3.1.4-Lab_Using_OSINT_Tools
3.1.4-Lab_Using_OSINT_Tools
Objectives
In this lab, you will explore several OSINT tools that are commonly used by
pentesters.
Examine OSINT resources
Use SpiderFoot
Investigate Recon-ng
Find interesting files with Recon-ng
Background / Scenario
When performing information gathering activities, passive reconnaissance
uses open, publicly accessible data to guide active reconnaissance efforts
and to gather information about the enterprise and employees. In OSINT, it is
the data that is open source. OSINT tools may or may not be open source.
Some tools are free and open, others require registration to use free versions,
and others require a fee for use. OSINT commonly uses data sources that are
available to any hacker, so part of the PenTesting effort is to report on
sensitive information that is commonly available in order to evaluate
vulnerabilities that it may cause. The objectives of OSINT are:
To determine the digital footprint of the organization.
Determine what data about the organization is available to cyber
criminals.
Required Resources
Kali VM customized for Ethical Hacker course
Internet access
Instructions
Part 1: Examine OSINT Resources
Step 1: Access the OSINT Framework
The OSINT Framework is a useful way to visualize the OSINT tools and
resources that are available. Unfortunately, it has become a bit outdated, with
some resources no longer available. It is still valuable to help you understand
the types of tools available and their uses. In many cases, the links are still
good.
a. Go to the OSINT Framework site at https://osintframework.com/.
b. You will see a vertical tree-like structure that consists of categories of
OSINT tools and resources that can be reached from the framework.
Click Username at the top of the tree. You will then see two
subcategories appear. Click each to open the resource trees for each
subcategory. Note in the upper-right corner of the page is a legend that
identifies the type of resource.
c. Under Username Search Engines, click "WhatsMyName(T)".
d. The link takes you to a Git repository for the WhatsMyName project. In
the README.md content for the tool, the various sites that implement
WhatsMyName are listed. Feel free to explore these, but we will click
the first link https://whatsmyname.app/ to visit a free website that
implements WhatsMyName.
The parent organization for the site, https://www.osintcombine.com/, has
several interesting free tools available.
a. In the search box, type in a few usernames, each on a separate line.
Use your own usernames or others that you find. Try searching the
internet for common username wordlist for other potential search
terms. You can filter the results based on the category filters, but for
now, just click the green magnifying glass button to start the search.
In a pentest, you would use another tool, such as SpiderFoot (below) to
find usernames in email addresses that are associated with a company
or domain.
a. Investigate the results. You can open the links to the accounts either
from the green rectangles or the table of results.
b. WhatsMyName provides a very flexible report of the results. The
results table can be sorted by column, and you can export the results
as CSV or PDF for reporting purposes. In addition, you can easily filter
by username and search within the results. Finally, you get links for the
profile pages for the users at many different sites.
What is the value of doing username searches and account enumeration?
- Cybersecurity & Penetration Testing
- OSINT (Open-Source Intelligence) & Investigations
- Brand Protection & Business Intelligence
- Personal Privacy & Security Awareness
Reflection Questions
You have experienced the use of several OSINT tools and resources in this
lab. There are many more. The best way to learn how to use OSINT in your
pentesting practice is to experiment until you find tools and approaches that
work for you.
1. What do you think about the recon-ng workspaces feature? How could you
use it?
The workspaces feature is extremely useful for managing multiple
investigations or projects without mixing data