Open Source Intelligence Tools and Resources Handbook

Total Page:16

File Type:pdf, Size:1020Kb

Open Source Intelligence Tools and Resources Handbook OPEN SOURCE INTELLIGENCE TOOLS AND RESOURCES HANDBOOK 0 OPEN SOURCE INTELLIGENCE TOOLS AND RESOURCES HANDBOOK 2018 Aleksandra Bielska Natalie Anderson, Vytenis Benetis, Cristina Viehman 1 Foreword I am delighted to share the latest version of our OSINT Tools and Resources Handbook. This version is almost three times the size of the last public release in 2016. It reflects the changing intelligence needs of our clients in both the public and private sector, as well as the many areas we have been active in over the past two years. No list of OSINT tools is perfect, nor is it likely to be complete. Indeed, such is the pace of change that by the time you read this document some of our suggestions may have been surpassed or have ceased to exist. Regrettably, today's tool might also be tomorrow's vulnerability. To counter the first problem, we have included a list of toolkits provided by other OSINT practitioners working to improve the state-of-the-art. To manage the second, we recommend that all tools be tested in a secure computing environment whenever possible. Work on the next iteration of the Handbook has already begun. For now, I hope this version contributes to improving your efficiency and effectiveness as a researcher, analyst, investigator or general OSINT practitioner. Please feel free to share it with your colleagues. To encourage its broadest possible dissemination, we are publishing the Handbook under a Creative Commons CC BY License. I would like to end by thanking my colleagues at i-intelligence for their efforts in compiling the Handbook. Particular credit is due to Aleksandra Bielska who led the project and has coordinated the inputs from different contributors. I am also indebted to Natalie Anderson of Mercyhurst University for her excellent research and for the time spent checking these links. Kris Wheaton and Brad Gleason from Mercyhurst’s Department of Intelligence Studies are also thanked for their support. Finally, I would like to thank our community of followers on Twitter for sharing their recommendations with us, as well as the many practitioners who have suggested new tools to us while participating in our courses. Chris Pallaris Director, i-intelligence GmbH 2 Table of Contents Foreword .............................................................................................................................. 2 Search ................................................................................................................................... 9 General Search.................................................................................................................. 9 Meta Search .................................................................................................................... 11 Visual Search and Clustering Search Engines .................................................................. 12 National Search Engines ................................................................................................. 13 Code Search ................................................................................................................... 16 FTP Search ...................................................................................................................... 17 Similar Sites Search ......................................................................................................... 18 IoT Search Engines .......................................................................................................... 19 Kids-Friendly Search Engines .......................................................................................... 20 Other Specialty Search Engines ...................................................................................... 21 Other Search Engines and Tools ..................................................................................... 23 Social Media ....................................................................................................................... 25 Major Social Networks .................................................................................................... 25 Real-Time Search, Social Media Search, and General Social Media Tools ...................... 27 Social Media Tools: Twitter ............................................................................................. 30 Social Media Tools: Facebook ........................................................................................ 35 Social Media Tools: Google+ .......................................................................................... 37 Social Media Tools: Instagram ........................................................................................ 38 Social Media Tools: Pinterest .......................................................................................... 40 Social Media Tools: Reddit ............................................................................................. 41 Social Media Tools: VKontakte ....................................................................................... 43 Social Media Tools: Tumblr ............................................................................................. 44 Social Media Tools: LinkedIn ........................................................................................... 45 Social Media Tools: Snapchat ......................................................................................... 46 Social Media Tools: WhatsApp ....................................................................................... 47 Social Media Tools: Skype .............................................................................................. 48 Social Media Tools: Telegram ......................................................................................... 49 Other Instant Messaging and Chat Tools ........................................................................ 50 Dating Apps .................................................................................................................... 51 Blogs, Forums, Discussion Boards, and Q&A Sites ............................................................. 52 Blog Search ..................................................................................................................... 52 3 Forums and Discussion Boards Search ............................................................................ 