0% found this document useful (0 votes)
76 views3 pages

OSINT Cheatsheet

The document provides a comprehensive guide on Open Source Intelligence (OSINT) for investigative journalism, emphasizing the importance of social media analysis, public records, and various verification techniques. It outlines tools and methods for gathering and analyzing data from platforms like Facebook, Twitter, and LinkedIn, as well as privacy and ethical considerations. Additionally, it includes strategies for evasion, metadata analysis, and leveraging the dark web for enhanced investigations.

Uploaded by

Tony Starck
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
76 views3 pages

OSINT Cheatsheet

The document provides a comprehensive guide on Open Source Intelligence (OSINT) for investigative journalism, emphasizing the importance of social media analysis, public records, and various verification techniques. It outlines tools and methods for gathering and analyzing data from platforms like Facebook, Twitter, and LinkedIn, as well as privacy and ethical considerations. Additionally, it includes strategies for evasion, metadata analysis, and leveraging the dark web for enhanced investigations.

Uploaded by

Tony Starck
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

OSINT: Open Source Intelligence

Like Repost Objective: Investigating a Political Scandal Example OSINT Script for Social Media Platforms

Background Research
Facebook OSINT
Why is OSINT Important for Investigative Journalism? Social Media Analysis
Public Records
Verification Lead Generation Context
Image Verification
Network Analysis
Check Sources Identify Key Players Historical Data
Authenticate Media Uncover Connections Geographical Information
Fact-Check Statements Find Documents Social Context How to Get Started with Social Media OSINT?

Getting Started with OSINT


Define Your Document and
Use the Right Tools Objectives Analyze Findings
Search Engines Social Media Analysis Image Verification Stay Updated and
Choose Relevant Social
Media Platforms Learn Continuously

Use OSINT Tools Maintain Ethical


and Techniques Standards

Public Records Mapping and Geolocation Develop Search


Queries

Commonly Used Tools for Social Media OSINT


Master Search Techniques
Boolean Operators - AND, OR, and NOT
Twitter OSINT
Site Search - site:[Link] Data Collection and Aggregation Tools
File Type Search - filetype:pdf
Quotation Marks - quotes

Social Media Investigation


Profiles and Posts Social Media Monitoring and Management Tools
Hashtags and Keywords
Geotagging
Archived Data

Image and Video Analysis


Metadata
Reverse Image Search Analysis and Visualization Tools
Frame Analysis

Public Records and Databases


Government Databases
Corporate Records
Academic Publications
Search Engines and Advanced Search Techniques

Privacy and Ethics

Verify Sources Respect Privacy Legal Boundaries


Browser Extensions and Plugins
OSINT: Open Source Intelligence

Like Repost YouTube OSINT Objective:

Facebook: Gather information about a


company’s public profile on Facebook.
Example OSINT Script for Social Media Platforms
Twitter : Monitor tweets related to a specific
LinkedIn OSINT hashtag.

LinkedIn: Retrieve information from a LinkedIn


company page.

Instagram: Extract posts and engagement


metrics from a user’s Instagram profile.

Mastering OSINT Evasion Techniques


Instagram OSINT
Google Dorking
Shodan Maltego

site: site: [Link]


Exposed servers Create a new graph
filetype: filetype:pdf
Open ports Add entities
intitle: intitle:"index of"
Vulnerable devices Run transforms
inurl: inurl:admin

Anonymous Browsing and Communication Social Media Hygiene

Tor and VPNs Virtual Machines (VMs) and Private Profiles


Encrypted Messaging Live Operating Systems Scrubbing Metadata
Private Email Services Temporary and Disposable Decoy Accounts
Accounts
Secure File Sharing Regular Audits and Cleanup
Regular Data Deletion
Browser Fingerprinting Prevention Limit Cross-Platform Sharing
VUse Multiple Identities
Script and Tracker Blockers Control Tagging and Mentions
OSINT: Open Source Intelligence

Social Media Hygiene Metadata and Geotagging Leveraging the Dark Web

Alias and Pseudonyms Disable Geotagging Use Anonymous File Formats Check Metadata on Tor for Access
Mindful Posting Habits On Cameras Received Files Alternative Networks
PDFs and Documents
Deactivate or Delete Inactive Use Metadata Anonymizers Be Mindful of File Sharing Services Monitor and Control Third-
Accounts Party Apps Employing Misinformation and Digital Deception
Automated Processes Avoid Social Media Uploads
Use Social Media Privacy Tools Audit Your Existing Files Deepfakes and AI-Generated Content
Encrypt Sensitive Files Location Sharing
Avoid Oversharing in Public Groups Batch Processing Secure Storage False Narratives

Quick Overview
OSIT

Getting started Real Name Searches Username Searches Email Address Searches Phone Number Searches Domain Name Searches

Gather Basic Information Governmental Resources Reverse Username Lookup Google Dorks Social Media Search Google Dorks
Google Dorks(google dorks) Google Dorks for Usernames Email Tools Phone Lookup Services Whois and Reverse Whois
Start with What You Know People Search Websites Username Search Tools PhoneInfoga Same IP and Passive DNS
Compromised Databases
Define Your Requirements
Gather the Data
Analyze Collected Data
Pivot Using New Data Location Searches Use Specialized Tools
Image Searches SOCMINT
Validate Assumptions
Generate a Report Geolocation Tools Maltego
Reverse Image Search Spiderfoot
IP-Based Geolocation EXIF Data Analysis Recon-ng

Like Comment Repost [Link] [Link]

You might also like