A hands-on introduction to Open Source Intelligence (OSINT) techniques through a real-world investigative challenge.
- Computer with internet connection
- Web browser with developer tools
- Basic understanding of social media platforms
- Image viewer/editor for analysis
- Google Earth or similar mapping tools (optional)
- Patience and attention to detail
This workshop presents a single investigative challenge that requires combining multiple OSINT techniques to uncover information about an individual. You'll use publicly available information to answer specific questions through careful analysis and cross-referencing.
Your task is to investigate a Twitter/X account and uncover specific information about the account owner through careful analysis of their digital footprint.
Starting Point: https://x.com/F4UXT0GR4PH3R/status/1989072753849430440?s=20
Investigation Objectives:
- What is the name of the person who owns this twitter account? (First Last)
- Where does this person reside? (City)
- What is the name of their boss? (First Last)
- What is the name of the hotel they are currently staying at?
Submit the answers at: https://csec.umd.edu/workshop-ans/osint-ans.html
Image Analysis:
- ExifTool - Extract metadata
- TinEye - Reverse image search
- Google Images - Reverse search
- Yandex Images - Alternative reverse search
Search Techniques:
- Advanced search operators
- Cached page viewing
- Archive.org Wayback Machine
- Social media search tools
Location Intelligence:
- Google Earth/Maps
- Street View services
- Geotagging tools
- Sun position calculators
Google Search Operators:
site:twitter.com "username" # Search within site
"exact phrase" # Exact match
-exclude # Exclude term
filetype:pdf # File type search
intitle:keyword # Title search
inurl:keyword # URL search
before:2024-01-01 # Date range
after:2023-01-01
-
Planning & Direction
- Define objectives
- Identify information gaps
- Plan search strategy
-
Collection
- Gather data from sources
- Document everything
- Maintain chain of custody
-
Processing
- Organize collected data
- Extract relevant information
- Prepare for analysis
-
Analysis
- Connect data points
- Identify patterns
- Draw conclusions
-
Dissemination
- Present findings
- Document methodology
- Archive evidence
Essential commands for OSINT work:
# Download images/files
wget <url>
curl -O <url>
# Extract metadata
exiftool image.jpg
# Search within files
grep -r "pattern" directory/
# Archive findings
tar -czf evidence.tar.gz evidence_folder/# DNS lookup
nslookup domain.com
dig domain.com
# WHOIS information
whois domain.com
# Trace route
traceroute domain.com# View image metadata
identify -verbose image.jpg
# Convert image formats
convert input.jpg output.png
# Extract strings from files
strings file.binEducational Purpose: This workshop teaches OSINT techniques for legitimate research, journalism, and security purposes only. These skills should be used exclusively for authorized investigations and ethical research.
Legal Responsibility: You are solely responsible for your actions. The instructor and organizers accept no responsibility for:
- Privacy violations or harassment
- Unauthorized access to systems or data
- Misuse of information discovered
- Legal consequences of investigations
Ethical Guidelines:
- Only use publicly available information
- Respect privacy and personal boundaries
- Do not contact subjects directly without authorization
- Report findings responsibly and ethically
By participating, you acknowledge understanding these terms and agree to use these techniques legally and ethically.
- Awesome OSINT - Curated list of OSINT tools and resources
- Bellingcat's Online Investigation Toolkit - Comprehensive guide to digital investigation tools
- Sector035 Week in OSINT - Weekly OSINT news and techniques
- OSINT Framework - Comprehensive tool directory
- Michael Bazzell's OSINT Techniques - Industry-standard resources
- The Privacy, Security, and OSINT Show - Weekly podcast on OSINT and privacy
- SANS OSINT Summit Summaries - Visual summaries from annual OSINT conference, look at 2024, 23, 22 summaries too.
- OSINT Dojo - Practice challenges and methodology
- OSINT Techniques Book by Michael Bazzell - Comprehensive guide to open source intelligence gathering
- Extreme Privacy Book by Michael Bazzell - Digital privacy and anonymity techniques
Author: Aditya Kumbhare, Sasha Zyuzin
Good luck with your investigation! 🔍