githubEdit

OSINT Tools

Helpful links and resources for Cyber Security Analysts and Researchers

Here's a list of additional helpful tools that can be used for OSINT and Sand-boxing for Cyber Security Analysts and Researchers. These tools can be used to looking up information on Domains, IPs, URLs, File Hashes, etc.

Resources to find various OSINT platforms:

circle-exclamation

Google and Google Dorking

We all know google is a search engine that collects and indexes various websites from all over the internet, but some don't know how powerful it really is. Google hacking, also named Google dorking, is a technique that uses Google Search and other Google applications to find security holes in the configuration and computer code that websites are using.

TryHackMe - Google Dorking Roomarrow-up-right Fast-Google-Dorks-Scan Githubarrow-up-right

What is Dorking

Dorking is basically an advanced search where we use operators that function as a filter to direct the search directly to where we want. We also use symbols to search for exact words or phrases. This will help us to search almost any search engine that we find on the internet. This involves making use of search engines to their complete potential to uncover outcomes that are not noticeable with a routine search. It enables us to refine out searches and dive deeper, and with better accuracy, right into web pages as well as files that are available online. Revealing covert documents and safety and security defects by dorking does not require a good deal of technical knowledge. It actually comes down to discovering just a few search strategies and using them across a variety of online search engine.

Why we need google dorks

Everyone can use google dorks for a different purpose. Some of the most common reasons for using google dorks:

  • Cyber Security roles use google dorks to find critical information that can be exposed by mistake, or by someone knowingly, about anything so that they can later on hide or delete that so that no one can use that for any wrong purpose.

  • Researchers, content writers, journalists, etc use google dorks to gather all the information available on google about a particular topic so that they can use that information for reaching their own goals.

  • Students use google dorks to find answers to their questions which are from their textbook or asked by someone or for finding leaked versions of a course or a book for free.

  • Companies and their employees use google dorks to gather information about their competitors and for finding honest reviews of their products or services so that they can use that information further for improving their products and services and which in results helps their company grow faster.

What can we find from Google Dorks

Google dorks can be used to find a variety of information in many aspects, but it's mainly used to find the information on:

  • Critical information of a website, company, organization, software, etc.

  • Blogs, articles, research papers, etc on a particular topic

  • Leaked documents, courses, eBooks, etc

  • Reviews about a company, it's products and services

  • Finding solutions of answers of textbook questions

There are many other kinds of information which can be found via google dorks very easily.

Using Google Dorks

Dork
Used for
Example

"specified_phrase or statement"

Shows only those pages that contains exact word or statement

"Is hacking illegal"

site:

Removes search results from all other websites except the specified one

site:github.com th4ntis

inurl:specified_phrase

Shows search results which contains the specified word in url

inurl:ethical hacking

inurl:word1 word2

Shows search results that contain either of the words, or both

inurl:hacking programming

allinurl:word1 word2

Shows the search results that contain both of the specified words

allinurl:hacking programming

intitle:word1 word2

Shows those search results that mention the word in their title and mention the specified word anywhere in the document

intitle:hacking networking

cache:

Shows a cached version of the website if the website is down

cache:netflix.com

intext:word1

Shows only those pages containing that specific word(s) somewhere in the context

intext:bug hunting

allintext:word1 word2

Only shows pages containing the specified words somewhere in the context

allintext:hacking networking

intitle:”index of”

Shows open ftp servers

intitle:”index of spiderman movie”

inurl:view/index.shtml

Shows live cameras that don’t have any protection

inurl:view/index.shtml

filetype:pdf/doc/ppt specified_phrase

Shows only pages that contains the document of that type and contains specific word in file name

filetype:pdf ethical hacking

+

Shows pages that must contain the specified word

ethical hacking + free course

-

Removes results that contain certain words

ethical hacking - paid course

feed:

Shows specified RSS feed for specified work

reed:hacking

ip:

Finds websites organized by specified IP

ip:54.239.28.85

We can use googles normal searcharrow-up-right as well as their Advanced Search pagearrow-up-right. Of course we can combine these searches as well.

We can also use BOOLEAN searches in Google by using AND / OR

IP/Domain OSINT

When researching IP addresses, it is important we know the context of the search we are performing. There are a multitude of sources to research IP addresses and they can vary depending on what information we want to learn about them.

For offensive security, threat hunting, and attack surface mapping, we want current registration data, and any associated data points that our searches may return. These can include hosted domains, ASN, associated network artifacts, etc.

For defensive operations, such as those of the security blue team, we are looking for historical data and activity data of the IP address.

Domains, more than almost any other target, have one of the largest assortments of associated data points. The most important that we will look for out of this section is the Registration data, the hosting data, site information, archived data, and analytics

There are tons of highly effective tools for subdomain enumeration and brute forcing, but they can be quite noisy. During the Passive Recon phase of a penetration test, we can start with any subdomains recorded by other sources to plan out our attack/test.

