Open Source Intelligence (OSINT)

Open Source Intelligence (OSINT) is the practice of collecting, analyzing, and making decisions based on publicly available information. Unlike classified intelligence that requires special access or covert operations, OSINT leverages data that anyone can legally access—from social media profiles and public records to satellite imagery and financial disclosures. In the modern digital age, the volume and detail of publicly available information has exploded, making OSINT an invaluable tool for cybersecurity professionals, investigators, journalists, and organizations.

What is OSINT?

Definition: OSINT involves gathering and analyzing information from publicly accessible sources to produce actionable intelligence for specific purposes such as security assessments, threat analysis, competitive intelligence, or investigations.

Key Characteristics:

  • Publicly Available: Information is legally accessible without requiring unauthorized access

  • Diverse Sources: Data comes from multiple channels (web, social media, government records, etc.)

  • Analysis Required: Raw data must be processed, validated, and contextualized

  • Legal and Ethical: When done properly, OSINT operations remain within legal boundaries

  • Continuous Process: Information changes rapidly; OSINT is ongoing, not one-time

Purpose in Cybersecurity:

  • Pre-engagement reconnaissance: Understand target before penetration testing

  • Threat intelligence: Identify threat actors and their TTPs (Tactics, Techniques, Procedures)

  • Vulnerability assessment: Discover exposed assets and information leakage

  • Social engineering preparation: Gather information for targeted attacks

  • Incident response: Investigate breaches and attribute attacks

  • Brand protection: Monitor for impersonation and data leaks

Types of OSINT

1. Personal OSINT (PERSINT)

Gathering information about individuals for various purposes including background checks, threat assessment, or social engineering preparation.

Sources:

  • Social media profiles (LinkedIn, Twitter, Facebook, Instagram, TikTok)

  • Professional networking sites

  • Public records (property records, court documents, voter registration)

  • Data breach databases (Have I Been Pwned, Dehashed)

  • People search engines (Spokeo, Pipl, TruePeopleSearch)

  • Username enumeration across platforms

  • Resume and portfolio websites

  • GitHub, Stack Overflow profiles

  • Photo metadata and geolocation data

Information to Collect:

  • Full name and aliases

  • Email addresses and phone numbers

  • Physical addresses (current and historical)

  • Employment history and organizational roles

  • Family members and associates

  • Interests, hobbies, and affiliations

  • Travel patterns and locations frequented

  • Technical skills and knowledge areas

  • Security questions answers (pet names, birth places)

Example Workflow:

  1. Start with known identifier (email, username, phone)

  2. Search social media platforms

  3. Use reverse image search on profile photos

  4. Check data breach databases

  5. Search public records and people search engines

  6. Map relationships and connections

  7. Timeline activities and behavioral patterns

2. Organizational OSINT (CORPINT)

Information related to companies, businesses, government agencies, or other organizations.

Sources:

  • Corporate websites and press releases

  • SEC filings and financial reports (for public companies)

  • Job postings and career pages

  • LinkedIn company pages and employee profiles

  • Business registrations and incorporation records

  • Patent and trademark databases

  • News articles and media coverage

  • Conference presentations and whitepapers

  • Technology stack indicators (job posts, error messages)

  • Vendor and partner relationships

Information to Collect:

  • Organizational structure and hierarchy

  • Key personnel and decision makers

  • Office locations and facilities

  • Technology infrastructure and vendors

  • Business partners and suppliers

  • Financial health and investments

  • Mergers, acquisitions, and expansion plans

  • Security products and policies

  • Compliance requirements and certifications

  • Historical data and changes over time

Example Use Case:

Before a penetration test, collect:

  • Employee names for username wordlists

  • Email format ([email protected])

  • Technologies in use (from job postings: "Experience with AWS, Terraform required")

  • Office locations for physical security assessment

  • Organizational chart for targeted social engineering

3. Technical OSINT (TECHINT)

Information about networks, domains, IP addresses, and technical infrastructure.

