• Home
  • News
  • Software
  • Knowledge
  • MMO
  • Tips
  • Security
  • Network
  • Office
AnonyViet - English Version
  • Home
  • News
  • Software
  • Knowledge
  • MMO
  • Tips
  • Security
  • Network
  • Office
No Result
View All Result
  • Home
  • News
  • Software
  • Knowledge
  • MMO
  • Tips
  • Security
  • Network
  • Office
No Result
View All Result
AnonyViet - English Version
No Result
View All Result

What is OSINT? How is OSINT used for Internet tracing?

AnonyViet by AnonyViet
January 26, 2023
in Security
0

The first step in a targeted attack – or Red Team penetration testing – is to gather valuable information about the target. While there are many ways and means to do this secretly, intelligence gathering usually begins with gathering information from publicly available sources, collectively known as open source intelligence or intelligence. OSINT. Now that there are countless ways OSINT can be legitimately obtained thanks to social media and the prevalence of online activities, this may be all it takes to give attackers everything they need to profile an organization or individual.

Join the channel Telegram of the AnonyViet 👉 Link 👈

What is OSINT?  And how is it used?

In this article, I will help you learn all about OSINT and how you can learn how to use OSINT tools to better understand how hackers gather information.

What is OSINT?

If you’ve heard this name but are still wondering what it means, OSINT stands for open source intelligence, refers to any information that can be lawfully obtained from free, public sources about an individual or entity. In practice, that means information found on the internet, but technically any public information falls under OSINT whether it’s a book or report, press article, or statement in the press release.

OSINT also includes information that can be found in different media types. Although we often think of it as text-based, information in images, videos, webinars, speeches, and conferences all fall under OSINT.

What is OSINT used for?

By gathering publicly available sources of information about a particular target, an attacker – or penetration tester You can profile an audience to better understand their characteristics and narrow down the areas to look for. An attacker can use the information obtained to develop an attack plan. Targeted cyberattacks, like military attacks, begin with reconnaissance, and the first stage of digital reconnaissance is passive information gathering without compromising the target.

Collecting OSINT about yourself or your own business is also a way to check what information you are leaking from publicly available sources. Once you know what information can be gathered from public sources, you can use it to help you or your security team develop better defense strategies. What vulnerabilities can your public information infer? What ways could an attacker use?

What is OSINT Framework?

Gathering information from a variety of sources is a very time-consuming task, but there are many tools that can make gathering information simpler. While you may have heard of tools like Shodan and port scanning tools like Nmap and Zenmap, those tools are far from complete. Fortunately, the security researchers themselves have documented the tools available. Or use the free OSINT tool was introduced by AnonnyViet.

A pretty good place to start is OSINT Framework compiled by Justin Nordine. The framework provides options for a wide range of tasks from collecting email addresses to searching on social media or the dark web.

What is OSINT Framework?

In many articles about OSINT tools, you will see one or two tools available in Kali Linux, such as theHarvester or Maltegobut for a complete overview of the OSINT tools available in Kali, see the list Kali tool this page gives you both the tools and examples of how to use them.

tool osint kali linux

Tools like Nmap and Recon-ng are all hacker’s favorite tools. The Nmap tool allows you to find system information through IP addresses such as open ports, security holes, devices using that IP, etc.

Nmap

Recon-Ng is a tool written in Python by Tim Tomes for web scouting. You can use it to do things like list subdomains with a given domain, but there are dozens of modules that let you connect to things like the internet search engine Shodan, Github, Jigsaw, Virustotal and others, when you add API keys. Modules are classified in groups such as Recon, Reporting and Discovery modules.

What is OSINT?  How is OSINT used for Internet tracing?  7

OSINT tools, techniques and other resources

Of course, one of the best tools to use in intelligence gathering are search engines like Google, Bing, etc. Actually, there are dozens of search engines and some of them can. returns better results than other tools for specific types of queries. The problem is, how can you query these many tools efficiently?

A great tool that solves this problem and makes web queries more efficient is Searx. Searx is a metasearch engine that allows you to anonymously and simultaneously collect results from more than 70 search services. Searx is free and you can even host your own version for maximum privacy. Users are neither tracked nor profiled and cookies are disabled by default. Searx can also be used on Tor for online anonymity.

Other OSINT tools, techniques and resources Searx

Many public versions of Searx are modded for those of you who don’t want to use the existing platform. To watch Searx wiki for more list.

What is OSINT?  How is OSINT used for Internet tracing?  8

A great place to stay up to date with anything on the Internet is to follow people on Twitter. However, keeping track of everything on Twitter can be difficult. Luckily, there’s also an OSINT tool for that, called Twint.

Twint is a Twitter crawler tool written in Python that makes it easy for you to anonymously collect and search information on Twitter without signing up for Twitter or using an API key like you have to with other tools. like Recon-ng. With Twint, no authentication or API usage is required. Just install the tool and get started. You can search by user, geographic location, and time range, these are just some of Twint’s options.

