The OSINT Curious Project
By OSINTCurious
We are an OSINT-learning catalyst.
The OSINT Curious ProjectOct 23, 2020
Our Last OSINT Curious Episode
All good things come to an end, and OSINT Curious is no exception. In our final live stream, we are coming together to discuss why the project is finalized, and what is going to happen to the blog posts, videos, our discord channel, and all other material that we published along the years.
We also give a big, heartfelt THANK YOU to all of our sponsors and patreons for supporting us in running this project, but also our listeners/viewers and everyone else that has been following us on this journey, developed their OSINT skills with us, and shared comments, questions and resources.
Last, we share some of our favorite moments within OSINT Curious and discuss what's next for each of us. Thank you all for being here. Don't forget to...STAY OSINT CURIOUS!!!
Monthly OSINT News & Tools - December 2022
Join The OSINT Curious Project team as we talk about some news and tools in #OSINT.
This week, Micah (@WebBreacher) and Christina (@ChristinaLekati) put some extra emphasis on demonstrating new tools and search techniques. They started by discussing SMART (Start Me Aggregated Resource Tool), an OSINT Start.me page parser and aggregator. Bash scripting came into the conversation shortly after and along with it, Sinwindie's (@OSINTDojo) video tutorial.
OSINT on Mastodon had it's special place on this episode, as it is a social media platform that has been growing exponentially the past few weeks. We discussed what is different from other social media platforms and shared an introductory guide on how to conduct OSINT investigations on it. We also demonstrated 3 different ways & tools one can use to find usernames and accounts on Mastodon.
Micah and Christina moved on to discuss the role cryptography can play in certain investigations and shared a blog post that acts as a useful introduction into this intersection of disciplines.
Micah demonstrated the project "Backmoji", a resource that keeps historical data on the bitmoji's someone has historically used, based on their user ID. This database can reflect changes people have made in their appearance over time.
Speaking of appearances and images, we also shared a twitter thread that lists a number of resources that help conduct and improve reverse image searches. The list does not only contain tools that conduct RIS, but also editing tools that help this process.
Thank you for joining us for another episode, we wish everyone a happy holiday season and a happy new year! See you next time!
📚 LINKS AND RESOURCES mentioned in this stream:
SMART (Start Me Aggregated Resource Tool): https://webbreacher.com/2022/11/14/get-smart-about-osint/
Sinwindie's (@Sinwindie / @OSINTDojo) Bash Scripting Video - https://www.youtube.com/watch?v=hrXZv0hST0M
Blog “Mastodon OSINT: A Comprehensive introduction” https://www.secjuice.com/mastodon-osint-a-comprehensive-introduction/
WhatsMyName Username Checking Tool: https://whatsmyname.app/
Imagstodon Tool: https://seintpl.github.io/imagstodon/
Masto Tool: https://github.com/C3n7ral051nt4g3ncy/Masto
Blog: "Cryptography & OSINT - The fundamentals": https://www.dutchosintguy.com/post/cryptography-osint-the-fundamentals
Backmoji Tool: https://backmoji.osint.ninja
Twitter thread by “OSINT for All”: “Ultimate list of resources for reverse image search”: https://twitter.com/AllForOsint/status/1588348612802932736
👁🗨 OSINT Curious:
🌍WEBSITE: All of our resources, blog posts, 10 minute tips, videos and podcasts in one place. You also find ways to participate and support our project. https://osintcurio.us/
🦉TWITTER: Connect with us! We post OSINT updates, news, tips and tools, and interact with the Twitter community. https://twitter.com/osintcurious
👩💻 DISCORD: Chat with us on The OSINT Curious Discord server! This is a place to share your own resources, ask questions, give and receive help in solving OSINT challenges, and interact with a very enthusiastic OSINT community. https://iam.osintcurio.us/discord
Interview With Chris Kirsch
This week, Micah (@WebBreacher), and Christina (@ChristinaLekati) are joined by Chris Kirsch (chris_kirsch) for an interview! Chris is the CEO of runZero, a cyber asset management company he co-founded with Metasploit creator HD Moore. In 2017, he earned the Black Badge for winning the Social Engineering Capture the Flag competition at DEF CON, while last year, he participated as a judge for the vishing competition at the Social Engineering Community.
In this interview, we discuss the intersection between OSINT and social engineering. Chris shares with us stories from the application of OSINT in social engineering operations, and describes some of the top OSINT techniques and resources that he observed at the Social Engineering vishing competition.