Sources:

  • WHOIS databases

  • DNS records and zone files

  • SSL/TLS certificates (Certificate Transparency logs)

  • Shodan, Censys (internet-connected device search engines)

  • IP geolocation databases

  • BGP routing data

  • Subdomain enumeration tools

  • Web archives (Wayback Machine)

  • Pastebin and GitHub code leaks

  • Dark web monitoring

  • CVE databases and exploit frameworks

Information to Collect:

  • Domain registration details

  • IP address ranges and netblocks

  • Subdomains and hidden services

  • Open ports and exposed services

  • SSL certificate details

  • Email servers (MX records)

  • SPF, DKIM, DMARC configurations

  • ASN (Autonomous System Number) information

  • Historical DNS changes

  • Exposed credentials or API keys in code repositories

Tools and Techniques:

# WHOIS lookup
whois example.com

# DNS enumeration
dig example.com ANY
host -t mx example.com

# Subdomain discovery
sublist3r -d example.com
amass enum -d example.com

# Certificate transparency
https://crt.sh/?q=%25.example.com

# Shodan search
shodan search "hostname:example.com"

# GitHub secret search
truffleHog --regex --entropy=False https://github.com/org/repo

4. Geospatial OSINT (GEOINT)

Information related to physical locations, geography, and spatial relationships.

Sources:

  • Google Maps / Google Earth

  • Satellite imagery (Planet Labs, Sentinel Hub)

  • Street view services

  • Geotagged social media posts

  • Photo metadata (EXIF data)

  • Flight tracking (FlightRadar24, FlightAware)

  • Ship tracking (Marine Traffic)

  • Webcams and public cameras

  • Weather data and historical patterns

Information to Collect:

  • Facility layouts and building structures

  • Entry/exit points and physical security measures

  • Employee parking areas and vehicle information

  • Nearby landmarks and reference points

  • Timezone and working hours patterns

  • Historical changes to facilities

  • Surveillance camera positions

  • Physical security weaknesses

Example Application:

  1. Locate target facility using address from public records

  2. Analyze satellite imagery for layout and security cameras

  3. Use street view to identify entry points

  4. Check geotagged social media posts from inside facility

  5. Extract EXIF data from employee-posted photos

  6. Map employee parking to identify vehicle types

  7. Observe patterns in facility activity over time

OSINT Tools and Frameworks

Search Engines and Aggregators

Google Advanced Search Operators (Google Dorking):

site:example.com filetype:pdf
"confidential" site:example.com
inurl:admin site:example.com
intitle:"index of" site:example.com
cache:example.com
site:example.com -www

Specialized Search Engines:

  • Shodan: Search engine for internet-connected devices

  • Censys: Internet-wide scan data and analysis

  • ZoomEye: Cyberspace search engine

  • FOFA: Search engine for cyber assets

  • Binary Edge: Internet scanning and data collection

  • Greynoise: Internet background noise analysis

Social Media Intelligence (SOCMINT) Tools

  • Twint: Twitter intelligence tool (no API required)

  • Social-Searcher: Multi-platform social media search

  • Sherlock: Find usernames across social networks

  • Maigret: Collect information about accounts by username

  • IntelX: Search engine for data breaches, leaks, and public records

Username and Email Investigation

# Sherlock - username search across platforms
sherlock username123

# theHarvester - email harvesting
theHarvester -d example.com -b google,linkedin,bing

# h8mail - email breach search
h8mail -t [email protected]

# Holehe - check email across services
holehe [email protected]

Domain and Network Tools

  • Whois: Domain registration information

  • DNSdumpster: DNS reconnaissance and research

  • SecurityTrails: DNS and domain data

  • Sublist3r: Subdomain enumeration

  • Amass: In-depth attack surface mapping

  • Spiderfoot: Automated OSINT collection

Framework and Platforms

Maltego:

  • Visual link analysis and data mining

  • Transform data relationships into graphs

  • Integrates with numerous data sources

  • Commercial and community editions

Recon-ng:

  • Web reconnaissance framework

  • Modular Python-based tool

  • Database-driven methodology

  • Extensive module library

# Recon-ng usage
recon-ng
workspaces create example_investigation
db insert domains
  domain: example.com
modules load recon/domains-hosts/hackertarget
modules load recon/domains-contacts/whois_pocs
modules load recon/hosts-hosts/resolve
run
show hosts

OSINT Framework (https://osintframework.com/):

  • Comprehensive directory of OSINT tools

  • Organized by category and use case

  • Regularly updated resource list

  • Free and accessible online

SpiderFoot:

  • Automated OSINT collection

  • 200+ modules for different data sources

  • Web-based interface

  • Correlation and relationship mapping

Specialized Tools

Image and Metadata Analysis:

