Gerald Auger, Ph.D. Profile picture
Sep 30, 2022 14 tweets 11 min read Read on X
Recon is the first step in the Cyber Kill Chain, but what tools to start with?

Let's Kickoff your OSINT toolbox with these 10 website OSINT tools that rock

Let's start with a banger that I just found out about ...
#cybersecurity #OSINT #pentesting
[1] TINFOLEAK tinfoleak.com

This site allows you to Search for Twitter users leaks 😱

Basic info about a Twitter user (name, picture, location, followers, etc.)

Devices and OS and much more. Full, informative briefing on a twitter user
[2] Shodan! shodan.io

Shodan is a search engine scanning the entirety of the internet for connected devices. 🌎

Arguably my favorite and one that every #cybersecuirty pro should know both for recon and for educating end users on 'whats out there!' Shodan searching for port 22 in Charleston SC
[3] BuiltWith builtwith.com

BuiltWith® covers 60,940+ internet technologies which include analytics, advertising, hosting, CMS and many more. ⚒️

Basically it will allow you to plugin a website and see what the tech stack is under it. Tesla.com tech stack
[4] Google (Dorking) Google.com

Google is a powerful search engine, but power users know how to really utilize it. 🔍

Keywords you can elicit very interesting OSINT from it. Check out this link for how to utilize Google for OSINT

securitytrails.com/blog/google-ha… Google Dorking FTW!
[5] ZoomEye zoomeye.org

China based Internet resource aggregator.👀

Per ZoomEye, its dataset is based on a large number of global surveying and mapping nodes, according to the global IPv4, IPv6 address and website domain name database. Think Shodan, but different.
[6] OSINT Framework osintframework.com

Great starting point mindmap of various OSINT tools and resources. 🖼️

This one is a bit meta on this list as its less of an OSINT tool and more of a repo of OSINT tools. Still awesome OSINT Framework mindmap
[7] Email OSINT with Hunter.io hunter.io

Straight simple tool. You drop in a business domain and it pops out likely email naming convention based on OSINT. Tie this with 📨

LinkedIN and you can likely derive folks business email. Microsoft.com email addresses
[8] Reverse Image Search TinEYE tineye.com

Cool tool to have in the back pocket, TinEye allows you upload an image and find other instances of it on the Internet. 📷

Useful if you're trying to build out a network or get leads with a pic. TinEye searching on my pic
[9] Business lookup aihitdata.com

Want to get info on a business or find other businesses in the same area as a client. 🏭

This quick and simple tool will help you with that. Business look up in Deadwood SD
[10] SOCK Puppet Helper - thispersondoesnotexist.com

If you need a picture of a person but want to avoid privacy issues, and you're in a rush, this site will instantly generate someone that's completely virtual. Perfect for your sock puppets! 🥺 This guy is not real
[BONUS Material] I'm not a pentester, so my use of OSINT tools isn't to the max, but considering following these accounts for conversations of this nature or just GREAT cybersecurity content: @thecybermentor @bettersafetynet @C_3PJoe @_JohnHammond @vxunderground @GossiTheDog 💪
@thecybermentor @bettersafetynet @C_3PJoe @_JohnHammond @vxunderground @GossiTheDog That's a wrap!

If you enjoyed this thread:

1. Follow me @Gerald_Auger for more of these
2. RT the tweet below to share this thread with your audience

SimplyCyber.io for a ton more free #cybersecurity resources. 💙
If you like this tweet, you'll love my exclusive email that helps you crush work, delivering 3 actionable cyber tasks every Monday morning to your inbox.

Join here: simplycyber.io/newsletter

• • •

Missing some Tweet in this thread? You can try to force a refresh
 

Keep Current with Gerald Auger, Ph.D.

Gerald Auger, Ph.D. Profile picture

Stay in touch and get notified when new unrolls are available from this author!

Read all threads

This Thread may be Removed Anytime!

PDF

Twitter may remove this content at anytime! Save it as PDF for later use!

Try unrolling a thread yourself!

how to unroll video
  1. Follow @ThreadReaderApp to mention us!

  2. From a Twitter thread mention us with a keyword "unroll"
@threadreaderapp unroll

Practice here first or read more on our help page!

More from @Gerald_Auger

Nov 20, 2022
What's the best course or roadmap to get into Threat Hunting?

Start as a SOC analyst, but how?
And what non-obvious things to do?