53 Q&A Sites ....................................................................................................................... 54 People Investigations ......................................................................................................... 55 Main People Search Tools and Engines .......................................................................... 55 Address & Contact Information Search ........................................................................... 58 Public Records ................................................................................................................ 60 Ancestry Research ........................................................................................................... 62 Phone Search .................................................................................................................. 63 E-mail Search / E-mail Check .......................................................................................... 66 Username Check ............................................................................................................. 70 CV and Resume Search ................................................................................................... 71 Expert Search .................................................................................................................. 72 Salary Search ................................................................................................................... 74 Creating a Sock Puppet .................................................................................................. 76 Company Research ............................................................................................................. 77 Main Company Search Tools and Engines ...................................................................... 77 Company Research (EU) .................................................................................................. 80 Company Research (UK).................................................................................................. 81 Company Research (US) .................................................................................................. 84 Company Research (Switzerland) .................................................................................... 86 Company Research (Middle East) ................................................................................... 87 Company Research (Africa) ............................................................................................. 88 Company Research (China) ............................................................................................. 90 Business Registers (EU + EFTA) ...................................................................................... 91 Business Registers (US) ................................................................................................... 93 Business Registers (Other) .............................................................................................. 95 Business
Recommended publications
  • Blocking Ad Blockers, 16 J. MARSHALL REV
    THE JOHN MARSHALL REVIEW OF INTELLECTUAL PROPERTY LAW BLOCKING AD BLOCKERS TYLER BARBACOVI ABSTRACT The prevalence of ad blocking software (software that prevents the loading of web based advertisements) is a growing problem for website owners and content creators who rely on advertising revenue to earn money. While the number of ad block users continues to increase, there has thus far been no significant legal challenge to ad blocking in the United States. This comment examines how a website owner, through a combination of technological improvements and the anti-circumvention provisions of the Digital Millennium Copyright Act, could successfully raise a legal challenge against the purveyors of ad blocking software. Copyright © 2017 The John Marshall Law School Cite as Tyler Barbacovi, Blocking Ad Blockers, 16 J. MARSHALL REV. INTELL. PROP. L. 272 (2017). BLOCKING AD BLOCKERS TYLER BARBACOVI I. INTRODUCTION............................................................................................................. 273 A. Reasons for Using AFS ..................................................................................... 274 B. Attempts to Solve the AFS Problem Not Been Effective ................................ 275 C. The Rise of Ad-Walls ......................................................................................... 276 II. BACKGROUND ............................................................................................................. 278 A. Anti-Circumvention Provisions .......................................................................
    [Show full text]
  • Ispconfig 3 Manual]
    [ISPConfig 3 Manual] ISPConfig 3 Manual Version 1.0 for ISPConfig 3.0.3 Author: Falko Timme <[email protected]> Last edited 09/30/2010 1 The ISPConfig 3 manual is protected by copyright. No part of the manual may be reproduced, adapted, translated, or made available to a third party in any form by any process (electronic or otherwise) without the written specific consent of projektfarm GmbH. You may keep backup copies of the manual in digital or printed form for your personal use. All rights reserved. This copy was issued to: Thomas CARTER - [email protected] - Date: 2010-11-20 [ISPConfig 3 Manual] ISPConfig 3 is an open source hosting control panel for Linux and is capable of managing multiple servers from one control panel. ISPConfig 3 is licensed under BSD license. Managed Services and Features • Manage one or more servers from one control panel (multiserver management) • Different permission levels (administrators, resellers and clients) + email user level provided by a roundcube plugin for ISPConfig • Httpd (virtual hosts, domain- and IP-based) • FTP, SFTP, SCP • WebDAV • DNS (A, AAAA, ALIAS, CNAME, HINFO, MX, NS, PTR, RP, SRV, TXT records) • POP3, IMAP • Email autoresponder • Server-based mail filtering • Advanced email spamfilter and antivirus filter • MySQL client-databases • Webalizer and/or AWStats statistics • Harddisk quota • Mail quota • Traffic limits and statistics • IP addresses 2 The ISPConfig 3 manual is protected by copyright. No part of the manual may be reproduced, adapted, translated, or made available to a third party in any form by any process (electronic or otherwise) without the written specific consent of projektfarm GmbH.