Twint

So how to use Twint to help you keep up with new technologies evolving in OSINT? Since Twint allows you to specify preferences, you can find new tweets tagged with #OSINT daily. You can automate that script and send the results to the database for more convenient viewing using the option --database of Twint to save in SQLite format.

twint -s '#osint' --since 2019-07-17

What is OSINT?  How is OSINT used for Internet tracing?  9

There have been 58 posts as of July 17, 2019.

Another great tool you can use to collect public information is Metagoofil. This tool uses Google search engine to retrieve public PDF, Word, Powerpoint and Excel files from a given domain. It can then automatically extract data from these documents to generate a report that lists information such as user name, software version, server, and hostname.

What is OSINT?  How is OSINT used for Internet tracing?  ten

Conclusion

In this article, I have introduced the most basic concept of OSINT and why it is useful. I have provided you with the tools and instructions on how to use them. There are also websites that learn about OSINT.

For anyone entering the cybersecurity field, understanding how OSINT is collected is an important skill. Whether you’re protecting a corporate network or testing a network’s weaknesses, the more information you have, the better able you are to see vulnerabilities. Armed with that knowledge, you can continue to develop better defensive strategies.

The article achieved: 5/5 – (101 votes)

Tags: InternetOSINTTracing
Previous Post

How to set Chrome to use less RAM

Next Post

Lesson 11: Move Column – Move columns – Basic Excel

AnonyViet

AnonyViet

Related Posts

How to use hackers use Splitfus to execute PowerShell malicious code
Security

How to use hackers use Splitfus to execute PowerShell malicious code

July 20, 2025
How to implement Shellcode Injection attack technique with Autoit
Security

How to implement Shellcode Injection attack technique with Autoit

March 14, 2025
How to exploit the holy hole of Hijacking on Windows
Security

How to exploit the holy hole of Hijacking on Windows

March 8, 2025
Hamamal: Shellcode execution technique from afar to overcome Antivirus's discovery
Security

Hamamal: Shellcode execution technique from afar to overcome Antivirus's discovery

February 10, 2025
Snov.io Email Finder: Search emails with only company name/domain name/LinkedIn profile
Security

Snov.io Email Finder: Search emails with only company name/domain name/LinkedIn profile

December 14, 2024
Capsolver: Automatic solution solution for business
Security

Capsolver: Automatic solution solution for business

December 12, 2024
Next Post
Lesson 11: Move Column – Move columns – Basic Excel

Lesson 11: Move Column - Move columns - Basic Excel

0 0 votes
Article Rating
Subscribe
Login
Notify of
guest

guest

0 Comments
Oldest
Newest Most Voted
Inline Feedbacks
View all comments

Recent News

Instructions on how to format text on the Windows 11 notepad

Instructions on how to format text on the Windows 11 notepad

August 16, 2025
Instructions for receiving 80GB of free data from VinaPhone from August 15

Instructions for receiving 80GB of free data from VinaPhone from August 15

August 15, 2025
Online driving exam preparation: Support theory and practice

Online driving exam preparation: Support theory and practice

August 15, 2025
How to add application to your favorite bar

How to add application to your favorite bar

August 14, 2025
Instructions on how to format text on the Windows 11 notepad

Instructions on how to format text on the Windows 11 notepad

August 16, 2025
Instructions for receiving 80GB of free data from VinaPhone from August 15

Instructions for receiving 80GB of free data from VinaPhone from August 15

August 15, 2025
Online driving exam preparation: Support theory and practice

Online driving exam preparation: Support theory and practice

August 15, 2025
AnonyViet - English Version

AnonyViet

AnonyViet is a website share knowledge that you have never learned in school!

We are ready to welcome your comments, as well as your articles sent to AnonyViet.

Follow Us

Contact:

Email: anonyviet.com[@]gmail.com

Main Website: https://anonyviet.com

Recent News

Instructions on how to format text on the Windows 11 notepad

Instructions on how to format text on the Windows 11 notepad

August 16, 2025
Instructions for receiving 80GB of free data from VinaPhone from August 15

Instructions for receiving 80GB of free data from VinaPhone from August 15

August 15, 2025
  • Home
  • Home 2
  • Home 3
  • Home 4
  • Home 5
  • Home 6
  • Next Dest Page
  • Sample Page

©2024 AnonyVietFor Knowledge kqxs hôm nay xem phim miễn phí mm88 8XBET mm88 trang chủ new88

No Result
View All Result
  • Home
  • News
  • Software
  • Knowledge
  • MMO
  • Tips
  • Security
  • Network
  • Office

©2024 AnonyVietFor Knowledge kqxs hôm nay xem phim miễn phí mm88 8XBET mm88 trang chủ new88

wpDiscuz
0
0
Would love your thoughts, please comment.x
()
x
| Reply