0% found this document useful (0 votes)
12 views8 pages

OSINT

The document discusses various OSINT techniques including Google hacking, reverse image search, email address hunting, and email validation. It provides examples of advanced Google search queries to extract sensitive information, tools for reverse image searching, and methods for checking email validity. Additionally, it lists specific websites and resources for each technique.

Uploaded by

Mahadev Gautam
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
12 views8 pages

OSINT

The document discusses various OSINT techniques including Google hacking, reverse image search, email address hunting, and email validation. It provides examples of advanced Google search queries to extract sensitive information, tools for reverse image searching, and methods for checking email validity. Additionally, it lists specific websites and resources for each technique.

Uploaded by

Mahadev Gautam
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 8

OSINT

Tuesday, June 14, 2022 1:47 PM

1. Google Hacking (google dorking) Use-cases:


Advanced Google hacking refers to the art of creating complex search engine queries by employing
advanced Google operators to extract sensitive or hidden information about a target company from the
Google Search results.

intitle:login site:eccouncil.org

ec-council filetype:pdf
ec-council filetype;pdf
site:rapid7.com filetype:pdf
filetype:pdf site:rapid7.com

New Section 1 Page 1


"KP Oli" filetype:pdf OR filetype:docx OR filetype:xlsx

site:facebook.com intext:manraj tmg

New Section 1 Page 2


site:instagram.com intext:manraj-tamang

site:youtube.com intext:manraj-tamang

New Section 1 Page 3


site:youtube.com intext:manraj-tamang

location:rapid7.com

https://www.exploit-db.com/google-hacking-database

2. Reverse Image Search:


Reverse image search is a content-based image retrieval query technique that involves providing the CBIR
system with a sample image that it will then base its search upon; in terms of information retrieval, the
sample image is very useful. It simply involves searching the internet with an image instead of keywords.
New Section 1 Page 4
sample image is very useful. It simply involves searching the internet with an image instead of keywords.
https://images.google.com/

TinEye: https://tineye.com/

3. Hunting Email addresses:


New Section 1 Page 5
3. Hunting Email addresses:

https://phonebook.cz/

Create account here and login.(but it has some limit to search the result)

4. Email checker:

New Section 1 Page 6


https://email-checker.net/check

Email validation can be done by logging email address into G-mail account portal:
https://accounts.google.com/

If email account doesn't exists, then;

New Section 1 Page 7


New Section 1 Page 8

You might also like