OSINT 2025: Tudo que Você Precisa Saber
4 min read
5 months ago
Published on Mar 12, 2025
This response is partially generated with the help of AI. It may contain inaccuracies.
Table of Contents
Introduction
This tutorial provides a comprehensive guide to Open Source Intelligence (OSINT) techniques as discussed in the video "OSINT 2025: Tudo que Você Precisa Saber" by HackStation. You'll learn about various tools and methods for gathering information from publicly available sources, emphasizing ethical and responsible use.
Step 1: Understanding OSINT
- OSINT refers to the practice of collecting data from publicly available sources to analyze and utilize for various purposes.
- It is important to use these techniques ethically, avoiding any illegal activities that could violate privacy or legal standards.
Step 2: Using WHOIS for Domain Information
- WHOIS is a protocol that allows you to query databases to obtain information about domain names.
- Steps to use WHOIS:
- Access a WHOIS lookup tool (e.g., whois.domaintools.com).
- Enter the domain name you want to investigate.
- Review the registration details, including the owner, registration date, and expiration date.
Step 3: Google Hacking Techniques
- Google hacking involves using advanced search operators to find specific information on the web.
- Useful operators include:
site:
to search within a specific website.filetype:
to find specific file types (e.g., PDFs, DOCs).
- Example search:
site:example.com filetype:pdf
to find PDF documents on a specific site.
Step 4: Utilizing theHarvester for Email and Subdomain Collection
- theHarvester is a tool for gathering emails and subdomains from various search engines.
- Steps to use theHarvester:
- Install theHarvester using GitHub or package managers.
- Run the command:
theharvester -d example.com -b google
- Analyze the collected information for potential targets.
Step 5: Analyzing Metadata with ExifTool
- ExifTool is a powerful tool for reading and writing metadata in files, particularly images.
- Steps to use ExifTool:
- Download and install ExifTool.
- Run the command:
exiftool image.jpg
- Review the metadata for information such as GPS coordinates and timestamps.
Step 6: Investigating People with Sherlock
- Sherlock is a tool used to find usernames across multiple social media platforms.
- Steps to use Sherlock:
- Install Sherlock from its GitHub repository.
- Run the command:
python sherlock.py username
- Review the output for social media profiles associated with the username.
Step 7: Mapping Relationships with Maltego
- Maltego is a tool for graphical link analysis, visualizing relationships between entities.
- Steps to use Maltego:
- Download and install Maltego.
- Create a new graph and add entities (e.g., domains, emails).
- Run transforms to gather data and visualize connections.
Step 8: Exploring Shodan for IoT Devices
- Shodan is a search engine for Internet-connected devices.
- Steps to use Shodan:
- Create an account on Shodan.io.
- Use specific queries to find devices (e.g.,
port:80
for web servers). - Analyze the results for vulnerabilities.
Step 9: Finding Faces with PimEyes
- PimEyes is a face recognition search engine.
- Steps to use PimEyes:
- Go to the PimEyes website.
- Upload a photo or enter a URL with an image.
- Review search results for matching images across the web.
Step 10: Conducting Reverse Image Searches with Google Image Search
- Google Image Search allows you to find the source of an image or similar images.
- Steps to use Google Image Search:
- Go to Google Images.
- Upload an image or paste the image URL.
- Analyze results for information about the image's origin.
Step 11: Exploring EPIEOS for Enhanced OSINT
- EPIEOS is a lesser-known tool that can assist in OSINT tasks.
- Steps to use EPIEOS:
- Visit the EPIEOS website.
- Follow the instructions to utilize its features for gathering information.
Conclusion
This tutorial highlighted essential OSINT techniques and tools, including WHOIS, Google hacking, theHarvester, ExifTool, Sherlock, Maltego, Shodan, PimEyes, Google Image Search, and EPIEOS. Remember to apply these methods ethically and responsibly. You can further explore each tool for deeper insights and applications in your OSINT endeavors.