官术网_书友最值得收藏!

Open source intelligence 

Open source intelligence (OSINT), as its name suggests, involves finding information about a defined target using available sources online. It can be done using many techniques:

  • Conducting search queries in many search engines
  • Gaining information from social media networks
  • Searching in deep web directories and the hidden wiki
  • Using forum and discussion boards

For example, if you want to search for a specific employee, you can use a theHarvester tool, and it will help find all public information about that person.

You can get theHarvester from its GitHub repository using this command from your console:

git clone https://github.com/laramies/theHarvester 

Then, type ./theHarvester to run the script.

For example, if you want to collect information about a targetwebsite using Google search, simply run the following command:

theharvester -d   targetwebsite.org  -l 100 -b google 

Here, the -l option is the limited number of results and -b  indicates the search engine. In our case, we used the Google search engine:

Do you know that the known web represents only 4% of the internet. There is another space called the deep web. It contains 7,500 terabytes of information that means more than  500 billion pages.

It is an advantage to gather information from the hidden web, not only for reconnaissance purposes but for competitive intelligence. To access the deep web, you simply have to download the Tor Browser via its official website https://www.torproject.org/ and install it. Open the browser and hit Connect to access the network:

Now, you are surfing the hidden web. You can use the hidden wiki for Tor websites from this link, http://wiki5kauuihowqi5.onion (they are represented as  DomainName.onion), or simply use the DuckDuckGo search engine:

Not only you can search for personal identifiable information, but you can also search for online devices and even industrial control systems. For example, you can check www.shodan.io. This search engine will help you find devices online. The following screenshot is publicly available information about wind turbines searched by Shodan.io:

To discover the great potential of the Shodan search engine, let's take a glimpse into the power of this giant. First, go to www.shodan.io and create a new account:

Use the search bar to enter a search query, or you can simply hit a predefined category: Netcams, default password, dreambox, industrial control systems, and so on. This is a snippet of the most popular search tags:

Let's hit Netcams as a demonstration. According to the screenshot listed as follows, the search engine found at least 8,632 publicly available sources of Netcam information, including their IP addresses with detailed descriptions about them:

Also, you can use a real-time map to search online devices such as routers:

主站蜘蛛池模板: 南郑县| 和田县| 涡阳县| 朝阳市| 乌兰县| 科技| 毕节市| 屏东市| 六枝特区| 静安区| 湟中县| 岳阳县| 柘荣县| 阿尔山市| 民勤县| 兴国县| 澄迈县| 桐乡市| 靖边县| 仁布县| 六枝特区| 墨竹工卡县| 阳东县| 辽源市| 兴业县| 香港 | 姚安县| 高密市| 南岸区| 尤溪县| 静宁县| 遵化市| 彩票| 山阴县| 缙云县| 铜陵市| 新巴尔虎左旗| 洞口县| 福泉市| 双流县| 绍兴市|