OSINT Academy

Role and tools of open source intelligence

The world is becoming more interconnected through social media and digital communications, and the amount of relevant information available to attackers is growing exponentially. Open Source Intelligence (OSINT) refers to the practice of gathering data from published or otherwise publicly available sources. Whether it is an IT security expert, a malicious attacker, or a state-sanctioned intelligence officer, open source intelligence is the use of advanced technology to search large amounts of visible data to find information that achieves a goal.

Role of open source intelligence

Open source intelligence in cybersecurity is the use of data to determine what actions are needed to help detect and prevent cyber threats before they impact an organization.

Using open source intelligence tools in an organization can help discover information about the company, its employees, IT assets, and other confidential or sensitive data that attackers can exploit to improve cybersecurity.

data breach

Tools of open source intelligence

1. For example, information on LinkedIn is a common source of open source intelligence.

Attackers can use LinkedIn crawl tools to conduct reconnaissance in order to understand and research individuals or companies prior to targeted phishing attacks.

LinkedIn is a great resource when it comes to reconnaissance of an entire organization. An attacker can find all employees, their names, job titles, locations and emails. It is a simple and powerful data source often used for attack surface analysis prior to penetration testing.

LinkedIn's open source intelligence can use multiple public data sources to collect emails and names as well as subdomains, IPs and URLs. some people even publish their birthdays on LinkedIn - all useful information for attackers.

2. Dark web data breach dumps are also another common source of open source intelligence.

Many companies and organizations have been the victims of serious breaches. The compromised data was stolen data that was made public by the attacker. The use of compromised data can be beneficial in open source intelligence investigations.

Compromised data may include names, phone numbers, addresses, credit card details, passport numbers, and other sensitive data. In the early stages of an open source intelligence investigation, compromised data is critical to building a profile. This information can reveal updated data points and confirm existing data about the target.

Leaked data is often uploaded to forums, pasteboxes and file storage sites where it is sold and shared. Items sold on the dark web include credit cards, malicious services such as malware, DDos-as-a-service, and data dumps.



How to download a LinkedIn resume?
Master the LinkedIn Algorithm 2023
Open source intelligence data sources for Human Resources analytics
Find the person you are looking for on LinkedIn
Key takeaways from the LinkedIn algorithms