You can follow Chris on:
Twitter: https://twitter.com/chris_kirsch
LinkedIn: https://www.linkedin.com/in/ckirsch/
Mastodon: https://infosec.exchange/@chris_kirsch
📚 LINKS AND RESOURCES mentioned in this stream:
Layer8 Presentation "Using OSINT For Competitive Intelligence": https://www.youtube.com/watch?v=NB-wLadJ3hk
Blog "Top OSINT sources and vishing pretexts from DEF CON’s social engineering competition": https://medium.com/@chris.kirsch/top-osint-sources-and-vishing-pretexts-from-def-cons-social-engineering-competition-8e08de4c8ea8
Blog "Corporate OSINT for Social Engineering": https://osintcurio.us/2022/05/17/corporate-osint-for-social-engineering/
Winning call from DEF CON SECTF 2017: https://www.youtube.com/watch?v=yhE372sqURU
Pickpocketing talk: https://www.youtube.com/watch?v=OvET4r4uARQ
Social engineering resources: https://medium.com/@chris.kirsch/social-engineering-recommended-resources-10243113b80b
Chris' company: https://www.runzero.com/
External scanning using runZero: https://www.runzero.com/blog/external-scanning/
👁🗨 OSINT Curious:
🌍WEBSITE: All of our resources, blog posts, 10 minute tips, videos and podcasts in one place. You also find ways to participate and support our project. https://osintcurio.us/
🦉TWITTER: Connect with us! We post OSINT updates, news, tips and tools, and interact with the Twitter community. https://twitter.com/osintcurious
🤝 PATREON SPONSORSHIP: As our project continues to grow, we are increasingly thankful for those people, companies, and organizations that choose to support us financially. https://www.patreon.com/osintcurious
👩💻 DISCORD: Chat with us on The OSINT Curious Discord server! This is a place to share your own resources, ask questions, give and receive help in solving OSINT challenges, and interact with a very enthusiastic OSINT community. https://iam.osintcurio.us/discord
Monthly OSINT News & Tools - October 2022
This week, Micah (@WebBreacher) and Christina (@ChristinaLekati), are joined by Robin (@NothicEye) to talk about this month's #OSINT News & Tools.
Our conversation started by focusing on the individuals that are wishing to enter the world of open-source intelligence not only as hobbyists but also, perhaps, as professionals. We talked about our latest blog post “Five tips to get you started in OSINT” in which 5 of our OSINT Curious members are sharing one quick tip each on getting started in this space.
Thinking of the ones who would like to start a career in OSINT or look for different opportunities, we moved on to discuss a series of new interviews that were posted last month in the OSINT Jobs website. The blog/interview series is called “What hiring managers are looking for” and draws from the perspectives of 6 different hiring managers in the OSINT industry. The questions in these interviews include "how can candidates stand out right away?" and "What does the recruitment process look like in your organization?" among other, many interesting questions.
Few things can help an OSINT practitioner develop their skills and broaden their perspective more than belonging to a small or large group or community. Robin (@NothicEye) who is also one of the moderators of the OSINT Curious Discord group, was able to share with us her observations from participating in OSINT-focused groups. She points out that smaller groups of practitioners can have a wide range of benefits.
Our team then moved on to discussing Nico Deken's (@dutch_osintguy) updates on his programmable search engine for people's digital business cards and social media details.
For the Geolocation fans we shared and discussed two resources:
1. Benjamin Strick's (@BenDoBrown) YouTube videos in which he goes through different tips, techniques and tools in geolocating visual elements. Last week, Benjamin started a new video series called "Let's Geolocate"
2. A Geolocation Cheat Sheet from @TheSEINT - a pretty detailed mind map with different elements that you can investigate when you analyze an image and try to geolocate it.
All the relevant links can be found below!
📚 LINKS AND RESOURCES mentioned in this stream:
OSINT Curious Blog: “Five tips to get you started in OSINT” : https://osintcurio.us/2022/10/13/five-tips-to-get-you-started-in-osint/
OSINT Jobs Blog Post Series: “What hiring managers are looking for” : https://www.osint-jobs.com/blog/career-osint-jobs
Nico Deken’s Custom Digital Business Card Search Engine: https://github.com/Dutchosintguy/digital-business-cards-pse/
Benjamin Strick’s new YouTube series “Let’s Geolocate” (& other videos): https://www.youtube.com/c/Bendobrown
Geolocation Cheat Sheet from @TheSEINT https://github.com/seintpl/osint/blob/main/Geolocation%20Analysis%20Diagram%20Outside%20clues.pdf
👁🗨 OSINT Curious:
🌍WEBSITE: All of our resources, blog posts, 10 minute tips, videos and podcasts in one place. You also find ways to participate and support our project. https://osintcurio.us/
🦉TWITTER: Connect with us! We post OSINT updates, news, tips and tools, and interact with the Twitter community. https://twitter.com/osintcurious
🤝 PATREON SPONSORSHIP: As our project continues to grow, we are increasingly thankful for those people, companies, and organizations that choose to support us financially. https://www.patreon.com/osintcurious
👩💻 DISCORD: Chat with us on The OSINT Curious Discord server! This is a place to share your own resources, ask questions, give and receive help in solving OSINT challenges, and interact with a very enthusiastic OSINT community. https://iam.osintcurio.us/discord
Monthly OSINT News & Tools - September 2022
This week, Micah (@WebBreacher), Christina (@ChristinaLekati), and Nico (@dutch_osintguy) talked about this month's #OSINT News, Tools and Blogs.
They started by discussing a new blog post by Theo Baxter (@T-Baxter90) on investigating violent and distressing content through an OSINT investigation. Two additional resources were recommended by our team, as complementary reading/viewing material to this very important topic. They also discussed their new OSINT Curious blog post “Find Company Data With A Programmable Search Engine”, written by @nixintel.
Micah, Christina, and Nico went on showcasing and discussing some new interesting tools, including a tool that conducts url scans, a database of landmarks, and Instagram's new map feature that allows you to view the public stories from specific locations. They also showcased how to change user agent in Chrome, using built-in features.
Last, this week's OSINT Curious team discussed some recent community projects and contributions that our listeners and viewers could find both useful and entertaining. If you did not have enough of OSINT goodness this week, head out to the videos that our team produced, in collaboration with David Bombal (details in the links below).