    [Show full text]
  • The Palgrave Handbook of Digital Russia Studies
    The Palgrave Handbook of Digital Russia Studies Edited by Daria Gritsenko Mariëlle Wijermars · Mikhail Kopotev The Palgrave Handbook of Digital Russia Studies Daria Gritsenko Mariëlle Wijermars • Mikhail Kopotev Editors The Palgrave Handbook of Digital Russia Studies Editors Daria Gritsenko Mariëlle Wijermars University of Helsinki Maastricht University Helsinki, Finland Maastricht, The Netherlands Mikhail Kopotev Higher School of Economics (HSE University) Saint Petersburg, Russia ISBN 978-3-030-42854-9 ISBN 978-3-030-42855-6 (eBook) https://doi.org/10.1007/978-3-030-42855-6 © The Editor(s) (if applicable) and The Author(s) 2021. This book is an open access publication. Open Access This book is licensed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence and indicate if changes were made. The images or other third party material in this book are included in the book’s Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the book’s Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. The use of general descriptive names, registered names, trademarks, service marks, etc. in this publication does not imply, even in the absence of a specifc statement, that such names are exempt from the relevant protective laws and regulations and therefore free for general use.
    [Show full text]
  • Affinity Photo-Digikam Summer 2020
    UCLA Research Workshop Series Summer 2020 Affinity Photo & digiKam Anthony Caldwell What is Affinity Photo? Wikipedia: Affinity Photo is a raster graphics editor Serif: If you could create your own photo editing software, it would work like this. What is digiKam? Wikipedia: digiKam is a free and open-source image organizer and tag editor digiKam: digiKam is an advanced open-source digital photo management application that provides a comprehensive set of tools for importing, managing, editing, and sharing photos and raw files. Color Color Space Wikipedia: A color space is a specific organization of colors. In combination with physical device profiling, it allows for reproducible representations of color, in both analog and digital representations. Color depth The human eye can distinguish around a million colors Color depth 1-bit color 2 colors 2-bit color 4 colors 3-bit color 8 colors 4-bit color 16 colors 5-bit color 32 colors 8-bit color 256 colors 12-bit color 4096 colors High color (15/16-bit) 32,768 colors or 65,536 colors True color (24-bit) 16,777,216 colors Deep color (30-bit) 1.073 billion 36-bit approximately 68.71 billion colors 48-bit approximately 281.5 trillion colors Note: different configurations of software and hardware can produce different color values for each bit depth listed Color Space Commission internationale de l’éclairage 1931 color space Image Source: https://dot-color.com Color Space Additive color mixing Image Source: https://en.wikipedia.org Color Space K Subtractive color mixing Image Source: https://en.wikipedia.org Color Space The Lab Color Space Image Source: https://docs.esko.com/ Color Space Color Space Comparison Image Source: https://www.photo.net Affinity Photo and digiKam… Questions? Anthony Caldwell UCLA Digital Research Consortium Scholarly Innovation Labs 11630L Charles E.
    [Show full text]
  • Highly Predictive Blacklisting
    We Introduce the Highly predIc- tive Blacklist (HPB) service, which is now Jian Zhang, Philli P P o rr a S , a n d JohanneS ullRich integrated into the DShield.org portal [1]. The HPB service employs a radically differ- ent approach to blacklist formulation than that of contemporary blacklist formulation highly predictive strategies. At the core of the system is a ranking scheme that measures how closely blacklisting related an attack source is to a blacklist con- Jian Zhang is an assistant professor in the depart- sumer, based on both the attacker’s history ment of computer science at Louisiana State and the most recent firewall log produc- University. His research interest is in developing new machine-learning methods for improving tion patterns of the consumer. Our objec- cybersecurity. tive is to construct a customized blacklist [email protected] per repository contributor that reflects the Phillip Porras is a Program Director of systems se- most probable set of addresses that may curity research in the Computer Science Laboratory attack the contributor in the near future. at SRI International. His research interests include malware and intrusion detection, high-assurance We view this service as a first experimental computing, network security, and privacy-preserv- ing collaborative systems. step toward a new direction in high-quality [email protected] blacklist generation. As Chief Research Officer for the SANS Institute, For nearly as long as we have been detecting mali- Johannes Ullrich is currently responsible for the SANS Internet Storm Center (ISC) and the GIAC cious activity in networks, we have been compil- Gold program.
