Advanced OSINT Attacks



  • "The OSINT OPSEC Tool monitors multiple 21st Century OSINT sources real-time for keywords, then analyses the results, generates alerts, and maps trends of the data, finding all sorts of info people probably don't want others to see." https://github.com/hyprwired/osint-opsec-tool

Security Vulnerabilities discovered for you by the Internet Communities:
Procedure

According to this link http://prezi.com/hkgnpskw_w5l/automated-osint-in-2012-ear/ the steps for conducting the OSINT research are:
Finding information
Acquiring information
Selecting data
Analyzing data
Producing intelligence
Managing the data

When "Acquiring data" we use:
google
DNS/Whois/Robtex
Hoovers
Web Scraping
EDGAR
IP Geolocation
Email address scraping
SocNet scraping
PublicData.com, et al
OSS Databases
State Websites
Job Sites

Gathering tools:
nslookup/dig/whois
Fierce
SEAT/Goolag
theHarvester
Metagoofil
Serversniff
Hoovers
DomainTools
CentralOps
Robtex
Pipl
Wigle.net

Hybrid Tools
FOCA
Maltego
EAR
Cree.py
Netglub
Tapir https://github.com/intrigueio/tapir

Might not needed but worth knowing them: 
Palantir Government https://www.youtube.com/watch?v=UQvfM9TsGpQ
Microstrategy
Trilogy Software
Mapview
Archview
Omniture's Discover on Premises
Recorded Future
Basis Technology
Kapow
Encase
Analysis Notebook
KnightX+
Cogito
OSINT Jobs http://www.careerjet.co.uk/search/jobs?s=osint&l=london
"Here is the newest class of tools that you can’t afford to overlook, coming soon to an enterprise near you" http://techcrunch.com/2012/10/27/big-data-right-now-five-trendy-open-source-technologies/

Information Brokers
Acxiom
LexisNexis
ChoicePoint
KnowX
Docusearch
DiscreetData
MasterFiles
Infochimps