How to Gather Info on Someone through OSINT

An0n Ali
12 Aug 202305:09

Summary

TLDRThis video script delves into the concept of Open Source Intelligence (OSINT), tracing its roots to WWII and emphasizing its modern applications. It explains OSINT as the collection of publicly available information from various sources, including social media and public records. The script introduces techniques like Google hacking, using search operators to uncover hidden data, and tools for facial recognition and reverse image searches. It also covers the use of reverse email searches and the exploration of social media profiles to gather insights into individuals' interests and activities, all while reminding viewers of the ethical implications of such practices.

Takeaways

  • 🕵️ Open Source Intelligence (OSINT) is not a new technique; it dates back to the earliest intelligence efforts, including its significant use during World War II.
  • 📚 Lieutenant General Samuel B. Wilson claimed that 90% of intelligence data was obtained through open sources during his leadership of the American defense intelligence agency in the 1970s.
  • 🔍 OSINT refers to the collection of publicly available information about individuals, companies, or organizations from various accessible sources like social media, websites, public records, and news articles.
  • 🔑 Google Hacking or Google Dorking is an OSINT technique that uses special search operators on Google to find information not easily accessible through regular searches.
  • 🚫 A disclaimer is provided that while gathering public information is legal, using it for malicious intent can lead to trouble, and the video is for educational purposes only.
  • 🔎 The script explains how to use search operators like 'site:' to narrow down search results to a specific website, enhancing the effectiveness of OSINT.
  • 📄 The use of file type search operators can help find publicly available documents related to a person, which might include court records, resumes, or other official documents.
  • 🖼️ Demise, an AI facial recognition tool, can search the internet for the same person based on facial features, providing additional information about their online presence.
  • 🔍 Google's reverse image search can offer valuable information about the location or context of a photograph if details are not provided by the subject.
  • 📧 Tools like fbos allow for reverse email searches to find social media accounts associated with an email address, revealing more about a person's online activities.
  • 🌐 Websites like SocialSearcher.com and CheckUsernames.com are useful for finding social media accounts associated with a person's name or username across multiple platforms.

Q & A

  • What is the historical context of open source intelligence (OSINT) mentioned in the script?

    -The script mentions that open source intelligence has been around since the beginning, specifically highlighting its use during the Second World War. Lieutenant General Samuel B. Wilson, who headed the American defense intelligence agency in the 70s, claimed to have received 90% of intelligence data through open sources.

  • What does the term 'OSINT' stand for and what does it involve?

    -OSINT stands for Open Source Intelligence. It refers to the process of gathering publicly available information about a person, company, or organization from various sources that are accessible to anyone, such as social media platforms, websites, public records, and news articles.

  • How can one gather OSINT from a person's social media when certain information is hidden?

    -If a person's friend list or certain posts are hidden on social media, one can still gather OSINT by looking at the likes or comments on their public profile photo or other posts. This can provide clues such as the full names of their friends and the people they frequently interact with.

  • What is Google hacking or Google Dorking and how is it used in OSINT?

    -Google hacking or Google Dorking involves using Google's search engine with special search operators to find information that may not be easily found through regular searches. It can be used to search for specific file types containing a person's name or to refine search results to a particular website.

  • What is the ethical disclaimer provided in the script regarding the use of OSINT?

    -The script includes a disclaimer that while gathering publicly available information is legal, using it to compromise security or engaging in other activities with ill intent can still result in trouble. The video is for educational purposes only and strongly discourages unethical behavior.

  • How can one refine Google search results using special operators for OSINT purposes?

    -One can refine Google search results by using special search operators like 'site:' to limit results to a specific website, or by using 'filetype:' to search for specific types of documents, such as PDFs, Excel, or Word files, associated with a name.

  • What is the role of the Google Hacking Database in OSINT?

    -The Google Hacking Database is a resource where people have created and posted multiple search strings to find information that may not be readily available through regular searches. It can be used to enhance OSINT efforts by providing advanced search techniques.

  • How can AI facial recognition be utilized in OSINT to gather information about a person?

    -AI facial recognition, through tools like Demise, can be used to search for the same person across the internet based on their facial features. This can help gather additional information about a person's online presence.

  • What is a reverse image search and how can it be used in OSINT?

    -A reverse image search involves uploading a photograph to Google Images or a similar service to find other instances of the same image on the web. This can provide valuable information about where the photograph was taken or other related details.

  • How can one find social media accounts associated with an email address in OSINT?

    -Tools like FOBO or fbos can be used to conduct a reverse email search to find social media accounts associated with an email address. This can help explore the online activities and interests of the email address owner.

  • What are some additional tools and websites mentioned in the script for finding information on both email addresses and phone numbers?