📚 LINKS AND RESOURCES mentioned in this stream:
Blog "Investigating violent & distressing content as part of OSINT investigations" : https://medium.com/@T_Baxter90/investigating-violent-distressing-content-as-part-of-osint-investigations-6fa141fa7f2d
Blog "Vicarious trauma and OSINT – a practical guide" : https://osintcurio.us/2020/06/08/vicarious-trauma-and-osint-a-practical-guide/
OSINT Curious Live Stream with Nicole Beckwith on mental health during OSINT investigations: https://www.youtube.com/watch?v=03t7ctuVMnk
Blog "Find Company Data With a Programmable Search Engine": https://osintcurio.us/2022/09/12/find-company-data-with-a-programmable-search-engine/
UrlScan: https://urlscan.io
GeoHints: https://geohints.com/
Instagram's map feature: https://www.businessinsider.com/guides/tech/instagram-map
UserAgent Switcher: https://twitter.com/WebBreacher/status/1572595024046465024
WhatsMyName: https://whatsmyname.app
David Bombal's Videos With:
Lisette, Steven, and Micah - https://www.youtube.com/watch?v=ImWJgDQ-_ek
Lisette and Steven - https://www.youtube.com/watch?v=OsY32K1s51Y
Micah - https://www.youtube.com/watch?v=F6l2Bmh7Dq4
NotMyPlate - Car Tracking: https://twitter.com/intidc/status/1574263808607997953
👁🗨 OSINT Curious:
🌍WEBSITE: All of our resources, blog posts, 10 minute tips, videos and podcasts in one place. You also find ways to participate and support our project. https://osintcurio.us/
🦉TWITTER: Connect with us! We post OSINT updates, news, tips and tools, and interact with the Twitter community. https://twitter.com/osintcurious
🤝 PATREON SPONSORSHIP: As our project continues to grow, we are increasingly thankful for those people, companies, and organizations that choose to support us financially. https://www.patreon.com/osintcurious
👩💻 DISCORD: Chat with us on The OSINT Curious Discord server! This is a place to share your own resources, ask questions, give and receive help in solving OSINT challenges, and interact with a very enthusiastic OSINT community. https://iam.osintcurio.us/discord
Interview with Alex Slotnick (@BOsintBlanc)
This week, Micah (@WebBreacher), Christina (@ChristinaLekati), and Michael James (@Ginsberg51050) talk with Alex Slotnick (@BOsintBlanc), a threat intelligence analyst and the case tracking & statistics lead for the National Child Protection Task Force.
Alex talked to us about his journey from Desktop Support to becoming an OSINT analyst, teaching himself the necessary skills to get started, and volunteering within a non-profit, which enabled him to offer the skills he had while also acquiring new ones through practical work and networking. As it turns out, getting this practical experience helped him to eventually get a corporate OSINT job too.
He also talked to us about how he handles his confidence levels when working with incomplete data, and offered practical advice on acquiring several points of verification. As a natural follow-up to this conversation was some advice on handling data that contradict a finding or an investigative conclusion.
Alex talked to us about his work at the National Child Protection Task Force, and answered multiple questions from the audience. He offered recommendations on books, tools, and offered advice on getting into OSINT.
You can follow Alex on:
Twitter: https://twitter.com/BOsintBlanc
LinkedIn: https://www.linkedin.com/in/bosintblanc/
📚 LINKS AND RESOURCES mentioned in this stream:
The National Child Protection Task Force (NCPTF): https://www.ncptf.org/
Book: Structured Analytic Techniques by R. H. Pherson & R. J. Heuer
Book: Open Source Intelligence Techniques by M. Bazzell
Book: The Psychology of Intelligence Analysis by R. J. Heuer
OSINT Dojo: https://www.osintdojo.com/
Epieos: https://epieos.com/
Dehashed: https://www.dehashed.com/
👁🗨 OSINT Curious:
🌍WEBSITE: All of our resources, blog posts, 10 minute tips, videos and podcasts in one place. You also find ways to participate and support our project. https://osintcurio.us/
🦉TWITTER:
Connect with us! We post OSINT updates, news, tips and tools, and interact with the Twitter community. https://twitter.com/osintcurious
🤝 PATREON SPONSORSHIP:
As our project continues to grow, we are increasingly thankful for those people, companies, and organizations that choose to support us financially. https://www.patreon.com/osintcurious
👩💻 DISCORD:
Chat with us on The OSINT Curious Discord server! This is a place to share your own resources, ask questions, give and receive help in solving OSINT challenges, and interact with a very enthusiastic OSINT community. https://iam.osintcurio.us/discord
Monthly OSINT News & Tools - August 2022
Join The OSINT Curious Project team as we talk about some news and tools in #OSINT.
This week, Micah (@WebBreacher) and Christina (@ChristinaLekati) talked about the OSINT Conferences that will be happening within the coming months, most of which are free to attend and packed with interesting talks.
They moved on discussing & showcasing some tools starting with CCTV Mass Pirates, a map that shows the locations and certain specifications of over 160.000 cameras around the world. Some of the cameras on the map have open feeds, while another data point you may find are Mapillary keys. Mapillary is a service that is crowdsourcing geotagged photos & videos. Combined with the CCTV Mass Pirates map, these tools may prove very useful for investigations where Google StreetView is blocked or non-existent. After that, they talked about Travel Time Map, a tool that draws a travel time area on a map while giving you plenty of options to narrow down your research: travel means (bike, transportation, car, foot), date, time span, and more. These tools can be used on their own, or in combination. For that reason, we also discussed use cases.
Micah and Christina then talked about Image Extractor, a tool that allows users to download/extract all available images from a webpage. They went on highlighting OSINT Dojo as one of the useful resources in our community to practice and learn OSINT skills, but also talked about the Attack Surface Diagrams that are provided in the resources of OSINT Dojo's webpage (view links below).
