Thursday, May 26, 2022
CybersecFill
Advertisement
  • Home
  • Events
  • News
  • security tips
  • Article
  • Contact Us
No Result
View All Result
  • Home
  • Events
  • News
  • security tips
  • Article
  • Contact Us
No Result
View All Result
CybersecFill
No Result
View All Result
Home Blog

Open Source Intelligence tools – OSINT

Cybersecfill by Cybersecfill
January 9, 2019
in Blog
4
open Source intelligence tools
Share on FacebookShare on Twitter

What is Open Source Intelligence(OSINT)?

Open source intelligence also known as OSINT is the use of publicly available information for intelligence purpose

Security analyst uses OSINT to harvest publicly available information which may aid analysis and investigation

There are tools that can be used to discover information that are publicly available.Knowing that information is available is one thing, the ability to collect this information and makes intelligence out of them is a great thing..Aside this tools,there are other OSINT tools on github.However,some of this tools are

Open Source Intelligence Tools

Yandex

just like google and bing, Yandex is a great source for open source intelligence and my best usage so far is on image search.It works like magic.Like Google, Yandex is so much more than a search engine. It offers email, cloud, and online payment services, streaming music, news aggregation, and live traffic maps

Google Dorks

If you know how to use the right syntax, google is a very good tool for gathering open source information about people and organizations. Syntax on google dorks

Shodan

Shodan is the search engine for hackers.it keeps track of all the computers and assets on the network that are directly accessible from the internet. It doesn’t present   results like other search engines. ,rather it shows result to make sense to a security professional. It provides information about assets that have been connected online. This helps security analyst to identify assets and test it for vulnerabilities. This OSINT tool lets you understand your digital footprint

The harvester

This is a pre- bundled tool on the kali Linux operating system and it is an excellent tool for getting email and domain related information

Tinyeye

This is used to perform an image related search on the web. You can search to check if an image has being available online and where it appeared

Spider Foot

Spider foot automates open source intelligence to find out everything possible about your target

Wayback Machine

This is a digital archive of the world wide web and other information on the internet. It consists of snapshots of webpages over time.

Virus Total

This analyze suspicious files and URLs to detect types of malware, automatically share them with the security community. All you need to do is visit Virus Total file, URl or search for IP address that have being blacklisted.

Maltego

This is another great open source intelligence tool,it delivers great threat picture to the environment that an organization owns and operates. Maltego’s unique advantage is to demonstrate the complexity and severity of single points of failure as well as trust relationships that exist currently within the scope of your infrastructure.

 

Tags: cyberintelligencecybersecurityOSINT tools
Cybersecfill

Cybersecfill

An independent Nigeria cybersecurity blog.

Next Post
Cybersecurity Shortage

Bridging the Cyber security Gap in the Industry

0 0 votes
Article Rating
Login
guest
guest
4 Comments
Oldest
Newest Most Voted
Inline Feedbacks
View all comments
Aboki mai shai
Aboki mai shai
3 years ago

Wow…. This is great…. I think you should provide links to get this tools and more so tell us more about those tools…. But I think this is nice initiative by you keep the good worl

1
Reply
Cybersecfill
Cybersecfill
Author
Reply to  Aboki mai shai
3 years ago

Thank you.Hover on the tool names,you’ll get access to the link to getting the tools.I’ll definitely consider writing more about the tools

0
Reply
Febz
Febz
2 years ago

Well done!
In addition, Social media is one of the simplest for OSINT 😀

0
Reply
Cybersecfill
Cybersecfill
Author
Reply to  Febz
2 years ago

Oh wow!!!
That is so right!

0
Reply
  • Trending
  • Comments
  • Latest
CEH_PRACTICAL

CEH PRACTICAL EXAM – TICKET TO CEH MASTER

February 6, 2021
Wireless Access Point

How To Secure Your Wireless Access Point (WAP)

August 3, 2019
Wifi 6 Security

Did Wi-Fi 6 come with an Improvement In Security?

May 13, 2019
credit card cloning

How Credit/Debit Cards are Cloned / Preventing Card Cloning

December 26, 2019
Facebook

Facebook’s New Settings Allows Hackers To Easily Pentest Facebook,Instagram Mobile Applications

8
Nationa Cybersecurity Strategy

A Review of the Nigeria National Cybersecurity Strategy

7
Cybersecurity Jobs

Cybersecurity Jobs – You can create your own Cybersecurity Role

4
open Source intelligence tools

Open Source Intelligence tools – OSINT

4
Sports Betting…Increase in Cybersecurity and Data Privacy Risks for Companies and Consumers.

Sports Betting…Increase in Cybersecurity and Data Privacy Risks for Companies and Consumers.

May 19, 2022
Can IT Security Solutions Protect Private Cell Networks?

Can IT Security Solutions Protect Private Cell Networks?

May 25, 2022
Behind That Crypto Wallet…Is a Tenacious Hacker!!!

Behind That Crypto Wallet…Is a Tenacious Hacker!!!

April 28, 2022
Evolution of The Digital Generation…

Evolution of The Digital Generation…

April 22, 2022

Recommended

Sports Betting…Increase in Cybersecurity and Data Privacy Risks for Companies and Consumers.

Sports Betting…Increase in Cybersecurity and Data Privacy Risks for Companies and Consumers.

May 19, 2022
Can IT Security Solutions Protect Private Cell Networks?

Can IT Security Solutions Protect Private Cell Networks?

May 25, 2022
Behind That Crypto Wallet…Is a Tenacious Hacker!!!

Behind That Crypto Wallet…Is a Tenacious Hacker!!!

April 28, 2022
Evolution of The Digital Generation…

Evolution of The Digital Generation…

April 22, 2022

© 2020 CybersecFill. All Rights Reserved.

No Result
View All Result
  • Home
  • Events
  • News
  • security tips
  • Article
  • Contact Us

© 2020 CybersecFill. All Rights Reserved.

wpDiscuz
4
0
Would love your thoughts, please comment.x
()
x
| Reply

Privacy Policy - Terms and Conditions