{"id":709,"date":"2024-08-17T05:20:09","date_gmt":"2024-08-17T05:20:09","guid":{"rendered":"https:\/\/hackmybox.com\/?p=709"},"modified":"2024-08-17T05:20:09","modified_gmt":"2024-08-17T05:20:09","slug":"introduction-to-osint","status":"publish","type":"post","link":"https:\/\/hackmybox.com\/index.php\/2024\/08\/17\/introduction-to-osint\/","title":{"rendered":"Introduction to OSINT"},"content":{"rendered":"<div class=\"vce-row-container\" data-vce-boxed-width=\"true\"><div class=\"vce-row vce-row--col-gap-30 vce-row-equal-height vce-row-content--top\" id=\"el-30b23e95\" data-vce-do-apply=\"all el-30b23e95\"><div class=\"vce-row-content\" data-vce-element-content=\"true\"><div class=\"vce-col vce-col--md-auto vce-col--xs-1 vce-col--xs-last vce-col--xs-first vce-col--sm-last vce-col--sm-first vce-col--md-last vce-col--lg-last vce-col--xl-last vce-col--md-first vce-col--lg-first vce-col--xl-first\" id=\"el-df6cb392\"><div class=\"vce-col-inner\" data-vce-do-apply=\"border margin background  el-df6cb392\"><div class=\"vce-col-content\" data-vce-element-content=\"true\" data-vce-do-apply=\"padding el-df6cb392\"><div class=\"vce-text-block\"><div class=\"vce-text-block-wrapper vce\" id=\"el-aa2ffe51\" data-vce-do-apply=\"all el-aa2ffe51\"><p><span style=\"color: #00ff00;\">Open-source intelligence (OSINT)&nbsp;<\/span> is more than just Googling information. While a quick search may provide basic answers, it often lacks depth and completeness. Effective OSINT requires setting clear objectives, using diverse and verified sources, and applying advanced search techniques while meticulously documenting and cross-checking data for accuracy.<\/p><p>Let\u2019s explore the \"<span style=\"color: #3366ff;\">Introduction to OSINT<\/span>\" by <span style=\"color: #3366ff;\">Security Blue Team<\/span>, along with additional resources gained from in-depth research. Remember to respect legal and ethical boundaries, stay updated with new tools, and apply critical thinking to evaluate the context and reliability of the information you gather.<\/p><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"vce-row-container\" data-vce-boxed-width=\"true\"><div class=\"vce-row vce-row--col-gap-30 vce-row-equal-height vce-row-content--top\" id=\"el-58a0fd3d\" data-vce-do-apply=\"all el-58a0fd3d\"><div class=\"vce-row-content\" data-vce-element-content=\"true\"><div class=\"vce-col vce-col--md-auto vce-col--xs-1 vce-col--xs-last vce-col--xs-first vce-col--sm-last vce-col--sm-first vce-col--md-last vce-col--lg-last vce-col--xl-last vce-col--md-first vce-col--lg-first vce-col--xl-first\" id=\"el-f70276f7\"><div class=\"vce-col-inner\" data-vce-do-apply=\"border margin background  el-f70276f7\"><div class=\"vce-col-content\" data-vce-element-content=\"true\" data-vce-do-apply=\"padding el-f70276f7\"><div class=\"vce-text-block\"><div class=\"vce-text-block-wrapper vce\" id=\"el-07e8d22b\" data-vce-do-apply=\"all el-07e8d22b\"><p><span style=\"font-size: 18pt; color: #00ff00;\"><strong>Part 1: Intelligence<\/strong><\/span><\/p><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"vce-row-container\" data-vce-boxed-width=\"true\"><div class=\"vce-row vce-row--col-gap-30 vce-row-equal-height vce-row-content--top\" id=\"el-a4dfb4f2\" data-vce-do-apply=\"all el-a4dfb4f2\"><div class=\"vce-row-content\" data-vce-element-content=\"true\"><div class=\"vce-col vce-col--md-auto vce-col--xs-1 vce-col--xs-last vce-col--xs-first vce-col--sm-last vce-col--sm-first vce-col--md-last vce-col--lg-last vce-col--xl-last vce-col--md-first vce-col--lg-first vce-col--xl-first\" id=\"el-72d75b73\"><div class=\"vce-col-inner\" data-vce-do-apply=\"border margin background  el-72d75b73\"><div class=\"vce-col-content\" data-vce-element-content=\"true\" data-vce-do-apply=\"padding el-72d75b73\"><div class=\"vce-text-block\"><div class=\"vce-text-block-wrapper vce\" id=\"el-551b2e68\" data-vce-do-apply=\"all el-551b2e68\"><p>In this section, we explore the Intelligence Lifecycle and how raw data is transformed into actionable intelligence and examine how open-source intelligence (OSINT) operates.