Overview

Open Source Intelligence (OSINT) involves gathering data from sources that are accessible to the general public. In cybersecurity, OSINT is used by both attackers for reconnaissance and defenders for threat intelligence and risk assessment.

Common OSINT Sources

  • Social Media: LinkedIn, Twitter, Facebook (identifying employees, technologies, and personal details).
  • Search Engines: Google (using 'dorks' to find sensitive files or hidden pages).
  • Public Records: Domain registration (WHOIS), corporate filings, government databases.
  • Technical Sources: Shodan (searching for internet-connected devices), Censys, GitHub (finding leaked credentials or internal code).
  • News and Media: Tracking company announcements and security incidents.

Use Cases

  • Reconnaissance during a penetration test.
  • Identifying leaked data or credentials.
  • Monitoring the reputation and digital footprint of an organization.