Cyber Security / Ethical Hacking
  • Prologue
  • CTF/OSCP Prep
    • Fundamentals
      • Linux
        • Basics
        • Bash Scripting
      • Windows
        • Basics
        • PowerShell
          • Scripting
        • CMD
      • Kali Survivor Skills
    • Information Gathering
      • Passive Recon
      • Active Recon
    • Enumeration
      • Common Ports
      • Vulnerability Analysis
    • Exploitation
      • Shells
  • Binary Exploitation / Exploit Development
    • Useful tools and techniques for Binary Exploitation
    • Shellcoders Handbook
      • Chapter 2 - Stack Overflows
        • Linux Buffer Overflow With Command Injection
        • Linux Buffer Overflow Without Shellcode
      • Chapter 3 - Shellcode
  • TryHackMe
    • Linux Fundamentals
      • Linux Challenges
      • RP: tmux
      • Common Linux Privesc
    • Advent of Cyber
      • Inventory Management
      • Arctic Forum
      • Evil Elf
      • Training
      • Ho-Ho-Hosint
      • Data Elf-iltration
      • Skilling Up
      • SUID Shenanigans
      • Requests
      • Metasploit-a-ho-ho-ho
      • Elf Applications
      • Elfcryption
      • Accumulate
      • Unknown Storage
    • Web Application Security
      • Web Fundamentals
      • Juice Shop
      • WebAppSec 101
    • Linux Privesc Playground
    • Intro to x86-64
    • Ninja Skills
    • CC: Radare2
    • Reversing ELF
    • Intro to Python
    • ToolsRus
  • Programming
    • Python
      • Simple TCP Port Scanner/ Banner Grabber
      • Botnet
      • Keylogger
      • Nmap Scanner
    • Golang
      • Execute Commands
      • MAC changer
      • TCP Port Scanner
      • TCP Port Scanner (improved with goroutines)
      • GoNmap Scanner
  • Protostar
    • Stack 0
    • Stack 1
    • Stack 2
  • Web App Pentesting
    • Recon
    • Authentication (Portswigger Academy)
      • Vulnerabilities in password-based login
        • Username Enumeration via different responses
        • Username enumeration via subtly different responses
        • Username enumeration via response timing
        • Broken brute-force protection, IP block
        • Username enumeration via account lock
        • Broken brute-force protection, multiple credentials per request
      • Vulnerabilities in multi-factor authentication
        • 2FA simple bypass
        • 2FA Broken Logic
        • 2FA bypass using a brute-force attack
      • Vulnerabilities in other authentication mechanisms
    • Broken Acess Controls
      • Insecure direct object references (IDOR)
        • Insecure direct object references lab
  • HackTheBox
    • Active
      • Untitled
      • Blunder
Powered by GitBook
On this page

Was this helpful?

  1. TryHackMe
  2. Advent of Cyber

Ho-Ho-Hosint

Open Source Intelligence (OSINT) techniques

PreviousTrainingNextData Elf-iltration

Last updated 5 years ago

Was this helpful?

What is OSINT?

OSINT is data collected from publicly available sources to be used in an intelligence context. For an attacker to run a phishing campaign, he first needs to gather knowledge about the individual being targeted.

The is a collection of resources and tools we can use for our intelligence gathering.

In this challenge, there will be three main OSINT techniques, which are as follows:

Image Metadata

Image metadata is text information that is pertaining to an image file, that is embedded into the file.

This data includes details relevant to the image itself as well as the information about its production. For example, if we take a photo in the park, our smartphone will attach GPS location metadata to the image.

Image Metadata can also include camera details, such as aperture, shutter speed and DPI.. it can also include the creator (author) or the individual taking the image.

Exiftool is a free and open-source program for reading metadata on files.

WayBack Machine

The is a digital archive of the World Wide Web. It takes a snapshot of a website and saves it for us to view in the future. This can be used to gather information regarding how a website used to look.

Reverse Image Search

Google lets us search the internet for an image we have.

If a user has a profile picture of themselves on one social media, its most likely they have re-used the same photo on lots of other different social media sites. We can take that one image, search all other sites for that image and identify where that user has also signed up.

It can also be used to identify who or what is in a image.

By using exiftool we get the image creator name

Using google to find a social media account with that user name takes us to a twitter account

Using the WayBack Machine we can search for snapshots of Lola's wordpress website. The first snapshot dates to the 23rd of October of 2019, and there Lola states that she started her photography 5 years before on that same date.

By uploading the picture on google we can find out that the famous woman is Ada Lovelace.

OSINT framework
WayBackMachine