<\/p><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"vce-row-container\" data-vce-boxed-width=\"true\"><div class=\"vce-row vce-row--col-gap-30 vce-row-equal-height vce-row-content--top\" id=\"el-f8b1ca4c\" data-vce-do-apply=\"all el-f8b1ca4c\"><div class=\"vce-row-content\" data-vce-element-content=\"true\"><div class=\"vce-col vce-col--md-auto vce-col--xs-1 vce-col--xs-last vce-col--xs-first vce-col--sm-last vce-col--sm-first vce-col--md-last vce-col--lg-last vce-col--xl-last vce-col--md-first vce-col--lg-first vce-col--xl-first\" id=\"el-3f1f163a\"><div class=\"vce-col-inner\" data-vce-do-apply=\"border margin background  el-3f1f163a\"><div class=\"vce-col-content\" data-vce-element-content=\"true\" data-vce-do-apply=\"padding el-3f1f163a\"><div class=\"vce-text-block\"><div class=\"vce-text-block-wrapper vce\" id=\"el-0408e1c0\" data-vce-do-apply=\"all el-0408e1c0\"><ol><li><p>Collection: The first step involves gathering publicly available information from various online sources, including social media, news articles, and government reports. This can be done manually or through automated tools.<\/p><\/li><li><p>Processing: Next, filter and categorize the collected data to eliminate duplicates, irrelevant content, and inaccuracies. Organize the information based on its relevance and importance.<\/p><\/li><li><p>Analysis: Analyze the data to identify trends, patterns, and relationships. Utilize tools such as data visualization, data mining techniques, and natural language processing (NLP) to extract meaningful insights.<\/p><\/li><li>Dissemination: The final step is to share the insights with decision-makers. This can be achieved through detailed reports or organizational briefings.<\/li><\/ol><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"vce-row-container\" data-vce-boxed-width=\"true\"><div class=\"vce-row vce-row--col-gap-30 vce-row-equal-height vce-row-content--top\" id=\"el-7b92b60e\" data-vce-do-apply=\"all el-7b92b60e\"><div class=\"vce-row-content\" data-vce-element-content=\"true\"><div class=\"vce-col vce-col--md-auto vce-col--xs-1 vce-col--xs-last vce-col--xs-first vce-col--sm-last vce-col--sm-first vce-col--md-last vce-col--lg-last vce-col--xl-last vce-col--md-first vce-col--lg-first vce-col--xl-first\" id=\"el-51ce7d2e\"><div class=\"vce-col-inner\" data-vce-do-apply=\"border margin background  el-51ce7d2e\"><div class=\"vce-col-content\" data-vce-element-content=\"true\" data-vce-do-apply=\"padding el-51ce7d2e\"><div class=\"vce-text-block\"><div class=\"vce-text-block-wrapper vce\" id=\"el-d99c4d21\" data-vce-do-apply=\"all el-d99c4d21\"><p><span style=\"font-size: 10pt;\">Sources : <a href=\"https:\/\/www.sans.org\/blog\/what-is-open-source-intelligence\/\">What is OSINT (Open-Source Intelligence?) | SANS Institute<\/a><\/span><\/p><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"vce-row-container\" data-vce-boxed-width=\"true\"><div class=\"vce-row vce-row--col-gap-30 vce-row-equal-height vce-row-content--top\" id=\"el-e43485e6\" data-vce-do-apply=\"all el-e43485e6\"><div class=\"vce-row-content\" data-vce-element-content=\"true\"><div class=\"vce-col vce-col--md-auto vce-col--xs-1 vce-col--xs-last vce-col--xs-first vce-col--sm-last vce-col--sm-first vce-col--md-last vce-col--lg-last vce-col--xl-last vce-col--md-first vce-col--lg-first vce-col--xl-first\" id=\"el-6212d7c0\"><div class=\"vce-col-inner\" data-vce-do-apply=\"border margin background  el-6212d7c0\"><div class=\"vce-col-content\" data-vce-element-content=\"true\" data-vce-do-apply=\"padding el-6212d7c0\"><div class=\"vce-text-block\"><div class=\"vce-text-block-wrapper vce\" id=\"el-9eec1f50\" data-vce-do-apply=\"all el-9eec1f50\"><p><span style=\"font-size: 18pt; color: #00ff00;\"><strong>Part 2: Securing Yourself Online<\/strong><\/span><\/p><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"vce-row-container\" data-vce-boxed-width=\"true\"><div class=\"vce-row vce-row--col-gap-30 vce-row-equal-height vce-row-content--top\" id=\"el-8807c539\" data-vce-do-apply=\"all el-8807c539\"><div class=\"vce-row-content\" data-vce-element-content=\"true\"><div class=\"vce-col vce-col--md-auto vce-col--xs-1 vce-col--xs-last vce-col--xs-first vce-col--sm-last vce-col--sm-first vce-col--md-last vce-col--lg-last vce-col--xl-last vce-col--md-first vce-col--lg-first vce-col--xl-first\" id=\"el-d4c51219\"><div class=\"vce-col-inner\" data-vce-do-apply=\"border margin background  el-d4c51219\"><div class=\"vce-col-content\" data-vce-element-content=\"true\" data-vce-do-apply=\"padding el-d4c51219\"><div class=\"vce-text-block\"><div class=\"vce-text-block-wrapper vce\" id=\"el-dc5b8fd7\" data-vce-do-apply=\"all el-dc5b8fd7\"><p>This section explores how we are tracked online and provides strategies for reducing our digital footprint. Examples of tracking mechanisms include fingerprinting, IP addresses, cookies, and browsers, all of which are used to monitor, identify, and collect information about users' online activities and behaviors.