background preloader

OSINT Framework

Related:  Veille & fact-checkOSINTNetwork/Security

Google hacking From Wikipedia, the free encyclopedia Hacker technique Basics Devices connected to the Internet can be found. A search string such as inurl:"Mode=" will find public web cameras. History The list of Google Dorks grew into a large dictionary of queries, which were eventually organized into the original Google Hacking Database (GHDB) in 2004.[6][7] Google Dorking has been involved in some notorious cybercrime cases, such as the Bowman Avenue Dam hack[12] and the CIA breach where around 70% of its worldwide networks were compromised.[13] Star Kashman, a legal scholar, has been one of the first to study the legality of this technique.[14] Kashman argues that while Google Dorking is technically legal, it has often been used to carry out cybercrime and frequently leads to violations of the Computer Fraud and Abuse Act.[15] Her research has highlighted the legal and ethical implications of this technique, emphasizing the need for greater attention and regulation to be applied to its use. Protection

Skip Trace Links Are you looking for someone? This is the place to start! There are many resources available on the Internet to help you find people. You will also find several links below pertaining to collections. Disclaimer: These links take you to outside of the ECSI site. If you are looking for someone, try one of these sites. Skipease is a large directory of other sites to aid in skip tracing. OSINT Search Tool by IntelTechniques | Open Source Intelligence Live Events Online Resources Blog Podcast Books Contact How To Set Up A Wireless Router Want to set up your wireless router, but don’t know where to start? You’re not alone. The assortment of cables, ports, and other components stashed in your router leaves most people scratching their heads. Every router is different, and the specific steps for setting them up depend on your model. In most cases, the easiest thing to do is to follow the instructions that come with the device. This tutorial assumes you’re setting up a router to be the primary router in your home. Step 1: Connect your router to your modem and laptop Don’t plug your router into the power outlet just yet. Bill Roberson/Digital Trends Not sure what the WAN port is? Plug one Ethernet cable into your modem, and the other end into your router’s WAN port. Step 2: Find the configuration page Your router may take a little bit of time to start up, but once it does, your laptop should be connected to a local network and the Internet. Congratulations! If you find a page, go ahead and jump ahead to the next step.

OSINT Toolkit – i-intelligence The 2020 edition of our Open Source Intelligence Tools and Resources Handbook has been completely revised and updated to reflect changes in the technical and operational domains analysts and OSINT practitioners have to work in. The Handbook is not just for experienced investigators and information security professionals. Rather, it is for anyone wishing to improve the quality of their research, regardless of where they are in their career. Newcomers to OSINT can use the different tool categories to orient their learning, while those who manage them can use the same categories to explore the state-of-the-art. All tools have been vetted by the i-intelligence team prior to their inclusion. We hope the Handbook is of value to you and your colleagues. Best of luck with your work! Download the OSINT Handbook 2020

Intelligence X The OSINT (Open Source Intelligence) & forensic tools on the left side help in investigations. These tools are free to use. Looking for discovery of email addresses, subdomains and URLs? Use our brand new free phonebook.cz. General Search Engines Important: Make sure that popups are allowed. Disclaimer: We are not responsible for any 3rd party services and their results. Validate Email Addresses Loading, please wait... Status: Ready Use this tool to check if a list of email addresses is valid. Email Lookup Domain Lookup IP Lookup Bitcoin Lookup Image Lookup & Analysis This tool allows you to perform a reverse-search and analysis of an image. Reverse Image Search Engines: Image Analysis Tools: Username Lookup Person Lookup by Full Name Telephone Number International Phone Number An international phone or fax number must include the country prefix without the + sign (for example CZ "420", US "1"). U.S Phone Number Location 2 Map File This tool allows you to search for files. Reverse Google Analytics ID Search

15 Online Tools that You Will Come to Love as a Tech - TheTechMentor.com I have compiled a list of 15 free online tools that will help you greatly as a tech. I’m sure that there are other good ones that I have left out so please feel free to post the ones that you like as well. IPTools offers a wide variety of online networking tools. BugMeNot allows you to find and share logins for sites that require you to register. SpeedTest.net allows you to test your Internet connection speed. Del.icio.us is a social bookmarking site that allows you to bookmark sites and view them from any computer. Omnidrive is an online storage service that allows you to upload large files, access them from any computer, and share them with other people. 10 Minute Mail allows you to create temporary email addresses that expire after 10 minutes. Free Password GeneratorFree Password Generator generates very strong and unique passwords. Trend Micro HouseCall is an online virus, spyware, and malware scanner that runs in your web browser. 3Share2 2Share42Share0 7 141

tinfoleak | Free dossier of a twitter user Cannot connect to primary dns server Microsoft Windows [Version 6.0.6002] Copyright (c) 2006 Microsoft Corporation. All rights reserved. C:\Users\Derek>ipconfig/all Windows IP Configuration Host Name . . . . . . . . . . . . : Derek-PC Primary Dns Suffix . . . . . . . : Node Type . . . . . . . . . . . . : Broadcast IP Routing Enabled. . . . . . . . : No WINS Proxy Enabled. . . . . . . . : No Ethernet adapter Local Area Connection 2: Wireless LAN adapter Wireless Network Connection: Media State . . . . . . . . . . . : Media disconnected Connection-specific DNS Suffix . : Description . . . . . . . . . . . : Intel(R) Wireless WiFi Link 5100 Physical Address. . . . . . . . . : 00-22-FA-9A-ED-1E DHCP Enabled. . . . . . . . . . . : Yes Autoconfiguration Enabled . . . . : Yes Ethernet adapter Local Area Connection: Tunnel adapter Local Area Connection* 6: Media State . . . . . . . . . . . : Media disconnected Connection-specific DNS Suffix . : Description . . . . . . . . . . . : isatap. Tunnel adapter Local Area Connection* 7:

TRAVELwithDRONE - Aerial Videos Database Creating an Effective Sock Puppet for OSINT Investigations – Introduction – Jake Creps Introduction and Philosophy In recent light of the epic failure by Surefire Intelligence to frame Robert Mueller for sexual assault allegations, I feel it’s important to discuss and unpack how to make a good sock puppet for OSINT operations. If you aren’t familiar, just google Jacob Wohl or Surefire Intelligence and you will likely be flooded with information about the scandal. For further details on the unraveling of the socks Wohl made, check out Aric Toler’s threat on Twitter @arictoler from Bellingcat. Now, without further ado, let’s get started on constructing a sock puppet for OSINT investigations. The first thing you have to do is clearly define your intent. Option 2 is creating an avatar that’s focused around an idea rather than a unique identity. But enough on theory and philosophy. The Setup Depending on who you ask, there’s an endless list of things you can do to remain anonymous while conducting investigations online. Dedicated Computer Encrypted Email Phone Number Blog Bonus

SearchSystems.net - The Largest Free Public Records Directory

Related:  whateverOSINT - TOP COLLECTIONSintelligenceRessources éducativeMYOSINT - OSINT Frameworks & ResourcesmalenarvaezMotores de Búsquedasnake1903