People OSINT: Finding Information Ethically (Part 2)
Disclaimer:
All the tools and methods discussed in this blog are part of what I am learning in a safe and legal environment. This content is strictly for educational purposes only and is not intended to harm any individual or organization.
In our previous post, we discussed about fundamental of OSINT.
From this post onwards, we will be begin applying those ideas- starting with People OSINT.
What is People OSINT ?
People OSINT refers to use of OPEN SOURCE INTELLIGENCE techniques to gather information about individuals using publicly available data.
It is a critical skill for:
- investigators,
- journalist,
- security professionals,
- recruiters,
- and even individuals looking for their own digital footprint.
People OSINT does not involve hacking. It focuses on information people Knowingly or unknowingly expose online.
The Core Philosophy: The "Cascade Effect"
Start with a small piece of data (a username , email, phone number, or name + location) and use it to find more data points across different platforms creating a fuller picture.
1. Starting Points ( What you need to begin )
You need to have at least one of these identifiers:
- Username/Handle : A unique alias
- Email Address: Often the most powerful starting point
- Phone number: Can reveal name, carrier, and linked accounts.
- Full Name & Location: Especially for a common name, location is key.
- Image/Photo: For reverse image search.
- Social Security Number or National ID: Extremely sensitive and heavily restricted; use only in highly authorized contexts.
2. Core Methodology & Key Tools
- Tools: WhatsMyName, Namechk, Sherlock( CLi tool), UserSearch.
- Manual Search: Simple Google "username" in quotes. Check sites like Reddit, GitHub, X, Instagram, Steam.
- Breach Data: HaveIBeenPwned( checks if email was in known breaches).
- Account Discovery:
- Google Dork: Intext:"email@example.com"
- Tools: Epios ( free tier), Hunter.io( for corporate emails) , Phonebook.cz ( from the theHarvester project).
- Password Reset Trick: On a major site , attempt a password reset with email. Often, the site will reveal a masked version of associated name. This confirms account ownership.
- Carrier Identification: FreeCarrierLookup.com.
- Messaging App Link: Check if the number is registered on WhatsApp, Telegram, or Signal ( these apps often reveal a profile name/pic )
- Reverse Lookup: Truecaller , Whitepages, SpyDialer (leaves voicemail probes). Results vary by country.
- Platform-Specific Search: Use the native search on Facebook, Linkedin , Instagram , X etc.
- Advanced Facebook Search: Use graph search-like queries ( though limited now) . e.g., "People named John Smith who live in Seattle and work at Amazon".
- LinkedIn: A goldmine for emplyment, education, connections and data. Use Boolean search in the search bar.
- Data Aggregators: Social Seacher ( real-time multi-network search)
- Reverse Image Search: Upload a profile picture to:
- Google Images or Google lens.
- Yandex Images ( often superior for faces and non-Western content).
- TinEye.
- Facial Recognition ( Use with extreme caution & legality) : PimEyes, face-check.id. ( These tools not privacy invasive).
- Geotagged Photos: Check Exif data from original photos.. Use exiftool or online viewers.
- Hobby Platforms: Forums for specific hobbies, Starva , Untapped, goodreads.
3. The Analyst's Mindset: Connecting the Dots
- Corroborate: Never rely on a single source. Cross-check facts across multi platforms.
- Contextualize: A photo at a landmark gives location. A post about : work anniversaries" gives employer info.
- Patter Analysis: Do they post a specific times? ( It gives timezone). Do they tag the same people repeatedly ? ( It give close relationships).
- Metadata is gold: Document timestams, location tags, device information ( often in image metadata or Twitter client info).
- Audit Yourself: Regularly search for your own data using the above methods.
- Use Unique Usernames: Don't reuse handles for sensitive vs. casual accounts.
- Limit Data Sharing: Be cautious with quizzes, apps, and surveys that harvest data.
- Review Privacy Settings: Lock down social media to Friends Only, disable facial tagging.
- Opt-Out: Manually request removal from major data broker sites ( Spokeo , Whitepages , etc). Services like DeteletMe can automate this ( for a fee) .
Comments
Post a Comment