<\/p><p>The course covered tools for evaluating browsers and assessing their level of anonymity. We tested several browsers using <a href=\"https:\/\/coveryourtracks.eff.org\" target=\"_new\" rel=\"noreferrer noopener\">https:\/\/coveryourtracks.eff.org<\/a>. Click on the image below to view the details.<\/p><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"vce-row-container\" data-vce-boxed-width=\"true\"><div class=\"vce-row vce-row--col-gap-30 vce-row-equal-height vce-row-content--top\" id=\"el-a7297eef\" data-vce-do-apply=\"all el-a7297eef\"><div class=\"vce-row-content\" data-vce-element-content=\"true\"><div class=\"vce-col vce-col--md-auto vce-col--xs-1 vce-col--xs-last vce-col--xs-first vce-col--sm-last vce-col--sm-first vce-col--md-last vce-col--lg-last vce-col--xl-last vce-col--md-first vce-col--lg-first vce-col--xl-first\" id=\"el-d6306df2\"><div class=\"vce-col-inner\" data-vce-do-apply=\"border margin background  el-d6306df2\"><div class=\"vce-col-content\" data-vce-element-content=\"true\" data-vce-do-apply=\"padding el-d6306df2\"><div class=\"vce-single-image-container vce-single-image--align-left\"><div class=\"vce vce-single-image-wrapper\" id=\"el-3d0c6c5b\" data-vce-do-apply=\"all el-3d0c6c5b\"><figure><div class=\"vce-single-image-figure-inner\" style=\"width: 1024px;\"><a href=\"https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/08\/browsers.jpg\" data-lightbox=\"lightbox-3d0c6c5b\" class=\"vce-single-image-inner vce-single-image--absolute\" style=\"width: 100%; padding-bottom: 56.25%;\"><img loading=\"lazy\" decoding=\"async\" class=\"vce-single-image\"  width=\"1024\" height=\"576\" srcset=\"https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/08\/browsers-1024x576.jpg 1024w, https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/08\/browsers-320x180.jpg 320w, https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/08\/browsers-480x270.jpg 480w, https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/08\/browsers-800x450.jpg 800w\" src=\"https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/08\/browsers-1024x576.jpg\" data-img-src=\"https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/08\/browsers.jpg\" data-attachment-id=\"713\"  alt=\"\" title=\"browsers\" \/><\/a><\/div><figcaption hidden=\"\"><\/figcaption><\/figure><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"vce-row-container\" data-vce-boxed-width=\"true\"><div class=\"vce-row vce-row--col-gap-30 vce-row-equal-height vce-row-content--top\" id=\"el-7ff54df0\" data-vce-do-apply=\"all el-7ff54df0\"><div class=\"vce-row-content\" data-vce-element-content=\"true\"><div class=\"vce-col vce-col--md-auto vce-col--xs-1 vce-col--xs-last vce-col--xs-first vce-col--sm-last vce-col--sm-first vce-col--md-last vce-col--lg-last vce-col--xl-last vce-col--md-first vce-col--lg-first vce-col--xl-first\" id=\"el-eb326445\"><div class=\"vce-col-inner\" data-vce-do-apply=\"border margin background  el-eb326445\"><div class=\"vce-col-content\" data-vce-element-content=\"true\" data-vce-do-apply=\"padding el-eb326445\"><div class=\"vce-text-block\"><div class=\"vce-text-block-wrapper vce\" id=\"el-f85264de\" data-vce-do-apply=\"all el-f85264de\"><h2><span style=\"font-size: 10pt; color: #ff00ff;\">Edge (InPrivate)<\/span><\/h2><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"vce-row-container\" data-vce-boxed-width=\"true\"><div class=\"vce-row vce-row--col-gap-30 vce-row-equal-height vce-row-content--top\" id=\"el-0648eab9\" data-vce-do-apply=\"all el-0648eab9\"><div class=\"vce-row-content\" data-vce-element-content=\"true\"><div class=\"vce-col vce-col--md-auto vce-col--xs-1 vce-col--xs-last vce-col--xs-first vce-col--sm-last