Skip to content

Latest commit

 

History

History

Folders and files

NameName
Last commit message
Last commit date

parent directory

..
 
 

README.md

OSINT

Open Source Intelligence gathering for CTF challenges.

Quick wins

  • Try username pivots first; many CTF personas reuse handles
  • If email is available, pivot to breached data/metadata
  • Keep an "all-in-one" framework handy for categories you forget
  • Check EXIF data on images for GPS coordinates

Username Hunting

Tools

# Sherlock usage
python3 sherlock username

# Check specific sites
python3 sherlock username --site twitter --site github

Email Investigation

Tools

Email header analysis

Received: from mail.example.com
X-Originating-IP: [1.2.3.4]

Image Analysis

Reverse image search

EXIF metadata

# Extract metadata
exiftool image.jpg

# Look for GPS coordinates
exiftool -gps* image.jpg

# Remove metadata (for opsec)
exiftool -all= image.jpg

Geolocation from images

Google Dorking

# Limit to domain
site:target.com

# Find specific file types
filetype:pdf confidential
filetype:sql password

# Directory listings
intitle:"index of"

# Admin pages
inurl:admin

# Leaked credentials
"password" filetype:log

# Config files
filetype:env DB_PASSWORD

# Backup files
filetype:bak OR filetype:backup

# Combine operators
site:target.com filetype:pdf intext:confidential

Domain Research

WHOIS

whois example.com

DNS

# DNS records
dig example.com ANY
nslookup -type=any example.com

# Zone transfer (if allowed)
dig axfr @ns1.example.com example.com

# Subdomain enumeration
subfinder -d example.com

Historical data

Social Media

Twitter/X

  • Advanced search: from:username since:2023-01-01 until:2023-12-31
  • Deleted tweets: Wayback Machine

GitHub

# Search in code
password filename:.env
api_key extension:json

LinkedIn

  • Use Google: site:linkedin.com "target company"

Phone Numbers

IP/Network

# IP geolocation
curl ipinfo.io/1.2.3.4

# Shodan search
shodan search "hostname:target.com"

Tools

Framework