OSINT and the mine called “Internet”. How to …

All of us have received news regarding the incident occurred to Stratfor during this days, and we have learned that the company is specialized in reserch and information gathering for forecast and analisys purpose. There is a great business behind this kind of research. Of course we are speaking of one of the main company specialized in intelligence and information gathering, but which are the main techiniques to gather information from public and private sources?

With the term Open-source intelligence (OSINT) we identify a form of intelligence collection management that involves finding, selecting, and acquiring information from publicly available sources and analyzing it to produce actionable intelligence, exactly the report provided by company like Stratfor.

How law enforcement and analysts can use open sources to enhance their searchs a issue. Just to start let consider the huge quantitity of incormation available throught social media and search engine.
We assume that the higher is the information retrieved through searches on a particular subject, the greater the accuracy reached for his study, so it is desirable that a growing number of methodologies and studies were to be shared.

Turning to argument “research” , as anticipated, a privileged source is represented by social media. A couple of interesting tools to gather information from social networks are: Kurrently  and also Who is talking
Both are social media search tools very pewerful that are able to retrieve any action made by a specific subject from several social netoworks. Imagine you are interested to my activity on the web, you can simple use “securityaffairs” word in the serach engine and you will able to track all my activities. Amazing! Consider that for several tools are available public API to develope our own serach engine and to propose the results in the way we desire. Where is my privacy?

Those are just some simple examples, but by inference it is easy to understand how a search engine tool is available for each a social media. How many attacks have been announced in recent days posting the results on specialized sites such as Pastebin?
I believe that a security officer ought to be attentive to these media, if only because his company could see holes right on these platforms. At that point tools such as PasteLert are a must for the admin. PasteLert is a simple system to set up alerts and pastebin.com search (like Google Alerts) for pastebin.com entries. This means-you will automatically email recieve Whenever your term (s) is / are found in new wiki entries!

We haven’t forgotten Google alerts, the father of search engine tool which allow you to monitor the web for interesting new content. It is able to alert the user via email updates of the latest relevant Google results (web, news, etc.) based on your queries. Another interesting tool is the Reputation Management Search Engine called SamePoint.com, using it is possible to manage our on line reputation.

Up to now we discussed only the tools for research within the major social media, but obviously the main tools for information retrieval are the search engines.

Have you ever heard of Google Hacking Tools?

Google hacking involves using advanced operators in the Google search engine to locate specific strings of text within search results. LulzSec and Anonymous believed to use Google Hacking as a primary means of identifying vulnerable targets, it is complete and updated source where is possible to retrieve info regarding

  • Advisories and Vulnerabilities
  • Error Messages
  • Files containing juicy info
  • Files containing passwords
  • Files containing usernames
  • Footholds
  • Pages containing login portals

the world in your hands! Always from Google company, let me introduce “Google Insights for Search”, that can be used to compare search volume patterns across specific regions, categories, time frames and properties.

As you might imagine, and then through simple searches without using special tools foranalysis of information is relatively easy to trace the profile of a company or an individual and the relationships that the entity maintains. The techniques described are the order of the day for those who work are engaged in research and collection of useful informationpacked reports of various kinds.

After this brief review on the search tools available on internet we must take in care an important reflection. Although the Internet is in fact a limitless ocean, every drop is referenceable and we must be aware of it every time we expose our data on the network. Our exposure must be appropriately weighted,  deciding what to make public and through which channels. Tools such as those described can be very useful for the analysis of actual media exposure and evaluation of the attack surface of a profile.

Pierluigi Paganini

Reference

More Search-fu for Intelligence and Law Enforcement from Eric Olson

OSINT, Search Tools & Search Tip Roundup

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

Cisco addressed high-severity flaws in IOS and IOS XE software

Cisco addressed multiple vulnerabilities in IOS and IOS XE software that can be exploited to…

12 hours ago

Google: China dominates government exploitation of zero-day vulnerabilities in 2023

Google's Threat Analysis Group (TAG) and Mandiant reported a surge in the number of actively…

19 hours ago

Google addressed 2 Chrome zero-days demonstrated at Pwn2Own 2024

Google addressed two zero-day vulnerabilities in the Chrome web browser that have been demonstrated during…

1 day ago

INC Ransom stole 3TB of data from the National Health Service (NHS) of Scotland

The INC Ransom extortion group hacked the National Health Service (NHS) of Scotland and is threatening…

1 day ago

CISA adds Microsoft SharePoint bug disclosed at Pwn2Own to its Known Exploited Vulnerabilities catalog

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds a Microsoft SharePoint vulnerability disclosed at the…

2 days ago

The DDR Advantage: Real-Time Data Defense

This is the advantage of Data Detection and Response (DDR) for organizations aiming to build…

2 days ago

This website uses cookies.