vce-col--sm-first vce-col--md-last vce-col--lg-last vce-col--xl-last vce-col--md-first vce-col--lg-first vce-col--xl-first\" id=\"el-a8ba0182\"><div class=\"vce-col-inner\" data-vce-do-apply=\"border margin background  el-a8ba0182\"><div class=\"vce-col-content\" data-vce-element-content=\"true\" data-vce-do-apply=\"padding el-a8ba0182\"><div class=\"vce-single-image-container vce-single-image--align-left\"><div class=\"vce vce-single-image-wrapper\" id=\"el-28224da0\" data-vce-do-apply=\"all el-28224da0\"><figure><div class=\"vce-single-image-figure-inner\" style=\"width: 587px;\"><div class=\"vce-single-image-inner vce-single-image--absolute\" style=\"width: 100%; padding-bottom: 57.4106%;\"><img loading=\"lazy\" decoding=\"async\" class=\"vce-single-image\"  width=\"587\" height=\"337\" srcset=\"https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/08\/edge-1-320x184.png 320w, https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/08\/edge-1-480x276.png 480w, https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/08\/edge-1-587x337.png 587w\" src=\"https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/08\/edge-1-587x337.png\" data-img-src=\"https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/08\/edge-1.png\" data-attachment-id=\"718\"  alt=\"\" title=\"edge\" \/><\/div><\/div><figcaption hidden=\"\"><\/figcaption><\/figure><\/div><\/div><div class=\"vce-text-block\"><div class=\"vce-text-block-wrapper vce\" id=\"el-6d44468c\" data-vce-do-apply=\"all el-6d44468c\"><h2><span style=\"font-size: 10pt; color: #ff00ff;\">Chrome(InCognito)<\/span><\/h2><\/div><\/div><div class=\"vce-single-image-container vce-single-image--align-left\"><div class=\"vce vce-single-image-wrapper\" id=\"el-02655f51\" data-vce-do-apply=\"all el-02655f51\"><figure><div class=\"vce-single-image-figure-inner\" style=\"width: 589px;\"><div class=\"vce-single-image-inner vce-single-image--absolute\" style=\"width: 100%; padding-bottom: 43.8031%;\"><img loading=\"lazy\" decoding=\"async\" class=\"vce-single-image\"  width=\"589\" height=\"258\" srcset=\"https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/08\/chrome-320x140.png 320w, https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/08\/chrome-480x210.png 480w, https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/08\/chrome-589x258.png 589w\" src=\"https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/08\/chrome-589x258.png\" data-img-src=\"https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/08\/chrome.png\" data-attachment-id=\"719\"  alt=\"\" title=\"chrome\" \/><\/div><\/div><figcaption hidden=\"\"><\/figcaption><\/figure><\/div><\/div><div class=\"vce-text-block\"><div class=\"vce-text-block-wrapper vce\" id=\"el-5e9bf445\" data-vce-do-apply=\"all el-5e9bf445\"><p><span style=\"font-size: 10pt; color: #ff00ff;\">Mozilla (Private Mode)<\/span><\/p><\/div><\/div><div class=\"vce-single-image-container vce-single-image--align-left\"><div class=\"vce vce-single-image-wrapper\" id=\"el-32f0a40c\" data-vce-do-apply=\"all el-32f0a40c\"><figure><div class=\"vce-single-image-figure-inner\" style=\"width: 602px;\"><div class=\"vce-single-image-inner vce-single-image--absolute\" style=\"width: 100%; padding-bottom: 50.1661%;\"><img loading=\"lazy\" decoding=\"async\" class=\"vce-single-image\"  width=\"602\" height=\"302\" srcset=\"https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/08\/mozilla-320x161.png 320w, https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/08\/mozilla-480x241.png 480w, https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/08\/mozilla-602x302.png 602w\" src=\"https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/08\/mozilla-602x302.png\" data-img-src=\"https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/08\/mozilla.png\" data-attachment-id=\"720\"  alt=\"\" title=\"mozilla\" \/><\/div><\/div><figcaption hidden=\"\"><\/figcaption><\/figure><\/div><\/div><div class=\"vce-text-block\"><div class=\"vce-text-block-wrapper vce\" id=\"el-12eca3c7\" data-vce-do-apply=\"all el-12eca3c7\"><h2><span style=\"font-size: 10pt; color: #ff00ff;\">Tor Browser&nbsp;<\/span><\/h2><\/div><\/div><div class=\"vce-single-image-container vce-single-image--align-left\"><div class=\"vce