    -The script mentions websites like SocialSearcher.com for comprehensive social media searches, CheckUsernames.com for finding a specific username across multiple platforms, and That's It for finding information on both email addresses and phone numbers.

Outlines

00:00

🕵️‍♂️ Open Source Intelligence (OSINT) Basics and Techniques

This paragraph introduces the concept of Open Source Intelligence (OSINT), which is not a new technique but dates back to World War II. It highlights a claim by Lieutenant General Samuel B. Wilson about the significant percentage of intelligence data acquired through open sources. The paragraph explains that OSINT involves gathering publicly available information about individuals, companies, or organizations from various accessible sources like social media, websites, public records, and news articles. It also discusses a common scenario where information might be hidden on social media and how to use OSINT to find clues through likes or comments on public posts. The paragraph emphasizes the legality of gathering such information for educational purposes and discourages unethical behavior. It introduces the first OSINT technique, Google hacking or Google Dorking, which uses special search operators to find specific information not easily accessible through regular searches.

05:01

🔍 Advanced OSINT Techniques and Tools

The second paragraph delves into advanced OSINT techniques and the use of various tools to enhance information gathering. It explains how to use Google search operators to find documents related to a person's name across different file types and how to refine search results by targeting specific websites. The paragraph also introduces tools like 'demise' for AI facial recognition searches and 'Google Images' for reverse image searches to gather more information about a person's online presence and physical locations. Furthermore, it discusses the use of 'fbos' for reverse email searches to find associated social media accounts and 'socialsearcher.com' for comprehensive searches across multiple platforms. The paragraph concludes with mentions of other tools and resources like 'checkusernames.com' and 'Intel techniques' for gathering information from social media accounts, emphasizing the importance of exploring the OSINT framework for additional tools and methods.

Mindmap

Keywords

💡Open Source Intelligence (OSINT)

Open Source Intelligence, or OSINT, refers to the process of gathering information from publicly available sources to infer knowledge about a person, company, or organization. In the context of the video, OSINT is the main theme, as it discusses the use of publicly accessible data to gather intelligence. For instance, the video explains how to use OSINT techniques to find information about individuals through their social media interactions, public records, and other online presences.

💡Google Hacking

Google Hacking, also known as Google Dorking, is a technique used to find specific information on the internet using advanced search operators in Google. The video uses this term to describe how one can use special search queries to uncover details that are not readily available through regular searches. For example, the script mentions using the 'site:' operator to limit search results to a specific website, which is a common practice in Google Hacking.

💡Search Operators

Search operators are specific terms or symbols that can be used in search engines to refine and narrow down search results. The video explains the use of search operators like 'site:', 'filetype:', and 'intitle:' to perform more targeted searches. These operators are crucial in OSINT as they allow users to extract precise information from vast amounts of publicly available data.

💡Public Records

Public records are official documents or information that is not confidential and can be accessed by the public. In the video, public records are mentioned as a source of information that can be used in OSINT. They may include court records, property records, and other official documents that can provide insights into a person's life.

💡Social Media Platforms

Social media platforms are online services that allow users to create and share content or participate in social networking. The script discusses how these platforms can be a rich source of OSINT, as they often contain publicly available information about individuals, such as their friends, interests, and activities. The video gives an example of using a person's public posts and the associated likes or comments to gather OSINT.

💡Reverse Image Search

A reverse image search is a technique used to find other instances of an image on the internet. The video mentions using Google Images to upload a photo and find related images or information about where the photo was taken. This can be a powerful tool in OSINT for identifying locations or uncovering more information about a person's activities.

💡Facial Recognition

Facial recognition is a technology that identifies or verifies the identity of a person using their facial features. The video introduces a tool called 'demise' that uses AI facial recognition to find the same person across the internet. This technology can be used in OSINT to gather additional information about an individual's online presence.

💡Reverse Email Search

A reverse email search is a method of finding information about an individual based on their email address. The video discusses using a tool called 'fbos' to search for social media accounts associated with an email address. This can help in OSINT to understand more about a person's online activities and the platforms they use.

💡Social Media Accounts

Social media accounts are user profiles on social networking services. The video emphasizes the importance of finding and analyzing social media accounts in OSINT. It mentions tools like 'socialsearcher.com' and 'checkusernames.com' that can help in identifying and exploring a person's presence across various social media platforms.

💡Ethical Behavior

Ethical behavior refers to conducting oneself with integrity and in accordance with moral principles. The video includes a disclaimer about the ethical use of OSINT, stating that while gathering publicly available information is legal, using it for malicious purposes can lead to trouble. It encourages viewers to use OSINT techniques responsibly and for educational purposes only.

Highlights

Open source intelligence (OSINT) has a long history, dating back to World War II.

Lieutenant General Samuel B. Wilson claimed to receive 90% of intelligence data through open sources in the 70s.

