Open Source Intelligence (OSINT)

Open Source Intelligence (OSINT)

One-liner: The collection and analysis of publicly available information to produce actionable intelligence.

🎯 What Is It?

Open Source Intelligence (OSINT) is the practice of gathering information from publicly accessible sources. In cybersecurity, OSINT is used by both attackers (for reconnaissance) and defenders (for threat intelligence and investigations).

🔬 How It Works

Common OSINT Sources

Category Sources Information Gained
Domain WHOIS, DNS, crt.sh Ownership, subdomains, IPs
Social LinkedIn, Twitter/X, GitHub Employees, tech stack, credentials
Technical Shodan, Censys, VirusTotal Exposed services, malware hashes
Documents Google, Pastebin, S3 buckets Leaked creds, internal docs
Dark Web Forums, markets Breached data, threat intel

OSINT Process

1. Define → What information do you need?
2. Collect → Gather from multiple sources
3. Process → Clean and organize data
4. Analyze → Extract actionable insights
5. Disseminate → Report findings

🛠️ Common Tools

# theHarvester - Email/subdomain gathering
theHarvester -d target.com -b google,linkedin

# Maltego - Visual link analysis (GUI)

# Recon-ng - Modular reconnaissance framework
recon-cli
use recon/domains-hosts/hackertarget
set SOURCE target.com
run

# SpiderFoot - Automated OSINT
spiderfoot -s target.com -m all
Tool Purpose
theHarvester Email, subdomain enumeration
Maltego Visual relationship mapping
Shodan Internet-connected device search
Censys Certificate and host discovery
Recon-ng Modular OSINT framework
SpiderFoot Automated OSINT scanning
Have I Been Pwned Breach checking

🛡️ Detection & Prevention

How to Detect (as a Target)

How to Prevent / Mitigate

🎤 Interview Angles

Common Questions

Key Talking Points

✅ Best Practices

📚 References