vce-single-image-wrapper\" id=\"el-3a68d766\" data-vce-do-apply=\"all el-3a68d766\"><figure><div class=\"vce-single-image-figure-inner\" style=\"width: 603px;\"><div class=\"vce-single-image-inner vce-single-image--absolute\" style=\"width: 100%; padding-bottom: 64.1791%;\"><img loading=\"lazy\" decoding=\"async\" class=\"vce-single-image\"  width=\"603\" height=\"387\" srcset=\"https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/08\/TOR-320x205.png 320w, https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/08\/TOR-480x308.png 480w, https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/08\/TOR-603x387.png 603w\" src=\"https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/08\/TOR-603x387.png\" data-img-src=\"https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/08\/TOR.png\" data-attachment-id=\"721\"  alt=\"\" title=\"TOR\" \/><\/div><\/div><figcaption hidden=\"\"><\/figcaption><\/figure><\/div><\/div><div class=\"vce-text-block\"><div class=\"vce-text-block-wrapper vce\" id=\"el-124d215e\" data-vce-do-apply=\"all el-124d215e\"><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"vce-row-container\" data-vce-boxed-width=\"true\"><div class=\"vce-row vce-row--col-gap-30 vce-row-equal-height vce-row-content--top\" id=\"el-88979e37\" data-vce-do-apply=\"all el-88979e37\"><div class=\"vce-row-content\" data-vce-element-content=\"true\"><div class=\"vce-col vce-col--md-auto vce-col--xs-1 vce-col--xs-last vce-col--xs-first vce-col--sm-last vce-col--sm-first vce-col--md-last vce-col--lg-last vce-col--xl-last vce-col--md-first vce-col--lg-first vce-col--xl-first\" id=\"el-817d348c\"><div class=\"vce-col-inner\" data-vce-do-apply=\"border margin background  el-817d348c\"><div class=\"vce-col-content\" data-vce-element-content=\"true\" data-vce-do-apply=\"padding el-817d348c\"><div class=\"vce-text-block\"><div class=\"vce-text-block-wrapper vce\" id=\"el-87968c3e\" data-vce-do-apply=\"all el-87968c3e\"><p><span style=\"font-size: 18pt; color: #00ff00;\">Part 3: Tools and Services<\/span><\/p><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"vce-row-container\" data-vce-boxed-width=\"true\"><div class=\"vce-row vce-row--col-gap-30 vce-row-equal-height vce-row-content--top\" id=\"el-bf0d8382\" data-vce-do-apply=\"all el-bf0d8382\"><div class=\"vce-row-content\" data-vce-element-content=\"true\"><div class=\"vce-col vce-col--md-auto vce-col--xs-1 vce-col--xs-last vce-col--xs-first vce-col--sm-last vce-col--sm-first vce-col--md-last vce-col--lg-last vce-col--xl-last vce-col--md-first vce-col--lg-first vce-col--xl-first\" id=\"el-ff0370fc\"><div class=\"vce-col-inner\" data-vce-do-apply=\"border margin background  el-ff0370fc\"><div class=\"vce-col-content\" data-vce-element-content=\"true\" data-vce-do-apply=\"padding el-ff0370fc\"><div class=\"vce-text-block\"><div class=\"vce-text-block-wrapper vce\" id=\"el-95ac8979\" data-vce-do-apply=\"all el-95ac8979\"><ol><li><span style=\"color: #ffff00;\"><strong>The Harvester<\/strong>:<\/span> This is an open-source tool used in information gathering or reconnaissance. It collects data from various public sources like search engines, social media platforms, and public databases to gather information such as &nbsp;emails, subdomain names, IPs and URLs , open ports\/ banners &amp; employee names using multiple public data sources.<\/li><\/ol><p>&nbsp;<\/p><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"vce-row-container\" data-vce-boxed-width=\"true\"><div class=\"vce-row vce-row--col-gap-30 vce-row-equal-height vce-row-content--top\" id=\"el-5c243c70\" data-vce-do-apply=\"all el-5c243c70\"><div class=\"vce-row-content\" data-vce-element-content=\"true\"><div class=\"vce-col vce-col--md-auto vce-col--xs-1 vce-col--xs-last vce-col--xs-first vce-col--sm-last vce-col--sm-first vce-col--md-last vce-col--lg-last vce-col--xl-last vce-col--md-first vce-col--lg-first vce-col--xl-first\" id=\"el-714edebe\"><div class=\"vce-col-inner\" data-vce-do-apply=\"border margin background  el-714edebe\"><div class=\"vce-col-content\" data-vce-element-content=\"true\" data-vce-do-apply=\"padding el-714edebe\"><div class=\"vce-single-image-container vce-single-image--align-left\"><div class=\"vce vce-single-image-wrapper\" id=\"el-c26fbd90\" data-vce-do-apply=\"all