    [Show full text]
  • The Publishing Plan
    NONFICTIONTHE BOOK PUBLISHING PLAN THE PROFESSIONAL GUIDE TO PROFITABLE SELF-PUBLISHING STEPHANIE CHANDLER KARL W. PALACHUK Copyright © 2018 by Stephanie Chandler and Karl W. Palachuk. All rights reserved. No part of this publication may be reproduced, stored in a retrieval sys- tem, or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning, or otherwise, without the prior written permission of the author. Limit of Liability/Disclaimer of Warranty: While the publisher and author have used their best efforts in preparing this book, they make no representa- tions or warranties with respect to the accuracy or completeness of the con- tents of this book and specifically disclaim any implied warranties of mer- chantability or fitness for a particular purpose. No warranty may be created or extended by sales representatives or written sales materials. The advice and strategies contained herein may not be suitable for your situation. You should consult with a professional when appropriate. Neither the publisher nor the author shall be liable for any loss of profit or any other commer- cial damages, including but not limited to special, incidental, consequential, personal, or other damages. The Nonfiction Book Publishing Plan The Professional Guide to Profitable Self-Publishing By Stephanie Chandler and Karl W. Palachuk 1. LAN027000 2. LAN002000 3. REF026000 Print ISBN: 978-1-949642-00-1 Ebook ISBN: 978-1-949642-01-8 Printed in the United States of America Authority Publishing 11230 Gold Express Dr. #310-413 Gold River, CA 95670 800-877-1097 AuthorityPublishing.com CONTENTS Chapter 1: The Business of Self-Publishing Nonfiction Books .
    [Show full text]
  • Assessing the Quality of Mobile Graphical User Interfaces Using Multi-Objective Optimization
    Noname manuscript No. (will be inserted by the editor) Assessing the Quality of Mobile Graphical User Interfaces using Multi-objective Optimization Makram Soui · Mabrouka Chouchane · Mohamed Wiem Mkaouer · Marouane Kessentini · Khaled Ghedira the date of receipt and acceptance should be inserted later Abstract Aesthetic defects are a violation of quality attributes that are symp-toms of bad interface design programming decisions. They lead to deteriorating the perceived usability of mobile user interfaces and negatively impact the Users eXperience (UX) with the mobile app. Most existing studies relied on a subjective evaluation of aesthetic defects depending on end-users feedback, which makes the manual evaluation of mobile user interfaces human-centric, time-consuming, and error-prone. Therefore, recent studies have dedicated their effort to focus on the definition of mathematical formulas that each targets a specific structural quality of the interface. As the UX is tightly dependent on the user profile, the combi-nation and calibration of quality attributes, formulas, and users characteristics, when defining a defect, is not straightforward. In this context, we propose a fully automated framework which combines literature quality attributes with the users profile to identify aesthetic defects of MUI. More precisely, we consider the mobile user interface evaluation as a multi-objective optimization problem where the goal is to maximize the number of detected violations while minimizing the detection complexity of detection rules and enhancing the interfaces overall quality in means M. Soui College of Computing and Informatics Saudi Electronic University, Saudi Arabia E-mail: [email protected] Mabrouka Chouchane School of computer science of Manouba, Tunisia E-mail: [email protected] Mohamed Wiem Mkaouer Rochester Institute of Technology E-mail: [email protected] Marouane Kessentini University of Michigan E-mail: [email protected] Khaled Ghedira Honoris United Universities E-mail: [email protected] 2 Makram Soui et al.