  • ExifTool: Read/write metadata in images and files

  • Google Images Reverse Search: Find similar images

  • TinEye: Reverse image search

  • Yandex Images: Often finds results Google misses

  • Jeffrey's Image Metadata Viewer: Online EXIF viewer

Dark Web and Monitoring:

  • OnionScan: Dark web OSINT tool

  • Hunchly: Web capture tool for investigations

  • DarkOwl: Dark web data intelligence

  • Intel 471: Adversary and malware intelligence

Data Breach Databases:

  • Have I Been Pwned: Check if email in known breaches

  • Dehashed: Search for hashed and dehashed databases

  • LeakCheck: Leaked credentials database

  • Snusbase: Data breach search engine

Practical OSINT Workflows

Workflow 1: Company Reconnaissance

Objective: Gather comprehensive intelligence about target organization for penetration test.

Steps:

  1. Domain Discovery:

    whois example.com
    amass enum -d example.com
    sublist3r -d example.com
  2. Employee Enumeration:

    • Search LinkedIn for employees

    • Extract names and roles

    • Generate email addresses based on format

    • Use theHarvester for email validation

  3. Technology Stack Identification:

    • Analyze job postings for required skills

    • Check Wappalyzer on company websites

    • Review GitHub repositories

    • Search BuiltWith and similar services

  4. Infrastructure Mapping:

    shodan search "hostname:example.com"
    censys search "parsed.names:example.com"
  5. Document and Analyze:

    • Create relationship maps in Maltego

    • Document findings in structured format

    • Identify potential entry points

    • Prioritize targets

Workflow 2: Person of Interest Investigation

Objective: Build comprehensive profile of individual for security assessment.

Steps:

  1. Initial Discovery:

    • Search full name in search engines

    • Check social media platforms

    • Run username through Sherlock

  2. Social Media Analysis:

    • Collect all public posts and interactions

    • Note connections and relationships

    • Identify patterns in behavior and interests

    • Extract photos for metadata analysis

  3. Public Records Search:

    • Property records

    • Court documents

    • Voter registration

    • Business registrations

  4. Digital Footprint:

    # Check data breaches
    h8mail -t [email protected]
    
    # Username enumeration
    sherlock person_username
    
    # Historical data
    # Check Wayback Machine for old profiles
  5. Synthesis:

    • Create timeline of activities

    • Map relationships and associations

    • Identify security questions answers

    • Note potential social engineering vectors

Workflow 3: Threat Actor Attribution

Objective: Identify and profile threat actor based on available indicators.

Steps:

  1. IOC Collection: Gather IP addresses, domains, usernames from incident

  2. Infrastructure Analysis: Map threat actor infrastructure using passive DNS

  3. OPSEC Failures: Look for re-used credentials, usernames, patterns

  4. Dark Web Research: Search forums, marketplaces for related activity

  5. Correlation: Link findings to known threat groups using MISP, AlienVault OTX

Hands-on Exercise

Exercise 1: Self-OSINT Audit

Perform comprehensive OSINT on yourself to understand your digital footprint:

  1. Google yourself: Use your name in quotes with variations

  2. Social media audit: List all platforms where you have accounts

  3. Data breach check: Run email through Have I Been Pwned

  4. Username search: Use Sherlock on your common usernames

  5. Image search: Reverse search your profile photos

  6. Public records: Search for your name in public databases

  7. Professional presence: Check LinkedIn, GitHub, portfolio sites

Document:

  • What information is publicly available?

  • What could be used for social engineering?

  • What should be removed or made private?

  • How accurate is the information?

Exercise 2: Company OSINT

Choose a company (with permission) and conduct basic OSINT:

  1. Run WHOIS and DNS enumeration

  2. Enumerate subdomains using Sublist3r

  3. Search Shodan for exposed services

  4. Identify 5-10 employees on LinkedIn

  5. Determine email format

  6. Identify technologies from job postings

  7. Create simple organizational chart

Exercise 3: Geolocation Challenge

Take a photo (or find one online) and attempt to geolocate it:

  1. Extract EXIF data using ExifTool

  2. Identify landmarks and distinctive features

  3. Use Google Images reverse search

  4. Compare with Google Street View

  5. Determine approximate location

  6. Verify using multiple sources

Ethical Considerations

  • Public vs. Private: Just because information is accessible doesn't mean collecting it is legal

  • Terms of Service: Scraping websites may violate ToS (civil, not criminal issue)

  • Anti-Scraping Laws: CFAA in U.S., Computer Misuse Act in U.K.