Later, they discussed the new OSINT Dark Web bookmarks provided by OSINT Combined, a curated list of bookmarks including search engines, services lists, leak sites and other resources that help OSINT investigators conduct research in the dark web.
Last, they briefly discussed the two latest blog posts that were published through OSINT Curious, the team's upcoming streams and some news and activities that our OSINT Curious members have been involved in (including Rae Baker's upcoming OSINT book)!
📚 LINKS AND RESOURCES mentioned in this stream:
Recon Village: https://reconvillage.org/
GOSINTCon (German speaking OSINT conference): https://gosintcon.de/
Australian OSINT Symposium: https://www.osintsymposium.com/
Layer8 Conference: https://layer8conference.com/2022-back-in-person/
CCTV Mass Pirates: https://cctv.masspirates.org/
Mapillary: https://www.mapillary.com/
Travel Time Map : https://app.traveltime.com/
Image Extractor: https://extract.pics/
OSINT Dojo Diagrams: https://www.osintdojo.com/diagrams/main
OSINT Combined Dark Web Bookmarks: https://www.osintcombine.com/dw-osint-bookmarks
Old Skool OSINT Blog: https://osintcurio.us/2022/08/04/old-skool-osint/
Saving Facebook Blog: https://osintcurio.us/2022/06/14/saving-facebook/
👁🗨 OSINT Curious:
🌍WEBSITE:
All of our resources, blog posts, 10 minute tips, videos and podcasts in one place. You also find ways to participate and support our project. https://osintcurio.us/
🦉TWITTER:
Connect with us! We post OSINT updates, news, tips and tools, and interact with the Twitter community. https://twitter.com/osintcurious
🤝 PATREON SPONSORSHIP:
As our project continues to grow, we are increasingly thankful for those people, companies, and organizations that choose to support us financially. https://www.patreon.com/osintcurious
👩💻 DISCORD:
Chat with us on The OSINT Curious Discord server! This is a place to share your own resources, ask questions, give and receive help in solving OSINT challenges, and interact with a very enthusiastic OSINT community. https://iam.osintcurio.us/discord
Interview with Jessica Smith (@scarlettsleuth)
This week, Micah (@WebBreacher) and Christina (@ChristinaLekati) talk with us Jessica Smith (@scarlettsleuth), founder of ClickSafe Intelligence and a volunteer at the National Child Protection Task Force.
We discuss Jessica's work in OSINT and her contributions at the National Child Protection Task Force. Jessica offers her perspective and tips in working against online child exploitation and together with parents to protect children from predators. She also talks to us about her latest venture, ClickSafe Intelligence, which aims to create and deliver relevant, illustrative, and evidence-driven child exploitation prevention and response education to parents, kids and child-safety professionals.
If you are a parent or simply a concerned individual that cares about online safety, this is a great interview to listen to.
Links & Resources mentioned in this stream: Jessica's Twitter Profile: https://twitter.com/scarlettsleuth
National Child Protection Task Force: https://www.ncptf.org/
National Child Protection Task Force Twitter Account: https://twitter.com/NCPTF8
(@ncptf8) ClickSafe Intelligence: https://clicksafeintelligence.com/
ClickSafe Intelligence Twitter Account: https://twitter.com/clicksafeintel
(@clicksafeintel)
#osint #osintcurious #opensourceintelligence #onlinesafety
Interview With Loránd Bodó - OSINT Jobs
This week, Micah (@WebBreacher), Michael James (@Ginsberg5150) and Christina (@ChristinaLekati) talk with Loránd Bodó (@LorandBodo) about his new project OSINT Jobs (https://www.osint-jobs.com), a platform that shares hand-picked, OSINT-related job openings and helps the OSINT community grow their skills and advance their careers.
They discuss about the diversity of OSINT-related jobs in different industries, and about how Loránd is curating the job opportunities he publishes on the website.
They also talk about utilizing the content that is published within www.osint-jobs.com which includes interviews, blog posts and a podcast. Those resources help individuals to better understand what career path to follow within the realm of OSINT, how to develop the skills necessary for their dream job, and how to get connected and apply for jobs.
Last, they talked about doing freelance work and getting a fair pay for OSINT services, along with answering viewer questions.
OSINT Live Stream : OSINT News & Tools - January & February 2022
Join The OSINT Curious Project team as we talk about some news and tools in #OSINT. This week, Micah (@WebBreacher) and Christina (@ChristinaLekati) briefly talk about the new OSINT Curious blog : "Location of an IP Address" and the dangers of relying too heavily on the geolocations that become available through IP addresses. Sector035 (@Sector035), who authored the blog, will cover this topic in more detail next week. They also talked about the Geowifi, a tool that aggregates wifi data from multiple sources, and discussed #OSINT use cases with the tool Cleanup.Pictures, a tool that is used to retouch images by removing objects, people, texts and other disturbances. Micah and Christina also talked about the role of gut feelings and hunches in OSINT as well as how they can support or hinder the intelligence analysis process. Listening to our gut feeling is important, but in intelligence analysis one needs to also be aware of their biases, and of how their past experiences might affect their gut feeling and their judgement. Last, they talked about Obsidian, a note-taking and knowledge management tool that provides many possibilities when it comes to documenting, organizing, and creating connections between data - or even their thoughts.
Interview with Sarah Womer (@UnleashedOSINT)
Our @ChristinaLekati, @LorandBodo & @Webbreacher spoke to Sarah (@UnleashedOSINT) about her career, teaching youth in online safeguarding practices, OSINT, ethics, and much more.
