Osint | Report.zip

*Tools commonly used:* Maltego, SpiderFoot, Recon‑NG, theHarvester, FOCA, Shodan CLI, Sublist3r, Amass, OSINT Framework, OSINT Combine, Metagoofil, ExifTool, Wayback Machine, Google Advanced Search Operators.

---

## 3. Methodology 1. **Planning & Requirements Gathering** – Define search terms, tools, and legal constraints. 2. **Data Collection** – Use the following categories of sources: - **Domain & Infrastructure** – WHOIS, DNS, SSL/TLS, Shodan, Censys, VirusTotal. - **Web & Social Media** – Google Dorking, Bing, DuckDuckGo, Twitter, LinkedIn, Facebook, Instagram, TikTok, Reddit, GitHub, StackOverflow. - **People & Organizations** – Pipl, Spokeo, professional registries, corporate filings, news archives. - **Multimedia** – EXIF metadata extraction, reverse‑image search (TinEye, Google Images), video frame analysis. - **Geolocation** – Google Earth, OpenStreetMap, geotagged social posts. - **Dark Web / Forums** – Ahmia, TorSearch, specialized forums (use caution & legal guidance). 3. **Verification & Correlation** – Cross‑reference data points, timestamp verification, source reliability scoring (e.g., 1‑5). 4. **Analysis** – Apply the CIA triad (Confidentiality, Integrity, Availability) and threat‑modeling frameworks (e.g., ATT&CK, CAPEC). 5. **Reporting** – Compile findings, include evidence (screenshots, URLs, hash values).

## 5. Findings ### 5.1 Digital Footprint Overview | Asset Type | Identifier | Owner/Contact (if known) | Public Exposure | Comments | |------------|------------|--------------------------|-----------------|----------| | Domain | `example.com` | Registrant: John Doe (privacy‑protected) | Public website, SSL, subdomains | … | | Sub‑domain | `api.example.com` | Same as above | Exposes REST API (no auth) | Potential data leak | | IP Range | `192.0.2.0/24` | ISP: ExampleNet | Visible on Shodan (open ports 22, 80, 443) | … | | Social Account | `@example` (Twitter) | Owner: Jane Smith | 12k followers, 300 tweets | Recent tweet mentions partnership with X | | GitHub Repo | `example/example‑app` | Owner: example | 5 public repos, 1 contains `.env` file | **Sensitive** – contains API keys | | Document | `annual_report_2023.pdf` (found via Google) | Public | Contains executive emails | **PII** exposure | OSINT Report.zip

---

### How to Use This Template 1. **Replace all placeholder text** (`<...>`) with your actual target information. 2. **Populate the tables** in Sections 5‑7 with the data you collect. 3. **Add evidence files** (screenshots, raw outputs) to the `Appendices` folder before zipping. 4. **Run a final review** for accuracy, legal compliance, and proper redaction of any PII that should not be shared outside the intended audience.

---

---

---

---

---

---