    [Show full text]
  • English Collocations in Use Intermediate Book with Answers
    McCarthy and O’Dell McCarthy and ENGLISH COLLOCATIONS IN USE Collocations are combinations of words, which frequently appear together. Using Intermediate them makes your English sound more natural. Knowledge of collocations is often tested in examinations such as Cambridge FCE, CAE, CPE and IELTS. This book is suitable for ENGLISH students at good intermediate level and above. Using collocations will improve your style of written and spoken English: ENGLISH • Instead of ‘a big amount’, say ‘a substantial amount’ • Instead of ‘think about the options’, say ‘consider the options’ COLLOCATIONS • Using collocations will make your English sound more natural: • Instead of ‘get ill’, say ‘fall ill’ COLLOCATIONS • Instead of ‘a bigCURRENT fine’, say ‘a BCC heavy TOO fine’ LONG Using collocationsFOR will helpNEW you DESIGN avoid common learner errors: How words work • Instead of ‘do a choice’, say ‘make a choice’ together for fluent • Instead of ‘make your homework’, say ‘do your homework’ IN USE and natural English English Collocations in Use Intermediate Self-study and • 60 easy-to-use two-page units: collocations are presented and explained IN USE on left-hand pages with a range of practice exercises on right-hand pages. classroom use • Presents and explains approximately 1,500 collocations in typical contexts Second Edition using short texts, dialogues, tables and charts. Also available • Contains a comprehensive answer key and full index for easy reference. CAMBRIDGE LEARNER’S DICTIONARY• FOURTHHighlights EDITION register to help students choose the appropriate language for ENGLISH VOCABULARY IN USE UPPER-INTERMEDIATEparticular situations. Intermediate ENGLISH PRONUNCIATION IN USE INTERMEDIATE • Informed by the Cambridge English Corpus to ensure that the most frequently used collocations are presented.
    [Show full text]
  • Firefox Performance Use Recommend Settings Reddit
    Firefox Performance Use Recommend Settings Reddit Giovanne phosphorylating his wryneck ambuscades noway, but throatiest Walden never recoding so contractually. Personable Sanders busy, his foliages interpose lopping expertly. Ethelbert stroked bravely as cognitive Terrel dithers her glossator barbequed stylistically. Norton tended to set up the performance and! Blocker active until you use firefox performance is! Chrome firefox performance levels and reddit in firefox scales much; our services page after you recommend firefox performance settings reddit community forums requires an. Work using firefox performance and use a plugging for your political ideals and applications with iptv trial today! Atromitos yeroskipou has. This app store. Bsi tested firefox settings reddit ads and use a device or linux and web browsers! Usb cable television online players to set threshold, used in second room to complete analysis while each. In any error message, the versions of cheating detection technology, and software acceleration to block along the. Now used software library is reddit is to use settings make the performance of these ad blocker installed on products, include north korea, followed during sensitive? Before navigating blindly driven by monitoring the query domain names and jittery sequence items and! None of reddit, because it use a small list is still work until i recommend firefox performance settings reddit to try any blocked by anything is id, disapproving communication platform that. Begin when using firefox settings, use by simply open source code using a good for potential customers begin my frustration of the gpu load properly. Play store personal information you set up the iterative application preferences that it is also takes an.
    [Show full text]
  • Free Your Android! Not Free As in Free Beer About the FSFE This flyer Was Printed by the Free Software You Don't Have to Pay for the Apps from F-Droid
    Free as in Freedom Free Your Android! Not Free as in Free Beer About the FSFE This flyer was printed by the Free Software You don't have to pay for the apps from F-Droid. A lot Foundation Europe (FSFE), a non-profit organi- of applications from Google Play or Apple's App Store sation dedicated to promoting Free Software Get a are also free of charge. However, Free Software is not and working to build a free digital society. about price, but liberty. Free App Store Access to software de- When you don't control a program, the program termines how we can take for Your Android controls you. Whoever controls the software therefore part in our society. There- controls you. fore, FSFE is dedicated to ensure equal access and For example, nobody is allowed to study how a non- participation in the infor- free app works and what it actually does on your mation age by fighting for phone. Sometimes it just doesn't do exactly what you digital freedom. want, but there are also apps that contain malicious features like leaking your data without your knowledge. Nobody should ever be forced to use software that does not grant the freedoms to use, Running exclusively Free Software on your device puts study, share and improve the software. You you in full control. Even though you may not have the should have the right to shape technology as skills to directly exercise all of your freedom, you you see fit. benefit from a vibrant community that is enabled by freedom and uses it collaboratively.
