Open Source Intelligence (OSINT) from an ethical hacking perspective involves the collection and analysis of information that is publicly available to identify vulnerabilities, gather data about targets, or understand the security posture of an organization. This process is a key initial phase in ethical hacking, also known as penetration testing or security auditing, where the goal is to enhance the security of the system or network being tested.
OSINT techniques are ethical and legal, involving the use of publicly accessible sources such as:
- Public websites and forums: Information from company websites, forums, and bulletin boards can provide insights into the technologies used, internal structure, and potential security weaknesses.
- Social media platforms: Public profiles and posts can reveal personal information about employees, organizational structure, and internal events that could be leveraged in social engineering attacks.
- Government and public records: Databases and records available from government agencies can provide information on domain registrations, patents, and more that are useful for mapping out an organization's online presence.
- Search engines: Advanced search engine techniques and dedicated tools can uncover hidden information and files related to a target that are available on the internet.
- Open databases: Databases like Shodan and Censys allow researchers to search for internet-connected devices, including potentially vulnerable systems exposed online.
The ethical use of OSINT means respecting privacy and legality, focusing on information that is publicly available without bypassing any access controls or engaging in activities that would be considered intrusive or illegal. Ethical hackers use OSINT to:
- Pre-assessment: To understand the target's environment and identify potential points of entry before performing any active scanning or testing.
- Footprinting: To gather as much information as possible about the target's digital and physical footprint.
- Vulnerability identification: To find possible vulnerabilities in publicly accessible systems or applications that could be exploited.
- Social engineering preparation: To collect data that could be used in crafting phishing campaigns or other social engineering tactics as part of a security assessment.
Ethical hackers document their findings and provide insights to organizations on how to mitigate any discovered vulnerabilities or security gaps, enhancing the overall security posture of the organization.
- AMass
- Deepinfo (commercial tool)
- Exiftool
- ExtractMetadata
- Findsubdomains
- FOCA
- IntelTechniques
- Maltego
- Recon-NG
- Scrapy
- Screaming Frog
- Shodan
- SpiderFoot
- theHarvester
- Visual SEO Studio
- Web Data Extractor
- Xenu
- ParamSpider
- Awesome Threat Intelligence - A curated list of awesome Threat Intelligence resources. This is a great resource and I try to contribute to it.
Website | Description |
---|---|
shodan.io | Server |
google.com | Dorks |
wigle.net | WiFi Networks |
grep.app | Codes Search |
app.binaryedge | Threat Intelligence |
onyphe.io | Server |
viz.greynoise.io | Threat Intelligence |
censys.io | Server |
hunter.io | Email Addresses |
fofa.info | Threat Intelligence |
zoomeye.org | Threat Intelligence |
leakix.net | Threat Intelligence |
intelx.io | OSINT |
app.netlas.io | Attack Surface |
searchcode.com | Codes Search |
urlscan.io | Threat Intelligence |
publicwww.com | Codes Search |
fullhunt.io | Attack Surface |
socradar.io | Threat Intelligence |
binaryedge.io | Attack Surface |
ivre.rocks | Server |
crt.sh | Certificate Search |
vulners.com | Vulnerabilities |
pulsedive.com | Threat Intelligence |
- censys : https://censys.io
- Certficate Search: https://crt.sh/
- ExifTool: https://www.sno.phy.queensu.ca/~phil/exiftool
- Google Hacking Database (GHDB): https://www.exploit-db.com/google-hacking-database
- Google Transparency Report: https://transparencyreport.google.com/https/certificates
- Huge TLS/SSL certificate DB with advanced search: https://certdb.com
- netcraft: https://searchdns.netcraft.com
- SiteDigger: http://www.mcafee.com/us/downloads/free-tools/sitedigger.aspx
- Spyse: https://spyse.com
- BaseQuery: https://github.com/g666gle/BaseQuery
- Buster: https://github.com/sham00n/buster
- h8mail: https://github.com/khast3x/h8mail
- Hudson Rock: https://www.hudsonrock.com/threat-intelligence-cybercrime-tools
- LeakLooker: https://github.com/woj-ciech/LeakLooker
- PwnDB: https://github.com/davidtavarez/pwndb
- Scavenger: https://github.com/rndinfosecguy/Scavenger
- WhatBreach: https://github.com/Ekultek/WhatBreach
- bgp
- Bgpview
- DataSploit (IP Address Modules)
- Domain Dossier
- Domaintoipconverter
- Googleapps Dig
- Hurricane Electric BGP Toolkit
- ICANN Whois
- Massdns
- Mxtoolbox
- Ultratools ipv6Info
- Viewdns
- Umbrella (OpenDNS) Popularity List
- OCCRP Aleph - The global archive of research material for investigative reporting.
WHOIS information is based upon a tree hierarchy. ICANN (IANA) is the authoritative registry for all of the TLDs and is a great starting point for all manual WHOIS queries.
- ICANN: http://www.icann.org
- IANA: http://www.iana.com
- NRO: http://www.nro.net
- AFRINIC: http://www.afrinic.net
- APNIC: http://www.apnic.net
- ARIN: http://ws.arin.net
- LACNIC: http://www.lacnic.net
- RIPE: http://www.ripe.net
- BGP4: http://www.bgp4.as/looking-glasses
- BPG6: http://lg.he.net/
- dnsenum - https://code.google.com/p/dnsenum
- dnsmap: https://code.google.com/p/dnsmap
- dnsrecon: https://www.darkoperator.com/tools-and-scripts
- dnstracer: https://www.mavetju.org/unix/dnstracer.php
- dnswalk: https://sourceforge.net/projects/dnswalk
- Ahmia Search Engine and their GitHub repo
- DarkSearch and their GitHub repo
- Katana
- OnionSearch
- Search Engines for Academic Research
- DarkDump
- Resources from Pentest-standard.org - http://www.pentest-standard.org/index.php/PTES_Technical_Guidelines#Intelligence_Gathering
- Tons of references to scanners and vulnerability management software for active reconnaissance - http://www.pentest-standard.org/index.php/PTES_Technical_Guidelines#Vulnerability_Analysis