Interview with Jessica Davis (@JessMarinDavis)
In our new interview @lorandbodo talked to terrorist financing expert @JessMarinDavis about her career, her new book "Illicit Money", & what role #OSINT can play in combating terrorist financing Follow Jessica on Twitter: https://twitter.com/JessMarinDavisSubscribe to her newsletter: https://insightintel.substack.com/Get her new book Illicit Money on Amazon: https://www.amazon.com/Illicit-Money-Financing-Terrorism-Twenty-First/dp/1626379823/
Interview with Freddy M.
In this week's OSINTCurious interview, we spoke to Freddy M., a Senior Threat Intelligence analyst and experienced intelligence expert on the steps involved in producing intelligence. Freddy walks us through his intelligence architecture map, which is a very detailed visual representation of all the steps involved.
Freddy's intelligence architecture map can be found here.
Join us on our OSINTCurious Discord.
Reach out to Freddy on Discord. His name is Furdy.
For more #OSINT, follow us on Twitter.
Livestream with Nicole Beckwith
This week, Micah Hoffman, Christina Lekati, John TerBush, and Josh Huff talked with Nicole Beckwith (https://twitter.com/NicoleBeckwith) about mental health in OSINT investigations.
This conversation was filled with practical advice and tips that you can apply before, during and after an investigation.
We talked about the Honeycomb effect and about preparing your investigative workspace by creating as few mental anchors as possible in order to have a clear separation between investigating and the rest of your everyday life and activities.
We analyzed the H.A.L.T. technique, which refers to checking whether you are Hungry, Angry, Lonely or Tired before or during an investigation, and making sure that you take care of those needs.
We also talked about listening to your body to recognize signs of tension during an investigation and taking a step back when you recognize these signs by applying the 5-4-3-2-1 grounding method: focusing on 5 things that you see, 4 things that you feel, 3 things that you hear, 2 things that you smell and 1 thing that you taste- preferably lemon water.
We finished our conversation by discussing the flip side of the coin- getting into your target's mind, establishing their baseline and finding their motives.
Interview with Janna (@JannaJoceli)
This week, @IWN_LX & @LorandBodo spoke to @JannaJoceli a research fellow at the Center for Advanced Internet Studies (CAIS). Main topic of discussion - digital research methods & as usual lots of #OSINT
Interview with Lana (@IntelLana)
In this week's OSINTCurious interview, we spoke to Lana, an analyst at a German law enforcement agency. She told us about her career, challenges she faces and gave us insights into the daily tasks of an OSINT analyst at an LE agency.
Interview with Kevin Metcalf (@Volk_NCPTF)
This week we interviewed Kevin Metcalf, a former federal agent turned prosecutor and founder of the National Child Protection Task Force (NCPTF). Kevin told us about the history of the organisation, how OSINT is being used to find missing children as well as prosecute predators, and some of the challenges the organisation faces when doing such work.
Interview with Tokyo (@Tokyo_v2)
In this week's interview the #osintcurious crew interviews Tokyo (@Tokyo_v2). She is a well known person within the Open Source Intelligence community about her blogs on #OSINT in Japan and doing OSINT on Airbnb. She is also part of and actively contributes to the @teamsearchlight OSINT crew. We talk with her about what got her into #OSINT how she tackles her self paced learning within OSINT.
Interview with DJNemec (@djnemec)
In this week's interview the #osintcurious crew interviews Dan Nemec (@djnemec). He is a software developer at a large company and spends a lot of his spare time on OSINT. Dan's contributions are very well known within the OSINT community. We talk to him about how he got into developing #OSINT tools and how he uses #python coding to speed up certain repetitive tasks.
Interview with John Marquee (@john_marquee)
In this episode, the #osintcurious crew interviews John Marquee (@john_marquee). He is an Open Source investigator and very well known for his #geolocating skills. John also contributed to #BBCAfricaEye, #NYtimes and #Amnesty international projects. We talk to him about how he got into #OSINT. John also talks about how one can get better at geolocating giving some excellent tips and tradecraft tricks.
Interview with Robert Baptiste (@fs0c131y a.k.a Elliot Alderson)
In this episode the #osintcurious crew interviews Robert Baptiste (@fs0c131y a.k.a Elliot Alderson). He is a well known #cyber security researcher with lots of mobile application reverse #malware engineering skills. We talk with him about how he overlaps reverse engineering with #OSINT as well as his new company that makes #bigdata available to fight #disinformation amongst other subjects.
Interview with Rui Barros
Check out our interview with Rui Barros. Rui is a Portuguese data journalist and uses data to tell stories. His visualizations and work can be found on his website: https://ruimgbarros.com/projects/
Interview with Griffin (@hatless1der)
In this #osintcurious interview we sit down with Griffin (@hatless1der). We talk about his background doing investigative work for over 20 years and how he started getting into #OSINT. We talk about how he combines OSINT within his investigation within the private sector as well as him being part of the NCPTF (National Child Protection Task Force).
Episode 53: OSINT Tips, Tricks and Techniques with Ines, Technisette, Micah and Steven
Tune for this episode and listen to Micah, Steven, Ines and Technisette engage in the newest OSINT topics
Episode 52: OSINT Goodness with Micah, Ritu, Christina, Steven and John
Join the OSINT Curious crew as they discuss OSINT tips, tricks and techniques
Interview with Christina Lekati
This time we interviewed our new #osintcurious advisory board member Christina Lekati. We talked about her background in psychology and how it correlates to #osint and #humint.