OSINT involves gathering publicly available information from various accessible sources.

Examples of OSINT sources include social media platforms, websites, public records, and news articles.

Google hacking or Google Dorking is a technique used in OSINT to find specific information using special search operators.

A disclaimer is provided about the legal and ethical use of OSINT gathering for educational purposes only.

The site: search operator can be used to limit search results to a specific website.

File type search operators can find documents associated with a name, such as PDFs, Excel, or Word files.

Google Dorking can refine search results by targeting specific websites related to the target.

A cheat sheet with various search operators for OSINT is available for further exploration.

The Google Hacking Database contains search strings created by users to find valuable information.

Demise is an AI facial recognition tool that can search for a person across the internet based on their profile picture.

Reverse image search on Google can provide information about the location of a photograph.

FBOS is a tool for conducting reverse email searches to find associated social media accounts.

Social media accounts can reveal a person's interests and hobbies, such as GitHub for programmers or Pixabay for artists.

SocialSearcher.com allows for comprehensive searches across multiple social media platforms simultaneously.

CheckUsernames.com can search for a specific username across over 100 social media platforms.

Phone numbers can also be a valuable source of information in OSINT investigations.

Intel Techniques by Michael Basil is a resource for gathering information from social media accounts.

The video encourages viewers to explore the OSINT framework and its tools for more information.

