White Hat Inspector Profile picture
May 30, 2022 5 tweets 2 min read Read on X
[#DailyOSINT - Day#324] The best way to check if an #OSINT technique might alert your target,is to perform this technique to yourself beforehand (e.g. social accounts). Check regularly again and again because site policies/processes/algorithms might change from time to time.(1/5)
However, a technique that doesn't normally alert a user, might do so in case it is performed in an unusual way (e.g. IP address different than target's local IP address) or if performed repeatedly (from same or different user). Since you can never know the algorithms behind (2/5)
different platforms, using techniques such as those that exploit partial or full mobile phone revealing, should be done in extreme caution. When using tools that claim to find social media accounts via phone numbers as input, always check issues reported by users and (3/5)
also try them to your own social media accounts first. Moriarty is an example of such a tool (github.com/AzizKpln/Moria…). After you have gained some experience, even just inspecting the code yourself, will give you an insight of such a danger in a tool you are about to use. (4/5)
Apart from the above, remember that there are ethical issues concerning the above techniques as in essence you are falsely pretending to be the target yourself. So keep that in mind. If it feels wrong, it is most probably wrong and thus you should abstain from it. #OSINT (5/5)

• • •

Missing some Tweet in this thread? You can try to force a refresh
 

Keep Current with White Hat Inspector

White Hat Inspector Profile picture

Stay in touch and get notified when new unrolls are available from this author!

Read all threads

This Thread may be Removed Anytime!

PDF

Twitter may remove this content at anytime! Save it as PDF for later use!

Try unrolling a thread yourself!

how to unroll video
  1. Follow @ThreadReaderApp to mention us!

  2. From a Twitter thread mention us with a keyword "unroll"
@threadreaderapp unroll

Practice here first or read more on our help page!

More from @WHInspector

May 15, 2022
After all the workload pressure of the past days, I am beginning to think that @Sector035 knows better doing a weekly #OSINT rather than my #DailyOSINT. Anyway, here is another bomb of tools and tips, that I would have posted if things were different. (1/10)
[#DailyOSINT - Day#306] MapSwitcher is a handy little browser plugin to switch between maps whenever you need to. It converts coordinates, zoom levels and transport options. chrome.google.com/webstore/detai… (via @OsintJobs) #OSINT (2/10)
[#DailyOSINT - Day#307] @Bellingcat's Tech Team has built a new tool which allows you to collect and analyse TikTok posts. Their step-by-step guide shows you how to install it, how to use it, and how to analyse what you find. bellingcat.com/resources/how-… #OSINT 3/10
Read 10 tweets
Apr 26, 2022
Missed me? After fighting COVID and taking some easter rest, here is a bomb of #DailyOSINT tools and tips, that I would have posted if things were different. #OSINT Thread 🧵 (1/7)
[#DailyOSINT - Day#299] Twitter tools always amazed me and just when I think I have seen it all, another good one appears. Whotwi is a twitter profile analysis tool without the need of a twitter login! en.whotwi.com #OSINT (2/7)
[#DailyOSINT - Day#300] This website has historical aerials dating back to the 1930's for the US! historicaerials.com/viewer (by green socks) #OSINT #GEOINT (3/7)
Read 7 tweets
Mar 15, 2022
As promised, here is another bomb of #DailyOSINT tools, tips and tricks. #OSINT

Enjoy! Thread (1/n)
[#DailyOSINT-Day#275] GeoWiFi allows to search WiFi geolocation data by BSSID/SSID on different public databases including Wigle,Apple,Milnikov & OpenWiFi. You can export results in json format & show the locations on html map github.com/GONZOsint/geow… (by @GONZOs_int) #OSINT (2/n)
[#DailyOSINT - Day#276] This Research Report by RAND discusses the current state of open source intelligence (OSINT) and relevant issues for the defense intelligence enterprise. rand.org/pubs/research_… #OSINT (3/n)
Read 6 tweets
Mar 13, 2022
[#DailyOSINT - Day#274] Interested in tatoos research? Maybe these will come in handy during your #OSINT investigations.
1) Russian criminal tattoo archive fuel-design.com/russian-crimin…
2) Prison tattoing on wiki en.wikipedia.org/wiki/Prison_ta…
3) Skinhead tattoos splcenter.org/fighting-hate/… (1/3)
4) Hate symbols adl.org/hate-symbols?p…
5) Tattoo handbook info.publicintelligence.net/CBSA-TattooHan… (via @ohshint_)
6) General tattoo styles worldtattoogallery.com/styles
7) Inmate tattoos lp.post.ca.gov/post/resources… (will automatically download)
8) Japanese tattoos irezumiart.co.uk/irezumi-symbol… (2/3)
9) Traditional tattoos sailorjerry.com/en-gb/tattoos/ (3/3)

Do you know more resources? Comment below! 👇
Read 4 tweets
Mar 11, 2022
I promised to drop bombs of #DailyOSINT tips, tools and tricks when I return so here is the first one (more to come).

Read on and I PROMISE you will find some #OSINT gems here!

Thread 🧵 (1/n)
[#DailyOSINT - Day#268] Wanna learn some cyber threat intelligence #CTI stuff? Sapienza University has an upcoming free course eventbrite.com/e/cyber-threat… #OSINT (2/n)
[#DailyOSINT - Day#269] Interested in fighting disinformation? Every Friday from 10:00-10:20, Media City Bergen presents a new talk in the series: 20 minutes on fighting disinformation. It's free to participate. eventbrite.com/e/20-minutes-o… #OSINT (3/n)
Read 9 tweets
Jan 20, 2022
[#DailyOSINT - Day#257] Have you ever seen google search results pop up, but when you visit the link, results are not there? This may happen because results are hidden inside the cached page source code.This is a player profile inside a famous board game playing site #OSINT (1/5) Image
When searching his username on google, results that include his username pop up. But when you click the link and search the page, there are no results for this username inside the page...(2/5) Image
Results are not there even if we search the source code of the live page. To do that, we right click and then "View page source". Then we hit Ctrl + F to search for text inside the source code. But if we click the arrow next to that google result we find the cached version (3/5) Image
Read 5 tweets

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3/month or $30/year) and get exclusive features!

Become Premium

Don't want to be a Premium member but still want to support us?

Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal

Or Donate anonymously using crypto!

Ethereum

0xfe58350B80634f60Fa6Dc149a72b4DFbc17D341E copy

Bitcoin

3ATGMxNzCUFzxpMCHL5sWSt4DVtS8UqXpi copy

Thank you for your support!

Follow Us!

:(