity professionals for gathering
information:
Censys: Censys is a search engine that allows researchers to query large datasets for
host and network information.
Creepy: A geolocation OSINT tool that allows users to gather geolocation information
about a target.
Google Dorks: Techniques to use Google's search engine more effectively for specific
information gathering.
Hunchly: A tool that captures and organizes web-based evidence for online
investigations and OSINT gathering.
Maltego: A versatile tool for open-source intelligence and forensics, offering data
mining and visualization capabilities.
Metagoofil: A tool for extracting metadata from public documents (PDF, DOC, XLS,
PPT, etc.) available on the internet.
Nmap: An open source Linux command-line tool used for network exploration, host
discovery, and security auditing.
Photon: A fast OSINT tool for extracting URLs, web directories, and metadata from
target websites.
SpiderFoot: A reconnaissance tool that automatically queries over 100 public data
sources to gather intelligence on IP addresses, domain names, e-mail addresses,
names, and more.
1. Censys
Scenario: Suppose you want to investigate the SSL/TLS certificates used by the domain
"izzmier.com" to identify potential security vulnerabilities or misconfigurations within
your SOC.
Steps to use:
Example Output:
After performing the search on Censys for "izzmier.com", you might see results similar
to the following:
Certificate Details:
- Common Name (CN): izzmier.com
- Subject Alternative Names (SANs): www.izzmier.com, mail.izzmier.com
- Issuer: Let's Encrypt
- Validity Period: Valid until 2030-03-30
- Key Size: 2048 bits
- Cipher Suites: TLS_RSA_WITH_AES_256_GCM_SHA384,
TLS_RSA_WITH_AES_128_GCM_SHA256
- Associated Domains: subdomain1.izzmier.com, subdomain2.izzmier.com
2. Creepy
Scenario: Suppose you want to investigate a specific geographical area or event where
social media users have posted geotagged content. You aim to gather information
about these users and their activities for intelligence gathering within your SOC
environment.
Steps to use:
2. Launch Creepy:
o Start Creepy by running the following command in your terminal:
python creepy.py
Example Output:
After using Creepy to search near Bangi (latitude 2.9198, longitude 101.7809), you
might see output similar to this:
Scenario: Suppose you want to identify publicly accessible documents (e.g., PDF files)
related to a target organization "izzmier.com". You aim to find potentially sensitive
information that may have been inadvertently exposed on the web.
Steps to use:
site:izzmier.com filetype:pdf
Example Output:
After running the Google Dork query site:izzmier.com filetype:pdf, you might see search
results listing PDF documents hosted on "izzmier.com":
Steps to use:
Example Output:
After using Hunchly to investigate the suspicious website, your findings might include:
Scenario: Suppose you need to gather information about a target organization, "Izzmier
Enterprise," for threat intelligence purposes. You want to gather details such as domain
names, email addresses, related social media profiles, and any associated entities that
might be relevant to your investigation.
Steps to use:
1. Launch Maltego:
o Open Maltego on your computer. It's available for various platforms
including Windows, macOS, and Linux.
2. Choose a Transform:
o Maltego uses "transforms" to query different data sources. Select
appropriate transforms based on the information you want to gather (e.g.,
Domain to DNS Name, Person to Email Address, etc.).
3. Add Entity (e.g., Domain):
o Start by adding an entity related to the target organization. For example,
add a "Domain" entity and enter izzmierenterprise.com.
4. Run Transforms:
o Right-click on the domain entity and select "Run Transforms" or "Run All"
to execute transforms associated with that entity. This action queries
various OSINT data sources.
5. Review Results:
o Maltego will display a graph showing relationships between entities (e.g.,
domain names, email addresses, social media profiles) associated with
the target organization. You can explore these connections visually.
6. Export and Analyse:
o Export the results or save the graph for further analysis. Analyse the
gathered information to identify potential security risks, connections to
threat actors, or vulnerabilities.
Example Output:
After running transforms in Maltego, you might see a graph with nodes representing
various entities connected to "Izzmier Enterprise," such as:
The graph visualization in Maltego helps SOC teams to understand the organizational
structure, potential attack vectors, and relationships between different entities
associated with the target organization.
6. Metagoofil:
Scenario: Suppose you need to gather metadata from documents associated with a
domain "izzmier.com" to extract information that might reveal details about internal
systems, technologies used, or potentially sensitive data.
Steps to use:
Example Output:
After running Metagoofil on "izzmier.com", you might find output such as:
nmap izzmier.com
This command will scan the most common 1,000 ports by default.
nmap -A izzmier.com
Example Output:
After running Nmap on "izzmier.com", you might see output similar to this:
Scenario: Suppose you need to gather OSINT information about an individual named
"Izzmier" for a security investigation within your SOC. You want to find details like social
media accounts, email addresses, and other online footprints associated with this
person.
Steps to use:
Example Output:
After using OSINT Framework tools to gather information about "Izzmier", you might
compile results such as:
photon -u izzmier.com
Example Output:
After running Photon on "izzmier.com", you might see output similar to this:
Discovered URLs:
- https://izzmier.com/
- https://www.izzmier.com/
- https://subdomain.izzmier.com/
- https://izzmier.com/page1.html
- https://izzmier.com/page2.html
Discovered Files:
- https://izzmier.com/robots.txt
- https://izzmier.com/config.php
- https://izzmier.com/report.pdf
10. Recon-ng
Scenario 1: Suppose you want to gather OSINT information about the domain
"izzmier.com" to assess its digital footprint and potential security risks within your SOC.