Transcripts

play00:00

open source intelligence isn't a modern

play00:01

technique it has been around since the

play00:03

very beginning in fact during the second

play00:05

world war Lieutenant General Samuel B

play00:06

Wilson who headed the American defense

play00:08

intelligence agency in the 70s made an

play00:10

astounding claim that he received 90 of

play00:12

intelligence data through open sources

play00:13

but what exactly is open source

play00:15

intelligence and what does it mean in

play00:16

the Modern Age of Technology well in

play00:17

simple terms open source intelligence or

play00:19

ocean refers to the process of gathering

play00:21

publicly available information about a

play00:23

person company or an organization from a

play00:24

variety of sources that are accessible

play00:26

for anyone to see these sources can

play00:27

range from social media platforms and

play00:29

websites to public records and news

play00:30

articles for example let's say you want

play00:32

to find out more information about who

play00:34

this particular person hangs around with

play00:35

but when you go to their Facebook's

play00:37

friend list you notice that they've

play00:38

hidden or concealed this information so

play00:39

what can you do in a scenario like this

play00:41

well if you go ahead and open up their

play00:42

profile photo cover photo or any other

play00:44

post made by them that is set to public

play00:46

you can look at the likes or comments to

play00:47

possibly get some Clues such as the full

play00:49

names of their friends and the people

play00:50

they frequently interact with this small

play00:51

amount of intelligence that we just

play00:53

gathered is called open source

play00:54

intelligence now you might be wondering

play00:55

that okay so what if we got their full

play00:57

names how can we find more about them

play00:58

well this is where our first oceans

play00:59

technique called Google hacking or

play01:01

Google Dorking comes into play but

play01:02

before we get into that a quick

play01:04

disclaimer while Gathering publicly

play01:05

available information is legal using it

play01:07

to compromise security or engaging in

play01:09

other activities with ill intent can

play01:10

still result in trouble real quick this

play01:11

video is meant for educational purposes

play01:13

only and strongly discourages an ethical

play01:15

Behavior anyway coming back to the topic

play01:17

Google Dorking involves utilizing Google

play01:18

search engine with special search

play01:20

operators to find information that may

play01:21

not be easily found through regular

play01:23

searches for example let's say we're

play01:24

looking to purchase a Wireless Wi-Fi

play01:26

adapter and we conduct a search on

play01:27

Google in this scenario Google will

play01:29

present us with wireless adapters

play01:30

available on different websites from

play01:31

across the globe but what if we

play01:33

specifically want to see search results

play01:34

from a particular website like Amazon

play01:36

well in that case we can employ a

play01:38

special search operator called site

play01:39

colon followed by amazon.com in the

play01:41

search query like this to exclusively

play01:42

see search results limited to Amazon

play01:44

this practice is essentially what we

play01:45

refer to as Google hacking or Google

play01:47

Dorking now similarly if you possess the

play01:49

full name of your target you can go

play01:50

ahead and search for every publicly

play01:51

available PDF Excel or Word document

play01:53

posted online containing the exact name

play01:55

using the file type search operator to

play01:57

accomplish this you would first enter

play01:58

the victim's name enclosed an inverted

play01:59

Comet like this and then write file type

play02:01

to specify the types of files you want

play02:03

to search for the all research operator

play02:04

used here tells the search engine to

play02:06

also include Excel and Word Documents in

play02:07

the search results after hitting enter

play02:09

the search results will display all the

play02:10

documents that may be associated with

play02:12

the provided name this can be very

play02:13

effective as the documents found might

play02:15

include court records resumes or other

play02:16

official documents that can give insight

play02:18

into a person's life the beautiful

play02:19

aspect of Google Dorking is that if you

play02:21

wish to refine these search results even

play02:22

further by targeting a particular

play02:24

website such as the victims University

play02:25

or workplace you can achieve it by

play02:27

incorporating the sitecolon search

play02:28

operator we discussed earlier now if you

play02:30

would like to experiment with different

play02:31

search operators on your own I will

play02:33

provide a link to a cheat sheet in the

play02:34

description down below that includes

play02:35

various search operators specifically

play02:37

tailored for open source intelligence

play02:38

Additionally you can also visit a

play02:40

website called the Google hacking

play02:41

database where several people have

play02:42

created and posted multiple search

play02:44

strings to find juicy information now if

play02:46

your victim has a photo of themselves as

play02:47

their profile picture you can conduct a

play02:49

search for them based on their facial

play02:50

features using a fascinating tool called

play02:51

demise this tool utilizes AI facial

play02:54

recognition to search for the same

play02:55

person across the internet and help us

play02:56

gather additional information about

play02:58

their online presence and if the victim

play02:59

has upload did a photograph of

play03:00

themselves standing outside next to a

play03:02

building or something without providing

play03:03

any specific information as to where

play03:05

they might be you can head over to

play03:06

images.google.com click on search by

play03:08

image and upload that photograph to

play03:10

initiate a reverse image search by

play03:11

analyzing the visual characteristics of

play03:13

the image and comparing it to similar

play03:14

images across the web Google May provide

play03:16

valuable information about where the

play03:17

photograph was taken or other related

play03:19

details additionally if you couldn't

play03:20

find anything using Google images you

play03:22

can also explore other tools available

play03:23

for conducting reverse image searches by

play03:25

searching for them on the Internet next

play03:26

if you have managed to obtain the email

play03:28

address of your victim through Google

play03:29

Dorking or any other means you can also

play03:31

conduct a reverse email search on them

play03:32

using a useful tool called fbos this

play03:34

tool allows you to search for social

play03:35

media accounts associated with an email

play03:37

address and explore other activities

play03:38

carried out by the owner of that email

play03:40

such as their contributions to Google

play03:41

Maps finding multiple social media

play03:43

accounts of our victim is a great way to

play03:45

learn more about their interests for

play03:46

example a programmer is likely to have

play03:48

an active profile on GitHub while an

play03:49

artist may have profiles on platforms

play03:51

like Pixar or deviantART exploring

play03:53

different social media accounts can

play03:54

provide valuable insights into the

play03:55

Hobby's passions and creative Pursuits

play03:57

of an individual when looking for social

play03:59

media accounts associated with a person

play04:00

there's another fantastic website called

play04:02

socialsearcher.com this website allows

play04:04

you to perform a comprehensive Google

play04:05

search using the victim's full name

play04:07

across multiple social media platforms

play04:09

simultaneously and save a lot of

play04:10

valuable time slash effort you can also

play04:12

head over to checkusernames.com and

play04:14

search for a specific username on over

play04:15

more than 100 social media platforms

play04:17

this tool can be very effective as many

play04:19

people prefer using a single username

play04:20

across the internet similar to feos a

play04:22

website called that's that is another

play04:24

great tool for finding information on

play04:25

both email addresses and phone numbers

play04:27

phone numbers can also provide a wealth

play04:28

of information when conducting an ocean

play04:30

investigation and if you're interested

play04:31

in learning more about phonos and

play04:33

techniques you can check out my detailed

play04:34

video on the topic by clicking the I

play04:35

button above Intel techniques by Michael

play04:37

basil is also a good resource which

play04:39

provides multiple tools to gather

play04:40

information about our targets from their

play04:41

social media accounts this website

play04:43

gathers all the important links in one

play04:44

place saving us time that we would

play04:46

otherwise spend manually going through

play04:47

our targets profiles anyway guys this is

play04:49

it for the video now I could go ahead

play04:51

and discuss several more tools and

play04:52

sources that can be utilized for finding

play04:54

information about someone but I want to

play04:55

encourage you to visit the ocean

play04:56

framework yourself and explore the

play04:58

multiple tools available there if you

play04:59

have any questions regarding the video

play05:01

make sure to ask them in the comments

play05:02

section below and I will see you in the

play05:04

next one

Rate This

5.0 / 5 (0 votes)

関連タグ
Open SourceIntelligenceOSINTGoogle HackingData GatheringEthicsSocial MediaFacial RecognitionReverse ImageEmail Search
英語で要約が必要ですか?