  • Data Protection: GDPR in EU restricts certain types of data collection

  • Purpose Matters: Collecting for security research vs. harassment has different legal implications

Ethical Guidelines

  1. Respect Privacy: Don't cross into stalking or harassment

  2. Use Responsibly: Information can harm individuals if misused

  3. Consider Impact: Think about consequences of your OSINT activities

  4. Lawful Purpose: Only conduct OSINT for legitimate reasons

  5. Transparent Intent: Be honest about why you're collecting information

  6. Secure Storage: Protect gathered intelligence appropriately

  7. Minimize Harm: Avoid unnecessary exposure of personal information

OSINT for Defense

Organizations should conduct OSINT on themselves:

  • Information Leakage Audit: What's exposed about your organization?

  • Employee Exposure: Are staff oversharing on social media?

  • Shadow IT Discovery: Find forgotten or unknown assets

  • Brand Monitoring: Detect impersonation and fraud

  • Data Breach Monitoring: Check for leaked credentials

  • Competitive Intelligence: Understand how competitors see you

Defensive Measures

Personal Protection

  • Privacy Settings: Configure social media for maximum privacy

  • Separate Accounts: Use different emails/usernames for different purposes

  • Photo Metadata: Remove EXIF data before posting images

  • Information Hygiene: Limit what you share publicly

  • Unique Passwords: Prevent credential stuffing from breaches

  • Google Yourself: Regular self-OSINT to find exposures

  • Data Broker Opt-Out: Remove yourself from people search sites

Organizational Protection

  • Employee Training: Educate on OSINT risks and social media best practices

  • Information Classification: Limit what's publicly disclosed

  • Job Posting Review: Don't reveal too much technical detail

  • WHOIS Privacy: Use privacy protection on domain registrations

  • Breach Monitoring: Monitor for credential leaks

  • Vendor Assessment: Understand third-party data exposure

  • Regular Audits: Perform self-OSINT quarterly

OSINT in the Kill Chain

OSINT typically serves the first two stages of the Cyber Kill Chain:

  1. Reconnaissance: Passive OSINT gathering

  2. Weaponization: Using OSINT to craft targeted attacks

  3. Delivery: OSINT informs delivery method selection

  4. Exploitation: Technical OSINT reveals vulnerabilities

Defenders should focus OSINT efforts on:

  • Understanding attacker perspective

  • Reducing attack surface exposure

  • Detecting reconnaissance activities

  • Building threat intelligence

Key Takeaways

  • OSINT leverages publicly available information to produce actionable intelligence

  • Four main types: Personal, Organizational, Technical, and Geospatial

  • Numerous specialized tools exist for different OSINT tasks

  • Legal and ethical considerations are paramount

  • OSINT is valuable for both offensive and defensive security

  • Everyone should understand their own digital footprint

  • Organizations must balance transparency with security

  • OSINT skills are transferable across many domains

Additional Resources

Books

  • "Open Source Intelligence Techniques" by Michael Bazzell - Comprehensive OSINT methodology

  • "OSINT Essentials" by Justin Seitz - Practical techniques and automation

  • "We Are Bellingcat" by Eliot Higgins - Real-world OSINT investigations

Websites and Frameworks

Online Courses and Training

  • SANS SEC487: Open-Source Intelligence (OSINT) Gathering and Analysis

  • TryHackMe OSINT Room: https://tryhackme.com/room/ohsint

  • Trace Labs: OSINT CTF for missing persons (legal, ethical OSINT practice)

Communities

  • r/OSINT (Reddit): Active OSINT community

  • OSINT Curious: Podcast and community project

  • Bellingcat: Investigative journalism collective

Tools Collections

  • Recon-ng Marketplace: Built-in module marketplace

  • SpiderFoot Modules: 200+ data source integrations

  • Maltego Transforms: Extensible data transformation library

Practice Resources

  • Sector035 OSINT Challenges: Weekly OSINT puzzles

  • Geoguessr: Geography and geolocation practice

  • Geolocation CTF Challenges: Various online challenges

Conclusion

OSINT is an essential skill in modern cybersecurity that continues to grow in importance as more information becomes publicly available. Whether you're a penetration tester gathering pre-engagement intelligence, a defender understanding your attack surface, or an incident responder attributing threats, OSINT provides the foundation for informed decision-making. The key to effective OSINT is combining the right tools with analytical thinking, while maintaining strict ethical and legal standards.

Last updated