[#DailyOSINT - Day#324] The best way to check if an #OSINT technique might alert your target,is to perform this technique to yourself beforehand (e.g. social accounts). Check regularly again and again because site policies/processes/algorithms might change from time to time.(1/5)
However, a technique that doesn't normally alert a user, might do so in case it is performed in an unusual way (e.g. IP address different than target's local IP address) or if performed repeatedly (from same or different user). Since you can never know the algorithms behind (2/5)
different platforms, using techniques such as those that exploit partial or full mobile phone revealing, should be done in extreme caution. When using tools that claim to find social media accounts via phone numbers as input, always check issues reported by users and (3/5)
also try them to your own social media accounts first. Moriarty is an example of such a tool (github.com/AzizKpln/Moria…). After you have gained some experience, even just inspecting the code yourself, will give you an insight of such a danger in a tool you are about to use. (4/5)
Apart from the above, remember that there are ethical issues concerning the above techniques as in essence you are falsely pretending to be the target yourself. So keep that in mind. If it feels wrong, it is most probably wrong and thus you should abstain from it. #OSINT (5/5)
• • •
Missing some Tweet in this thread? You can try to
force a refresh
After all the workload pressure of the past days, I am beginning to think that @Sector035 knows better doing a weekly #OSINT rather than my #DailyOSINT. Anyway, here is another bomb of tools and tips, that I would have posted if things were different. (1/10)
[#DailyOSINT - Day#307] @Bellingcat's Tech Team has built a new tool which allows you to collect and analyse TikTok posts. Their step-by-step guide shows you how to install it, how to use it, and how to analyse what you find. bellingcat.com/resources/how-…#OSINT 3/10
Missed me? After fighting COVID and taking some easter rest, here is a bomb of #DailyOSINT tools and tips, that I would have posted if things were different. #OSINT Thread 🧵 (1/7)
[#DailyOSINT - Day#299] Twitter tools always amazed me and just when I think I have seen it all, another good one appears. Whotwi is a twitter profile analysis tool without the need of a twitter login! en.whotwi.com#OSINT (2/7)
As promised, here is another bomb of #DailyOSINT tools, tips and tricks. #OSINT
Enjoy! Thread (1/n)
[#DailyOSINT-Day#275] GeoWiFi allows to search WiFi geolocation data by BSSID/SSID on different public databases including Wigle,Apple,Milnikov & OpenWiFi. You can export results in json format & show the locations on html map github.com/GONZOsint/geow… (by @GONZOs_int) #OSINT (2/n)
[#DailyOSINT - Day#276] This Research Report by RAND discusses the current state of open source intelligence (OSINT) and relevant issues for the defense intelligence enterprise. rand.org/pubs/research_…#OSINT (3/n)
[#DailyOSINT - Day#269] Interested in fighting disinformation? Every Friday from 10:00-10:20, Media City Bergen presents a new talk in the series: 20 minutes on fighting disinformation. It's free to participate. eventbrite.com/e/20-minutes-o…#OSINT (3/n)
[#DailyOSINT - Day#257] Have you ever seen google search results pop up, but when you visit the link, results are not there? This may happen because results are hidden inside the cached page source code.This is a player profile inside a famous board game playing site #OSINT (1/5)
When searching his username on google, results that include his username pop up. But when you click the link and search the page, there are no results for this username inside the page...(2/5)
Results are not there even if we search the source code of the live page. To do that, we right click and then "View page source". Then we hit Ctrl + F to search for text inside the source code. But if we click the arrow next to that google result we find the cached version (3/5)