Interview with Justin Seitz
We had a chance to interview Justin Seitz a.k.a @jms_dot_py. Justin is the owner of Hunchly, creator of two Python coding Books, co- author Automating OSINT with Python course to name a few things. He is a renowned name within the cyber and OSINT community. Join the OSINTcurious crew and Justin for a interview and talk with Justin.
Episode 51: What do you need to become an intermediate OSINTer? How can Shodan contribute to OSINT investigations?
Join Technisette (@technisette), Inês (@IWN_LX), Nico (@dutch_osintguy), Micah (@WebBreacher) and Steven (@nixintel) on the newest episode as they discuss the skills needed to become an intermediate OSINTer. How do you improve your OSINT skills? How do you find an OSINT job? Will certificates help you in your job search? Lean back and listen to these experts provide valuable tips on how to get to the next level of OSINT.
Furthermore, the team takes a look at the possibilities that Shodan offers in OSINT investigations.
Episode 50: New stream format, OSINT on the US Capitol Event, crowd-sourced OSINT and law enforcement
Happy New Year! We're back in 2021 with a new format. Today Micah (@WebBreacher), John (@thegumshoo), Steve (@nixintel) and Matthias (@MwOsint) discuss OSINT activities around the recent event at the US Capitol, e.g. how crowd-sourced OSINT can support law enforcement and how content was collected and saved by non-profits before being erased off the internet.
Episode 49: It's a wrap! Discussion on tools vs. training, creating intelligence products, sharing OSINT techniques and more
In this final episode of The OSINT Curious Project webcast/podcast in 2020, we have an interesting panel discussion for you. Micah, Matthias, and Steven discuss some OSINT topics.
People in this Episode- Micah Hoffman (@WebBreacher)
- Matthias Wilson (@mwosint)
- Steven Harris (@nixintel)
- Micah spoke about The OSINT Curious Project and its resources.
Page to find the Advisory and Executive Board members: https://osintcurio.us/about-our-project/
Page to find an organized list of our blogs and videos: https://bit.ly/osintcuriousresources
Page to find our sponsors and patrons: https://osintcurio.us/sponsors-and-contributors/
Patreon page to send donations to help us run the project: https://patreon.com/osintcurious
- Our discussion today, touched upon the following topics:
Understanding how tools work (https://medium.com/@micallst/misusing-osint-to-claim-election-fraud-cfb89c858c3a)
Tools versus training
Creating final intel products
Sharing of OSINT techniques
Creating a risk profile prior to OSINT investigations
Disinformation/Misinformation
- Our favorite interviewees and blog posts from OSINT Curious’ 2020
Thank you for listening, watching, and reading our content in 2020!
Episode 48: Keyword search on Instagram, Scraping Fleets, OSINTDojo, AI-generated photos, Parler searching
- Micah Hoffman (@WebBreacher)
- Nico Dekens (@dutch_osintguy)
- Ritu Gill (@OSINTTechniques)
- Nico is tracking all black friday / cyber monday related deals for you: https://github.com/Dutchosintguy/Blackfriday-Deals-2020
- Interesting Twitter thread on Arabic clothing that might be useful in some OSINT investigations: https://twitter.com/AD_GQ/status/1331092825858076673
- Nico’s tip on how to search for Parler content without accessing Parler: https://twitter.com/dutch_osintguy/status/1330515656916262912
- Keyword search is coming to Instagram! More info here: https://www.theverge.com/platform/amp/2020/11/17/21570475/instagram-keyword-search-update-hashtag-account?__twitter_impression=true
- YouTube-DI is back on GitHub: https://github.blog/2020-11-16-standing-up-for-developers-youtube-dl-is-back/
- Practice your verification skills with First Draft News’s new interactive quizzes: https://ftp.firstdraftnews.org/articulate/temp/ovcR/story_html5.html
- Need some AI generated faces? Check out this massive archive but keep in mind they’re easily recognisable: https://generated.photos/faces
- Great Twitter thread on scraping Fleets without triggering the ‘read’ notification: https://twitter.com/donk_enby/status/1329935540049817600
- Great resource for international geolocation and winning the GeoGuessr.com game: https://geotips.net/
- There’s a new OSINT project, called OSINTDojo that you might want to check out: https://www.osintdojo.com/
- Wanna view all tweets from one account? Then check out this tool: https://nitter.net/
- Protect your identity by creating an AI-generated photo of yourself: https://generated.photos/anonymizer#
- Ritu will be teaching the SANS SEC487 OSINT course with Micah in December. Look at https://www.sans.org/event/cyber-defense-initiative-2020-live-online/course/open-source-intelligence-gathering for details.
- Nico will also be on the https://zolder.io/category/zoldersessions/.
Episode 47: Samuel Lolagar (OSINTGeek), FireEye VM, Dark Web, Parler, ETags, a bit of SIGINT and collecting info from Youtube videos
Samuel’s website: https://osintgeek.de
- Micah Hoffman (@WebBreacher)
- Matthias Wilson (@MwOsint)
- Steven Harris (@nixintel)
- John TerBush (@thegumshoo)
- Nico Dekens (@dutch_osintguy)
- Lisette (@technisette)
- Here’s a new VM from FireEye for threat intel/research: https://github.com/fireeye/ThreatPursuit-VM
- Check out OSINTCombine’s new blog post on dark web OSINT: https://twitter.com/osintcombine/status/1326329875037216768
- If you want to know more about Parler and what info you can find: https://twitter.com/firstdraftnews/status/1326973035207921667
- Case study of how to verify and geolocate images: https://mxsx.eu/2020/11/13/Wakashio.html
- How to use ETags (part of the HTTP response) in OSINT investigations: https://medium.com/@catalyst256/osint-etag-youre-it-ecd7e923392c
- Article about militias, their radio gears and channel frequencies utilised by them: https://radiofreeq.wordpress.com/2016/01/19/militia-radio-frequencies/
- Tool to collect valuable info from YouTube videos: https://tools.digitalmethods.net/netvizz/youtube/
- Lorand’s new blog post explains how to construct powerful search queries: https://www.lorandbodo.com/blog/constructing-searchqueries-osint
- Curated dark web resources for OSINT by MidaSearch: https://midasearch.org/dark-web/
- Thoughts about sockpuppet accounts for OSINT: https://www.aaroncti.com/lets-talk-about-sockpuppet-accounts/
- Matthias and Samuel are preparing for the German OSINT conference. More info here: https://gosintcon.de
- Micah and John are co-chairs of the SANS OSINT Summit, a free 2-day OSINT conference in February 2021 (https://www.sans.org/event/osint-summit-2021/) and are looking for presenters and attendees!
- DutchOSINTGuy is proud of his SANS SEC537 Practical OSINT Class (https://www.sans.org/cyber-security-courses/practical-osint-analysis-and-automation/). Registration is open for those classes at significant discount.
Episode 46: Guest Amine Ghoulidi, resources on mis- and disinformation, investigating international phone numbers, Geolocation 10-minute tip and much more!
Today’s special guest
- Amine (@aityaakub)
- Micah Hoffman (@WebBreacher)
- Matthias Wilson (@mwosint)
- Lorand Bodo (@LorandBodo)
- Steven Harris (@nixintel)
- John TerBush (@thegumshoo)
- TOCP Resource List: https://bit.ly/osintcuriousresources
- What to do when a Facebook profile is private? https://osintcurio.us/2020/10/19/what-to-do-when-a-facebook-profile-is-private/
- 10 Minute Tip on geolocation – part I: https://osintcurio.us/2020/11/01/ten-minute-tip-image-geolocation-part-1/
- Bellingcat’s OSINT tools: https://docs.google.com/spreadsheets/d/18rtqh8EG2q1xBo2cLNyhIDuK9jrPGwYr9DI2UncoqJQ/edit
- Resources on mis/disinformation: https://mediamanipulation.org
- Training session on how to verify images/videos by Jane Lytvynenko: https://www.youtube.com/watch?v=8aMk48O3vpM&feature=youtu.be
- Geolocating Kim Kardashian: https://vickymochama.medium.com/how-dare-you-kim-kardashians-40th-birthday-an-investigation-766dc879eb23
- Guide on how to use Optical Character Recognition: https://www.ghacks.net/2020/10/24/screentranslator-is-an-open-source-tool-that-can-translate-text-from-images/
- Finding connections between entities based on text: https://jantegze.medium.com/how-to-find-out-who-owns-my-data-d0c7984ae20f
- Investigate international phone numbers: https://www.secjuice.com/phone-numbers-investigation-the-open-source-way/
- RIAA GitHub projects for downloading YouTube videos https://www.zdnet.com/article/riaa-blitz-takes-down-18-github-projects-used-for-downloading-youtube-videos/
- Lorand’s blog on how to search social media: https://www.lorandbodo.com/blog/social-media-search-strategies
- Christina Letaki & OSINTGeek’s blog on combining intelligence disciplines: https://osintgeek.de/fcihi/blog/index.html
- and much more!
Episode 45: Q&A with the audience, lifting fingerprints from fotos, CONINT, understanding time stamps on social media, Google IDs and more
- Micah Hoffman (@WebBreacher)
- Matthias Wilson (@mw_Osint)
- Lorand Bodo (@LorandBodo)
- Technisette
- Sector035
- Ritu Gill (@OSINTTechniques)
- John TerBush (@thegumshoo)
- App usage by country: https://www.applyzer.com/?mmenu=worldcharts
- Top sites worldwide: https://www.alexa.com/topsites
- OSINT technique to find Start.me page: https://twitter.com/OSINTtechniques/status/1316937466222465024
- Download Win7, 8.1 and 10 (90 day trial) VM’s: https://developer.microsoft.com/en-us/microsoft-edge/tools/vms/ & https://web.archive.org/web/20191226134552/https://developer.microsoft.com/en-us/microsoft-edge/tools/vms/
- Sinwindie’s attack surface for the dark web: https://twitter.com/sinwindie/status/1315082663384899584
- Lifting fingerprints from photos: https://twitter.com/BenDoBrown/status/1317544626425913351
- Lorand Bodo’s new website & blog: https://lorandbodo.com
- RSS feeds for Subreddits: https://twitter.com/LorandBodo/status/1314548615071834112
- Download CONINT presentations here: https://conint.io/2020downloads
- Understanding time stamps on social media: https://twitter.com/firstdraftnews/status/1314007636036259842
- Update on WeVerify: https://twitter.com/WeVerify/status/1317548452784578561
- Data scraping with Google Sheets: https://tompatrickjarvis.medium.com/data-scraping-with-google-sheets-to-assist-journalism-and-osint-tutorial-4f490d0dd5c4
- Blog post on pivoting and researching info: https://keyfindings.blog/2020/10/16/where-is-leonardos-car-using-osint-to-trace-vehicles/
- Retrieve info about Google account &activity: https://tools.epieos.com/google-account.php
- Keeping grid on Google IDs: https://sector035.nl/articles/keeping-a-grip-on-google-ids
- and much more!