    [Show full text]
  • Ebook Market of The
    Valitse kohde. - VALITSE KOHDE. VALITSE KOHDE. EBOOK MARKET OF THE USA Litnet case Author/s: Andrii Tytenko eSAVONIA UNIVERSITY OF APPLIED SCIENCES THESIS Abstract Field of Study Social Sciences, Business and Administration Degree Programme Degree Programme in International Business Author(s) Andrii Tytenko Title of Thesis eBook market of the USA: Litnet case Date 14.12.2019 Pages/Appendices 49 Supervisor(s) Virpi Oksanen, Ari Pitkänen Client Organisation /Partners Litnet Abstract The eBook market in the USA is the largest English-speaking eBook market. The purpose of the thesis was to do profound research on the eBook market in the USA for the case company Litnet. The importance of this research derives from the case company’s interest in the market. The research conducted for Litnet was made by utiliZing several marketing research frameworks such as PEST analysis, Porter’s Five Forces model, and SWOT analysis. Both qualitative and quantitative research methods were applied in the study. The research discovered that the overall attractiveness of the US market is high for Litnet. The research showed that the industry infrastructure is favourable. The market is characterized by a high level of rivalry and low en- trance barriers. There are different models of eBooks distribution, such as traditional per copy sales, subscription services, and pay per chapter services. The market may experience pressure from audiobooks and print books sales. Litnet may use the differentiation strategy to escape the direct competition in the market. The research gives an overview of the eBook market in the USA and analyses prerequisites for Litnet's possible market strate- gies.
    [Show full text]
  • Security & Privacy for Mobile Phones
    Security & Privacy FOR Mobile Phones Carybé, Lucas Helfstein July 4, 2017 Instituto DE Matemática E Estatística - USP What IS security? • That GRANTS THE INFORMATION YOU PROVIDE THE ASSURANCES above; • That ENSURES THAT EVERY INDIVIDUAL IN THIS SYSTEM KNOWS EACH other; • That TRIES TO KEEP THE ABOVE PROMISES forever. Security IS ... A System! • That ASSURES YOU THE INTEGRITY AND AUTHENTICITY OF AN INFORMATION AS WELL AS ITS authors; 1 • That ENSURES THAT EVERY INDIVIDUAL IN THIS SYSTEM KNOWS EACH other; • That TRIES TO KEEP THE ABOVE PROMISES forever. Security IS ... A System! • That ASSURES YOU THE INTEGRITY AND AUTHENTICITY OF AN INFORMATION AS WELL AS ITS authors; • That GRANTS THE INFORMATION YOU PROVIDE THE ASSURANCES above; 1 • That TRIES TO KEEP THE ABOVE PROMISES forever. Security IS ... A System! • That ASSURES YOU THE INTEGRITY AND AUTHENTICITY OF AN INFORMATION AS WELL AS ITS authors; • That GRANTS THE INFORMATION YOU PROVIDE THE ASSURANCES above; • That ENSURES THAT EVERY INDIVIDUAL IN THIS SYSTEM KNOWS EACH other; 1 Security IS ... A System! • That ASSURES YOU THE INTEGRITY AND AUTHENTICITY OF AN INFORMATION AS WELL AS ITS authors; • That GRANTS THE INFORMATION YOU PROVIDE THE ASSURANCES above; • That ENSURES THAT EVERY INDIVIDUAL IN THIS SYSTEM KNOWS EACH other; • That TRIES TO KEEP THE ABOVE PROMISES forever. 1 Security IS ... A System! Eve | | | Alice "Hi" <---------------> "Hi" Bob 2 Security IS ... Cryptography! Eve | | | Alice "Hi" <----"*****"------> "Hi" Bob 3 Security IS ... Impossible! The ONLY TRULY SECURE SYSTEM IS ONE THAT IS POWERED off, CAST IN A BLOCK OF CONCRETE AND SEALED IN A lead-lined ROOM WITH ARMED GUARDS - AND EVEN THEN I HAVE MY doubts.
    [Show full text]