Steps to use:
1. Launch Recon-ng:
o Recon-ng is a Python-based tool that you can install and run from your
terminal. Make sure you have it installed, typically using:
use recon/domains-hosts/google_site_web
set source izzmier.com
run
5. Explore Results:
o Recon-ng will display results such as subdomains, IP addresses, email
addresses, and potentially other relevant information associated with
"izzmier.com". Review and analyse these results to understand the
domain's digital footprint.
6. Export and Analyse:
o Export the results obtained from Recon-ng for further analysis and
reporting within your SOC. Use this information to identify potential
security weaknesses, exposed assets, or areas requiring further
investigation.
Example Output:
After running Recon-ng on "izzmier.com", you might obtain results such as:
1. Launch Recon-ng:
o Open your terminal or command prompt.
o Start Recon-ng by running:
recon-ng
4. Run Modules:
o Execute modules to gather information. For example, run modules to
discover subdomains and contact information associated with
"izzmier.com":
Example Output:
After running Recon-ng on "izzmier.com", you might see output similar to this:
Scenario 1: Suppose you want to identify open ports and services exposed by devices
within a specific IP address range belonging to your organization (192.168.1.0/24). This
can help in identifying potential vulnerabilities and assessing the security posture of
devices within your network.
Steps to use:
Example Output:
After performing the search, you might see results similar to this:
IP: 192.168.1.1
Ports: 22 (SSH)
Hostname: router.izzmier.com
Organization: Izzmier Enterprise
Operating System: Linux
IP: 192.168.1.10
Ports: 80 (HTTP), 443 (HTTPS)
Hostname: webserver.izzmier.com
Organization: Izzmier Enterprise
Operating System: Windows Server 2016
...
Scenario 2: Imagine you want to assess the security posture of devices within a
specific IP address range (192.168.1.0/24) to identify potential vulnerabilities and
exposure risks within your SOC.
Steps to use:
Example Output:
After performing the search on Shodan for net:192.168.1.0/24, you might see results
similar to the following:
IP: 192.168.1.1
Ports: 22 (SSH), 80 (HTTP), 443 (HTTPS)
Hostname: router.izzmier.com
Organization: Izzmier Enterprise
Operating System: Linux
12. SpiderFoot
1. Launch SpiderFoot:
o SpiderFoot can be installed on various platforms (Windows, Linux,
macOS) and is available as both a command-line tool and a graphical
interface. You can download it from the official SpiderFoot website.
2. Start a New Scan:
o Open SpiderFoot and start a new scan. You can initiate this through the
command line or using the graphical interface.
3. Configure the Scan:
o Enter the domain "izzmier.com" as the target for your scan. You can
specify other parameters such as the depth of the scan (how deep into
linked resources SpiderFoot should explore).
4. Run the Scan:
o Execute the scan to let SpiderFoot gather information from various OSINT
sources. This may include DNS records, WHOIS information,
subdomains, IP addresses, email addresses, and more.
5. Review Results:
o SpiderFoot will present the results in a structured format, showing
connections between different entities related to "izzmier.com". You can
explore these results to identify potential security risks or areas of
concern.
6. Export and Analyse:
o Export the results for further analysis and reporting within your SOC.
Analyse the gathered information to understand the digital footprint of the
target domain and assess potential security implications.
Example Output:
After running SpiderFoot on "izzmier.com", you might obtain results similar to the
following:
• Domain Information:
o Primary domain: izzmier.com
o Subdomains: blog.izzmier.com, shop.izzmier.com
• IP Addresses:
o Associated IP addresses: 192.0.2.1, 198.51.100.1
• Email Addresses:
o Contact emails: [email protected], [email protected]
• Related Entities:
o Social media profiles linked to the domain
o Associated organizations or subsidiaries
13. theHarvester
Scenario 1: Imagine you need to gather email addresses associated with a specific
domain "izzmier.com" for intelligence gathering within your SOC. You want to identify
potential targets or gain insights into the organizational structure and contacts.
Steps to use:
Example Output:
After running theHarvester on "izzmier.com", you might see output similar to this:
=====================
[+] Emails found:
=====================
[email protected]
[email protected]
[email protected]
[email protected]
...
Scenario 2: Suppose you're tasked with gathering email addresses associated with a
specific domain for a security assessment within your SOC. Let's use theHarvester to
search for email addresses associated with the domain izzmier.com.
Steps to use:
Example Output:
After running the command, you might see output similar to this:
ip.addr == 192.168.1.100
o Adjust the filter based on the specific IP address or network range you are
investigating.
3. Capture and Analyse Traffic:
o Start capturing traffic by clicking on the "Start" button in Wireshark. It will
begin capturing packets flowing through the selected network interface.
4. Monitor and Identify Suspicious Activity:
o As Wireshark captures packets, monitor the traffic for any suspicious
patterns or anomalies. Look for:
§ Unusual communication patterns.
§ Unexpected connections or protocols.
§ Large volumes of data transfer.
§ Signs of malware communication (e.g., command and control
traffic).
5. Extract and Analyse Packets:
o Analyse captured packets in Wireshark to extract information such as
source and destination IP addresses, protocols used, payload contents,
and timestamps.
6. Generate Reports:
o Generate reports or export packet captures from Wireshark for further
analysis and sharing with your team or stakeholders. Reports can include
detailed packet logs, analysis findings, and recommendations.
Example Output:
After capturing and analysing traffic using Wireshark, you might identify: