Basic tools for Open Source Intelligence (OSINT) and Cybersecurity
This article is for groups of people who may want to know the general basics of information gathering from freely accessible sources (OSINT). Whether you are a doctor or a mason, information gathering will ultimately be important in building a knowledge base vital for both personal and professional use. By extension, any individual would naturally be interested in staying safe by learning tips and tricks on cybersecurity without having to delve into inherently technical details.
While there are many tools to gather information and to improve one's cybersecurity awareness, these are some that I find useful and immediate to daily life. Click the links within the subheadings to access the tools.
All my Tweets
We all love Twitter for one reason; the vast amount of information we can gather on an instant. Based on followers and topics followed, Twitter can provide tailored and trending information while acting as an archive for tweets issued since the beginning of the platform. Going through Twitter may sometimes be overwhelming, especially if looking for particular information, say, from a particular user. While there are may tricks to extract highly customized results (similar to google dorks) one significant tool I use for focused search on a particular user is allmytweets.net. This tools collects all Twitter activity from a single user and displays them in a continuous page where you can read seamlessly while investigating their tweeting history.
For example, all tweeting history from Standard Kenya would show as follows, giving an opportunity to sort according to tweets, likes, followers, and users a particular account is following.
The below screenshot shows accounts that Standard Kenya is following.
Gathering all this information centrally helps save time while focusing on what is important, especially when you want to gain insights about a particular user. Note that to use allmytweets.net, you have to log into an active Twitter account.
Truecaller
Truecaller works by collecting and providing partial information regarding caller identity information from phone directory providers and partners as well as from social networks. It may however be possible that a number doesn't exist from these sources yet or little to no information is relayed from the source. Regardless, this tool can provide valuable information regarding any caller globally. Searching up any caller information requires a sign in, something you might do using any email account you own. However, beware that a user subscribing to Truecaller may get the identity of those searching for their phone information. To conceal real identity, prefer the use of junk email addresses to sign up, or omit some information.
Have I been Pwned
Get Notify - Email Tracking
This is one of the best email tracking tools one can use to discover the status of a sent email. With this tool, it is possible to determine whether your sent email has at least, been opened by the receiver. This tool is particularly useful in tracking the progress of applications where you keep wondering whether your email is going cold in the recipient's inbox or someone on the other end took their time to recognize your efforts by reading its contents. This tool, as many other email tracking tools use tiny image pixels inserted within the sent email to detect if the the email has been opened or clicked.
To use getnotify, you would be required to sign up to the service with your primary address, after which every email you sent will be suffixed by getnotify.com. For example, to track an email sent to abc@gmail.com, you would need to input abc@gmail.com.getnotify.com at the recipient's field. The tool will consequently forward the email through its servers to insert the tracking mechanisms before routing it to the recipient. When the recipient opens or clicks on the email, you will consequently get notified.
As seen below, getnotify will deliver the details of the opening of the email including when it was first opened, the service provider, IP address, operating system, and so on.
As a measure of security, you can however avoid this and other types of tracking by disabling images from loading by default in email settings.
TinEye -Reverse Image Search
Many times, you will browse the internet to look for information, including images. You might come across images from different platforms including Instagram, Facebook, and Twitter, and wonder whether they legitimately belong to the account owners. Tiny Eye will help by conducting a reverse image search on the internet to find out if the picture appears in other places as well. Most people, and especially scammers, will paste pictures from the internet to mislead others, hide their identity, and remain unknown. This tactic is used to create sock puppets (ghost individuals) to represent the owners of an account. You may for example, be misled to think that you are communicating in an online forum with a lady represented by a well-appearing profile image while all along, a male counterpart is in fact, pulling the strings. If you feel unsure about the identity of an individual online, conducting a reverse image search will always come in handy. If a search yields no matches, it probably is authentic and belongs to the supposed account owner.
The above tools are just a few of many others that can be used to gather and comprehend freely available information. Many more can be used to gather more information including IP addresses, usernames, geolocation, and so on. While some will be more technical than others, there will always be tools that are easy to use for any Tom, Dick, and Harry who isn't necessarily tech savvy. As more advances are made in technology, and as more tools are built and packaged into web apps, every individual should be able to gather rudimentary information essential for basic knowledge.
Comments
Post a Comment
Impressed? Leave a comment!