el-c26fbd90\"><figure><div class=\"vce-single-image-figure-inner\" style=\"width: 799px;\"><div class=\"vce-single-image-inner vce-single-image--absolute\" style=\"width: 100%; padding-bottom: 51.9399%;\"><img loading=\"lazy\" decoding=\"async\" class=\"vce-single-image\"  width=\"799\" height=\"415\" srcset=\"https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/08\/theharvester1-320x166.jpg 320w, https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/08\/theharvester1-480x249.jpg 480w, https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/08\/theharvester1-799x415.jpg 799w\" src=\"https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/08\/theharvester1-799x415.jpg\" data-img-src=\"https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/08\/theharvester1.jpg\" data-attachment-id=\"729\"  alt=\"\" title=\"theharvester1\" \/><\/div><\/div><figcaption hidden=\"\"><\/figcaption><\/figure><\/div><\/div><div class=\"vce-single-image-container vce-single-image--align-left\"><div class=\"vce vce-single-image-wrapper\" id=\"el-c874c7fd\" data-vce-do-apply=\"all el-c874c7fd\"><figure><div class=\"vce-single-image-figure-inner\" style=\"width: 802px;\"><div class=\"vce-single-image-inner vce-single-image--absolute\" style=\"width: 100%; padding-bottom: 77.0574%;\"><img loading=\"lazy\" decoding=\"async\" class=\"vce-single-image\"  width=\"802\" height=\"618\" srcset=\"https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/08\/theharvester3-320x247.jpg 320w, https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/08\/theharvester3-480x370.jpg 480w, https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/08\/theharvester3-800x616.jpg 800w, https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/08\/theharvester3-802x575.jpg 802w\" src=\"https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/08\/theharvester3-802x575.jpg\" data-img-src=\"https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/08\/theharvester3.jpg\" data-attachment-id=\"730\"  alt=\"\" title=\"theharvester3\" \/><\/div><\/div><figcaption hidden=\"\"><\/figcaption><\/figure><\/div><\/div><div class=\"vce-text-block\"><div class=\"vce-text-block-wrapper vce\" id=\"el-182a5198\" data-vce-do-apply=\"all el-182a5198\"><p><strong><span style=\"color: #ffffff;\">2<\/span>. <span style=\"color: #ffff00;\">Google Dorks<\/span><\/strong><span style=\"color: #ffff00;\">:<\/span> These are advanced search queries used in Google to find specific information that might not be easily accessible through regular searches. By using special operators and syntax, users can uncover sensitive data, vulnerabilities, and other valuable information.<\/p><\/div><\/div><div class=\"vce-single-image-container vce-single-image--align-left\"><div class=\"vce vce-single-image-wrapper\" id=\"el-03c63a50\" data-vce-do-apply=\"all el-03c63a50\"><figure><div class=\"vce-single-image-figure-inner\" style=\"width: 602px;\"><div class=\"vce-single-image-inner vce-single-image--absolute\" style=\"width: 100%; padding-bottom: 39.8671%;\"><img loading=\"lazy\" decoding=\"async\" class=\"vce-single-image\"  width=\"602\" height=\"240\" srcset=\"https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/08\/Dorks-320x128.png 320w, https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/08\/Dorks-480x191.png 480w, https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/08\/Dorks-602x240.png 602w\" src=\"https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/08\/Dorks-602x240.png\" data-img-src=\"https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/08\/Dorks.png\" data-attachment-id=\"726\"  alt=\"\" title=\"Dorks\" \/><\/div><\/div><figcaption hidden=\"\"><\/figcaption><\/figure><\/div><\/div><div class=\"vce-single-image-container vce-single-image--align-left\"><div class=\"vce vce-single-image-wrapper\" id=\"el-2ff3ae82\" data-vce-do-apply=\"all el-2ff3ae82\"><figure><div class=\"vce-single-image-figure-inner\" style=\"width: 1024px;\"><div class=\"vce-single-image-inner vce-single-image--absolute\" style=\"width: 100%; padding-bottom: 66.5039%;\"><img loading=\"lazy\" decoding=\"async\" class=\"vce-single-image\"  width=\"1024\" height=\"681\" srcset=\"https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/08\/dorks-1024x681.jpg 