A short thread ...
[🧵]
Get technical knowledge foundation first 💻

Begin to develop practical skills with Blue labs like ⚒️
@RangeForce
@BlueteamL
@HaikuInc_

Practical skills are king in industry right now. 💪
Join @BHinfoSecurity @Recon_InfoSec Simply CyberDiscord servers

BHIS: discord.gg/bhis
Recon infosec: discord.gg/reconinfosec
Simply Cyber (if you're feeling it) discord.gg/simplycyber

Engage in these communities and learn
Read 9 tweets
Oct 15, 2022
Are you overwhelmed by learning resources in #cybersecurity? 😲

Start with one of the best!

@Antisy_Training PAY WHAT YOU CAN courses 🤩

Taught LIVE literally by industry seasoned pros!

🔥Let's just dig in here for a hot minute and share a few
[🧵 ]
[1] SOC Core Skills with @strandjs 🤩

Students get the core security skills all Security Operation Center (SOC) analysts need and what BHIS expects of analysts in their OWN SOC 🤗

antisyphontraining.com/soc-core-skill…
[2] Active Defense and Cyber Deception with @strandjs. 🤩

You learn:
💥 Tons of OpenSrc tools
💥 Legal aspects of hack back
💥 Deploy honey pots/tokens

It's excellent and valuable! 😎🥰
antisyphontraining.com/pay-what-you-c…

I took it and made a review video here:
Read 7 tweets
Oct 8, 2022
Hey You!

Cybersecurity interview coming up?

1st off, AWESOME 🥳

2nd: Let’s shed self doubt, and AMP UP the confidence!💪

I’ve worked in industry for 18+ years and hired many entry level folks.😍

Let me answer 12 interview questions and tell you WHY we’re asking them💥

[🧵]
[1] Can you explain risk, vulnerability and threat? 🤔

Classic keyword definitions that are commonplace in industry.

Get my full answer here: (jumps right to it) 💥
[2] What is the difference between Asymmetric and Symmetric encryption and which one is better? 🤔

Two types of encryption, worth knowing the diff

Get my full answer here: (jumps right to it) 💥
Read 19 tweets
Oct 4, 2022
I started in cyber when I was 25 y/o.

Since then, I've...

• Built a Cyber Program for a $750M company

• Worked in Antarctica

• Earned a PhD in Cyber Ops

• Actively teach Cyber at @Citadel1842

Here are 5 mistakes people breaking into industry are making
[🧵]
Mistake #1 😱
Not Networking Within The Community.

Nobody is good at everything, and not all jobs are posted

Community provides support, go-to ppl for certain skills, and opportunity.

Here's a deeper explanation (timestamped) 🔥
Mistake #2 😱
Not Starting At The Finish Line

Most folks are excited and go HAM and All The Things, and fwd progress is hindered.

Find the job you want, look at quals, focus on those skills.

Here's a deeper explanation (timestamped) 🔥
Read 10 tweets
Oct 3, 2022
Responsible for IT and #cybersecurity at your work?

20 years has taught me good tools are HUGE

Check out these 5 SOC Analyst web-based tools that will LEVEL UP your SOC game and help you move faster on detecting ‘bad’

The first one I bet you haven't heard of... 👇

[🧵]
[1] Echo Trail - echotrail.io

This one is new on the scene, but very interesting.

It has built a picture of what's normal or typical for a given operating system (OS) or a process running on that OS. Check if that odd service, dll, etc is 'normal'
[2] Any Run - app.any.run

Malware sandbox that I love 💖

Have a malicious or unknown file and want to see what it does fast, drop it in any run.

Saves you tons of time of building a VM if you’re just looking for a quick analysis.⚡
Read 10 tweets
Oct 3, 2022
People seeking a #cybersecurity career immediately get overwhelmed with Step 1😲

I’ve been at it 18+ years
I have over 500 #cybersecuirty YT vids💥

Grab my 7 focused, curated Playlists below💪
Accelerate your progress 🚀

(They answer the FAQ I get all the time)

[🧵]
[1] I have NO IT Background and Want to Get Into Cybersecurity
(21 Videos) 🎥

🌐 youtube.com/playlist?list=…

Is Cybersecurity for IT people only? NO! But how does one start without an IT background?

Here you go! 💥
[2] I Need to Know What Jobs Are In the Cybersecurity Field.
(12 Videos)🎥

🌐 youtube.com/playlist?list=…

There are soooo many jobs in the cybersecurity field.

Most people think of hacking or penetration tester, but there are many roles that suit different skills. ⚒️
Read 11 tweets

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3/month or $30/year) and get exclusive features!

Become Premium

Don't want to be a Premium member but still want to support us?

Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal

Or Donate anonymously using crypto!

Ethereum

0xfe58350B80634f60Fa6Dc149a72b4DFbc17D341E copy

Bitcoin

3ATGMxNzCUFzxpMCHL5sWSt4DVtS8UqXpi copy

Thank you for your support!

Follow Us!

:(