OSINT Notes
Dumping notes from my personal repo of tools and techniques.
Sock Generation:
- https://thispersondoesnotexist.com
- https://elfqrin.com/fakeid.php
Webapps:
- https://hunter.io
1. sign in
2. dashboard
3. enter domain & search
4. lists findings and “Most common patter:”
Most common pattern for my target is output as {f}{last}@domain
Also listed job titles as found
Also lists source each email was pulled from
CAN EXPORT TO CSV - https://Google.com
Search for “google search operators”
site:to search only within site - to remove from results filetype: to search only for that doc type Combine these in single strings for best results - https://osintframework.com
- https://builtwith.com
Add domain, search - https://www.wappalyzer.com/
Add domain, search - https://linkedin.com
Search by Company, scrape to generate list of emails by email format (f)(lastname)@(domain) - https://twitter.com
- https://haveibeenpwned.com/
- https://mxtoolbox.com
Confirm Domain hosts, use email address verification, check for open relay - https://shodan.io
Check them domains and IPs
Tools:
https://github.com/Datalux/Osintgram
https://github.com/sherlock-project/sherlock
https://www.kali.org/tools/theharvester/
https://www.kali.org/tools/recon-ng/
https://github.com/sundowndev/phoneinfoga
Resources (breach dumps):
https://github.com/hmaverickadams/breach-parse
https://www.troyhunt.com/the-773-million-record-collection-1-data-reach/
https://github.com/jivoi/awesome-osint
GAP ANALYSIS METHODOLOGY
Gap analysis takes stock of the initial information that you have and then applies four simple questions to identify what to do next. This can be applied to bring structure and order to your OSINT research.
The four questions are:
1) What do I know?
2) What does this mean?
3) (So) What do I need to know?
4) How do I find out?
REFERENCE: https://nixintel.info/osint/using-gap-analysis-for-smarter-osint-quiztime4th-march-2020/
PASSWORD RESET
Lack of standardization in approaches to password reset functions which can be used to obtain the partial telephone numbers and emails of target accounts.
FACEBOOK: You will be met with a screen displaying alternative contact methods that can be used to reset the password as seen in the post above. It also accurately uses the number of asterisks that match the length of the email addresses.
GOOGLE: You will be asked to enter the last password remembered which can be anything you want and the next screen will display a redacted recovery phone number with the last 2 digits if one is on file.
TWITTER: Entering a Twitter username will yield a redacted email address on file with the first 2 characters of the email username and the first letter of the email domain. It also accurately uses the number of asterisks that match the length of the email address.
YAHOO: Will display a redacted alternate email address if on file. Displays accurate character count as well as first character and last 2 characters of email username along with full domain.
MICROSOFT: Displays redacted phone number with last 2 digits. 226
PINTEREST: Displays a user’s profile as well as a redacted email address without an accurate character count.
INSTAGRAM: Automatically initiates a reset and emails the user. Do not use.
LINKEDIN: Automatically initiates a reset and emails the user. Do not use.
FOURSQUARE: Automatically initiates a reset and emails the user. Do not use.
REFERENCE: https://exploits.run/password-osint/
FIND TELEGRAMS GROUPS BY LOCATION
- Use a mobile phone / Android Emulator
- Download a GPS-spoofer
- Spoof location to target location
- Open up Telegram
- Click on three dots
- Click on “Contacts”
- Click on “Add people nearby”
- Have fun!
REFERENCE:
https://twitter.com/aware_online/status/1234951508325781509
FIND TWITTER ACCOUNTS BY EMAIL
- Sign in on Gmail
- Open “Contacts” 228
- Add email address of target
- Sign in on Twitter
- Download “GoodTwitter” add-on
- Open privacy settings
- Click “Find friends”
- Upload Gmail contacts
- Have fun!
REFERENCE:
https://twitter.com/aware_online/status/1234763437219164160
FIND TWEETS BASED ON LOCATION
- Find location in Google Maps
- Right click > “What’s here?”
- Click on GPS coordinates
- Copy GPS coordinates
- Go to Twitter.com
- Use “geocode:LATT,LONG,0.1km”
- Have fun!
REFERENCE:
https://twitter.com/aware_online/status/1235661987113295872
SPOOF BROWSER LOCATION GOOGLE CHROME
- Open dev tools (F12)
- Click on “Console” tab
- Click on “ESC” button = “console drawer”
- Click on “Sensors”
- Select location/fill in coordinates
- Have fun!
NOTE: IP address might still reveal your location!
REFERENCE:
https://twitter.com/aware_online/status/1236210589128671234
TikTok PROFILES JSON FORMAT!
- Navigate to https://tiktok.com/node/share/user/@{username}?isUniqueId=true
- replace {username} with username of target
- Have fun!
- Find profile pic in 720x720 format
- Find follower/liker count
- & Scrape it!
Want it in 1080x1080 format?
- Go to TikTok profile http://tiktok.com@{username}
- Open dev tools (F12)
- Click on “Network tab”
- Refresh page (F5)
- Select “XHR” tab 229
- Double click on “api/user/detail/”
- Open “AvatarLarger” link
- Have fun!
REFERENCE:
https://twitter.com/aware_online/status/1237104037520117760
FIND Google Maps REVIEWS (LOCATION) FROM GOOGLE ID!
- Goto hangouts.google.com
- In top left search bar, paste in their gmail address
- Once their gmail pops up in the little reactive results pane, r-click > Inspect.
- In the Developer pane that opens, look up a few lines for the hovercard-iod value. Copy it, that’s their Google ID.
- Goto google.com/maps/contrib/TheirGoogleID
Now you have their general location, per the reviews they’ve left at various geographical locations.
Let me know what you think of this article on twitter @cpardue09 or leave a comment below!