1024w, https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/08\/dorks-320x213.jpg 320w, https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/08\/dorks-480x319.jpg 480w, https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/08\/dorks-800x532.jpg 800w\" src=\"https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/08\/dorks-1024x681.jpg\" data-img-src=\"https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/08\/dorks.jpg\" data-attachment-id=\"732\"  alt=\"\" title=\"dorks\" \/><\/div><\/div><figcaption hidden=\"\"><\/figcaption><\/figure><\/div><\/div><div class=\"vce-text-block\"><div class=\"vce-text-block-wrapper vce\" id=\"el-94f02c8b\" data-vce-do-apply=\"all el-94f02c8b\"><p><strong>3.<span style=\"color: #ffff00;\">Maltego<\/span><\/strong> is a powerful open-source intelligence (OSINT) used for gathering and visualizing information from various sources. It helps users uncover relationships between people, groups, websites, and other entities by creating detailed graphical representations of the data. This tool is commonly used in cybersecurity, investigations, and intelligence to map out and analyze complex networks of information.<\/p><\/div><\/div><div class=\"vce-single-image-container vce-single-image--align-left\"><div class=\"vce vce-single-image-wrapper\" id=\"el-f2e9c651\" data-vce-do-apply=\"all el-f2e9c651\"><figure><div class=\"vce-single-image-figure-inner\" style=\"width: 578px;\"><div class=\"vce-single-image-inner vce-single-image--absolute\" style=\"width: 100%; padding-bottom: 73.0104%;\"><img loading=\"lazy\" decoding=\"async\" class=\"vce-single-image\"  width=\"578\" height=\"422\" srcset=\"https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/08\/maltego-320x234.jpg 320w, https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/08\/maltego-480x350.jpg 480w, https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/08\/maltego-578x410.jpg 578w\" src=\"https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/08\/maltego-578x410.jpg\" data-img-src=\"https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/08\/maltego.jpg\" data-attachment-id=\"734\"  alt=\"\" title=\"maltego\" \/><\/div><\/div><figcaption hidden=\"\"><\/figcaption><\/figure><\/div><\/div><div class=\"vce-text-block\"><div class=\"vce-text-block-wrapper vce\" id=\"el-dd696c5c\" data-vce-do-apply=\"all el-dd696c5c\"><p>Additional resources :&nbsp;<a href=\"https:\/\/www.youtube.com\/watch?v=onHHXNDnkrs\">Maltego: The Ultimate OSINT &amp; Cyber Investigation Tool (youtube.com) by <\/a><a href=\"https:\/\/www.youtube.com\/@theGaryRuddell\">Gary Ruddell<\/a><\/p><\/div><\/div><div class=\"vce-text-block\"><div class=\"vce-text-block-wrapper vce\" id=\"el-99a5dbc9\" data-vce-do-apply=\"all el-99a5dbc9\"><p><strong>4.<span style=\"color: #ffff00;\">OSINT Framework<\/span><\/strong><span style=\"color: #ffff00;\">:<\/span> The OSINT (Open Source Intelligence) Framework is a collection of tools, resources, and techniques used to gather publicly available information for investigative purposes. It provides a structured approach to finding and analyzing open-source data across various domains, including social media, websites, and databases.&nbsp;<\/p><p>See the link below for a summary chart of useful tools for OSINT from Social Links.<\/p><p><a href=\"https:\/\/sociallinks.io\/resources\">OSINT Resources | Materials | Insights | Social Links<\/a><\/p><\/div><\/div><div class=\"vce-single-image-container vce-single-image--align-left\"><div class=\"vce vce-single-image-wrapper\" id=\"el-c75d3f29\" data-vce-do-apply=\"all el-c75d3f29\"><figure><div class=\"vce-single-image-figure-inner\" style=\"width: 602px;\"><div class=\"vce-single-image-inner vce-single-image--absolute vce-single-image-zoom-container\" style=\"width: 100%; padding-bottom: 68.2724%; position: relative; overflow: hidden;\"><img loading=\"lazy\" decoding=\"async\" class=\"vce-single-image\"  width=\"602\" height=\"411\" srcset=\"https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/08\/SL-320x218.png 320w, https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/08\/SL-480x328.png 480w, https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/08\/SL-602x411.png 