  • RDAParrow-up-right - Registration Data Access Protocol is the successor to WHOIS. Like WHOIS, RDAP provides access to information about Internet resources (domain names, autonomous systems, and IP addresses). Unlike WHOIS, RDAP provides: * A machine-readable representation of registration data; * Differentiated access; * Structured request and response semantics; * Internationalisation; * Extensibility.

  • Whoisarrow-up-right - A Whois domain lookup allows you to trace the ownership and tenure of a domain name.

  • Shodan.ioarrow-up-right - Shodan is a search engine that lets users search for various types of servers connected to the internet using a variety of filters.

  • VirusTotalarrow-up-right - Analyze suspicious files, domains, IPs and URLs to detect malware and other breaches, automatically share them with the security community

  • AbuseIPDBarrow-up-right - AbuseIPDB is a project dedicated to helping combat the spread of hackers, spammers, and abusive activity on the internet.

  • Cisco Talos Intelligencearrow-up-right - "Search by IP, domain, or network owner for real-time threat data."

  • IBM X-Forcearrow-up-right - Scan for a multitude of things such as IP/Domain, File Hash, Vulnerabilities, upload files for analysis, etc. A Threat intelligence sharing platform enabling research on security threats, aggregation of intelligence, and collaboration with peers

  • IP.Teoh.ioarrow-up-right - VPN & Proxy IP Detection Tool. Check if an IP is currently blacklisted or is using a VPN/proxy

  • IPVoidarrow-up-right - Various tools for IP information. WHOIS, DNS, DNSDIG, MX Record, Blaklisted by any services, etc.

  • ViewDNSarrow-up-right - Huge toolbox with various utilities for enumerating information about a domain.

  • DNSDumpsterarrow-up-right - Free domain research tool that can discover hosts related to a domain.

  • MXToolbox arrow-up-right- Checks MX information for the given domain

  • DNSLyticsarrow-up-right - Find out everything about a domain name, IP address or provider. Discover relations between them and see historical data. Use it for your digital investigation, fraud prevention or brand protection.

  • HostSpiderarrow-up-right - Command line tool that gathers tons of information about a domain including DNS records, subdomains, WHOIS, Cloudflare IP, and more!

  • OmnisintLabsarrow-up-right - Project Crobat: Rapid7's DNS Database easily searchable via a lightening fast API, with domains available in milliseconds.

  • Sublist3rarrow-up-right - Sublist3r is a python tool designed to enumerate subdomains of websites using OSINT. It helps penetration testers and bug hunters collect and gather subdomains for the domain they are targeting. Sublist3r enumerates subdomains using many search engines.

Email/Username OSINT

Corporate usernames can be obnoxiously easy to guess and build. The standard of [email protected] is so common, it's ridiculous. Even more so when account management tools will simply take the first half of the email and reuse it as a username. We can use schemes like this to our advantage to search for a multitude of treasures like accounts on other services with the same username, credentials found in breaches, and associated sites or tools. When searching for usernames, you can uncover linked social media accounts and tons of relevant intelligence.

Email Search Tools

  • MXToolBoxarrow-up-right - Collection of online tools that can gather multiple points of data surrounding an email address or domain

  • Seon.ioarrow-up-right - Enrich user data based on a single email address

  • Epieosarrow-up-right - Enter an email address and see which sites the email address has been used.

  • HoleHEarrow-up-right - CLI Tool to check if an email is attached to an account on sites like twitter, instagram, imgur and more than 120 others

Email Discovery Tools

Tools

Breached password list from Magnet linkarrow-up-right

Username Search Tools

Social Media OSINT

Social Media is huge a huge part of the internet now, from personal accounts, businesses, news outlets, to bots, it's very helpful to find information on them. This doesn't include just Facebook or Twitter, this can include things like Discord, Telegram, Snapchat, and others.

Facebook

Twitter

Tools

Linked In

Instagram

Discord

A helpful resource on how to perform OSINT on Discord can be found herearrow-up-right. Credit to BOstintBlancarrow-up-right.

Snapchat

Websites

Tools

Put this into a file for httprobe

Put this into a file for httprobe

Only returns sites that are up/active

strip http/https/:443 from the alive.txt made from httprobe

  • whois

Business OSINT

Wireless OSINT

Frameworks

Passwords

Physical Locationimage 17.png

URL and URL Sandboxing

Image

Websites

Tools

People Search/PII

This section will get stalker-ish real quick. While limited in usefulness for a penetration test, it can help you discover all the interesting data surrounding a person, or link data you have found back to an individual. For those who would like a premium all in one option, there are a few handy platforms that can make collection faster and easier.

Name search records can get muddy really quickly when dealing with names like "John Smith", however many tools will allow you refine the search with other data points such as location or other context. As with any search tool, the more data you feed it, the more accurate your results will be. As always I like to start with one of Michael Bazzell's handy tools, Name.html. This tool will search databases of names that will return associated data points for building a full profile of your target. From here, the next step is to start looking for any public records that may be associated with the name you are searching for. Remember to use location to aid in context.

Gov and Business Records

Voter Records

Voter Recordsarrow-up-right

Phone Numbers

Websites

Tools

Phoneinfogaarrow-up-right

Additional OSINT

Last updated