602w\" src=\"https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/08\/SL-602x411.png\" data-img-src=\"https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/08\/SL.png\" data-attachment-id=\"727\"  alt=\"\" title=\"SL\" \/><img decoding=\"async\" src=\"https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/08\/SL.png\" class=\"zoomImg\" style=\"position: absolute; top: -0.0109777px; left: -0.0044985px; opacity: 0; width: 602px; height: 411px; border: none; max-width: none; max-height: none;\"><\/div><\/div><figcaption hidden=\"\"><\/figcaption><\/figure><\/div><\/div><div class=\"vce-text-block\"><div class=\"vce-text-block-wrapper vce\" id=\"el-0d226a22\" data-vce-do-apply=\"all el-0d226a22\"><p><strong>5.<span style=\"color: #ffff00;\">Reverse Image Searching (TinEye, Google)<\/span><\/strong><span style=\"color: #ffff00;\">:<\/span> These tools allow users to upload an image or provide an image URL to find out where that image appears on the web. They are useful for tracking the origin of an image, finding higher resolution versions, or verifying the authenticity of an image.<\/p><\/div><\/div><div class=\"vce-single-image-container vce-single-image--align-left\"><div class=\"vce vce-single-image-wrapper\" id=\"el-8f289f84\" data-vce-do-apply=\"all el-8f289f84\"><figure><div class=\"vce-single-image-figure-inner\" style=\"width: 617px;\"><div class=\"vce-single-image-inner vce-single-image--absolute\" style=\"width: 100%; padding-bottom: 145.543%;\"><img loading=\"lazy\" decoding=\"async\" class=\"vce-single-image\"  width=\"617\" height=\"898\" srcset=\"https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/08\/kali-320x466.jpg 320w, https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/08\/kali-480x699.jpg 480w, https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/08\/kali-617x575.jpg 617w\" src=\"https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/08\/kali-617x575.jpg\" data-img-src=\"https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/08\/kali.jpg\" data-attachment-id=\"737\"  alt=\"\" title=\"kali\" \/><\/div><\/div><figcaption hidden=\"\"><\/figcaption><\/figure><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Open-source intelligence (OSINT)&nbsp; is more than just Googling information. While a quick search may provide basic answers, it often lacks depth and completeness. Effective OSINT requires setting clear objectives, using diverse and verified sources, and applying advanced search techniques while meticulously documenting and cross-checking data for accuracy.Let\u2019s explore the &#8220;Introduction to OSINT&#8221; by Security Blue [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":802,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"site-container-style":"default","site-container-layout":"default","site-sidebar-layout":"default","site-transparent-header":"default","prose-style":"enable","disable-article-header":"default","disable-site-header":"default","disable-site-footer":"default","disable-content-area-spacing":"default","footnotes":""},"categories":[12],"tags":[],"class_list":["post-709","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-labs"],"_links":{"self":[{"href":"https:\/\/hackmybox.com\/index.php\/wp-json\/wp\/v2\/posts\/709","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/hackmybox.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/hackmybox.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/hackmybox.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/hackmybox.com\/index.php\/wp-json\/wp\/v2\/comments?post=709"}],"version-history":[{"count":16,"href":"https:\/\/hackmybox.com\/index.php\/wp-json\/wp\/v2\/posts\/709\/revisions"}],"predecessor-version":[{"id":849,"href":"https:\/\/hackmybox.com\/index.php\/wp-json\/wp\/v2\/posts\/709\/revisions\/849"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/hackmybox.com\/index.php\/wp-json\/wp\/v2\/media\/802"}],"wp:attachment":[{"href":"https:\/\/hackmybox.com\/index.php\/wp-json\/wp\/v2\/media?parent=709"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/hackmybox.com\/index.php\/wp-json\/wp\/v2\/categories?post=709"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/hackmybox.com\/index.php\/wp-json\/wp\/v2\/tags?post=709"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}