Episode 44: Guest Julia Bayer, Geolocating without Street View and Google Maps, SOCMINT on foreign social media, FOCA for OSINT, DNS research
This week’s guest is Julia Bayer (@bayer_julia)
Julia Bayer is an investigative journalist, innovation manager and trainer at Deutsche Welle. At DW´s Investigative unit she is diving deep online collecting publicly available sources to uncover the (in)visible using OSINT. Before that she researched and verified UGC for (breaking) news at DW´s Social Media Newsroom.
People in this Episode- Nico Dekens (@DutchOSINTGuy)
- Matthias Wilson (@mwOsint)
- Lorand Bodo (@LorandBodo)
- Nixintel (@nixintel)
- Sector035 (@sector035)
- Rae Baker (@wondersmith_rae)
- OSINTCurious blog post by Technisette: https://osintcurio.us/2020/09/28/when-there-is-no-google-earth-or-street-view-what-can-you-do/
- Blog by Matthias Wilson: SOCMINT on foreign platforms: https://keyfindings.blog/2020/10/04/social-media-around-the-world/
- Updated browser extension by OSINTSupport: https://osint.support/chrome-extensions/2019/09/29/osint-socmint-tooling.html
- Google dorks to access confidential information: https://benjaminstrick.com/dear-x-your-staff-passwords-numbers-and-confidential-data-is-on-google/
- Blog post by Nixintel: https://nixintel.info/osint/do-dns-records-prove-that-jim-watkins-is-q/
- Blog post by Rae Baker: https://medium.com/@raebaker/using-foca-for-osint-document-metadata-analysis-6745c8d709fa
- Search for emojis: https://www.fastemoji.com/
- Update by Telegram: https://twitter.com/LorandBodo/status/1311591571498971136
- 2020 OSINT tools & resources handbook by @i_intelligence: https://i-intelligence.eu/resources/osint-toolkit
- FREE online investigative training course for journalists: https://twitter.com/KnightCenterUT/status/1312508586216497153
- Create your own bookmarks database: https://www.aware-online.com/en/create-your-own-osint-database-with-bookmarks/
- Thread on how to investigate websites: https://twitter.com/aware_online/status/1308312883248467975
- How discover relationships between websites using Maltego: https://www.maltego.com/blog/tracing-internet-relationships-with-maltego/
Episode 43: Guest Emmanuelle Welch, Maltego for Telegram, Google Account Finder, WIPO Database, Twitter Analysis Framework
This week’s guest is Emmanuelle Welch (@frenchpi)
Emmanuelle Welch is a Licensed Private Investigator, Certified Fraud Examiner, and owner of French Connection Research, a private investigative agency in Brooklyn, NY, licensed in New York and Washington, DC. She specializes in white-collar crime investigations, cross-Atlantic litigation support and OSINT analysis.
People in this Episode
- Nico Dekens (@DutchOSINTGuy)
- Lorand Bodo (@LorandBodo)
- Nixintel (@nixintel)
- Kirby Plessas (@kirbstr)
- John (@thegumshoo)
- Rae Baker (@wondersmith_rae)
- Emmanuelle’s OSINT tools/resources start.me page for dating apps: https://start.me/p/VRxaj5/dating-apps-and-hook-up-sites-for-investigators
- Introduction to researching foreign influence in the US: https://osintcurio.us/2020/09/14/introduction-to-researching-foreign-influence-in-the-us/
- NEW Twitter Analysis framework by @sowdust: https://github.com/sowdust/tafferugli
- OSINT Intelligence Cycle by @sinwindie: https://www.secjuice.com/the-osint-intelligence-cycle-part-i-planning-and-direction/
- Maltego Transform for Telegram: https://twitter.com/noneprivacy/status/1304357985297346560?s=21
- Using R to find stories in financial publicly available data: https://medium.com/@itoufexi/how-i-used-the-companies-house-streaming-api-to-find-a-newsworthy-story-a96d787955b2
- How hackers can find sensitive information in your photos: https://medium.com/digital-marketing-lab/subtle-information-hackers-find-in-the-background-of-your-social-media-photos-938ec1876246
- Interesting and detailed case study about what can be found with someone’s passport number: https://mango.pdf.zone/finding-former-australian-prime-minister-tony-abbotts-passport-number-on-instagram
- Google Account Finder: https://tools.epieos.com/google-account.php
- Best investigative podcasts: https://gijn.org/2020/09/09/a-global-tour-of-top-investigative-podcasts-the-2020-edition/
- Call for proposals for ConINT (@conint)_io: https://twitter.com/CONINT_io/status/1306676769718706181
- Database of industrial designs data: https://twitter.com/navlys_/status/1306333649877504000
- How to use industrial designs data for OSINT: https://keyfindings.blog/2020/05/03/using-the-wipo-ip-portal-for-osint/
Episode 42: New Facebook design, creating sock puppets, Redditor, OSINT on Telegram, WhatsMyName Update
We are back with a brand new episode after our one-month summer break! In this week’s episode, we catch up with the latest OSINT news, as usual!
People in this Episode- Micah Hoffman (@webbreacher)
- Nico Dekens (@Dutch_osintguy)
- Lorand Bodo (@LorandBodo)
- Sector035 (@Sector035)
- Technisette (@technisette)
- Rae Baker (@wondersmith_rae)
- A big thank you to all our sponsors and Patreon patrons who have been supporting us!
- Learn how to create a sock puppet account for your OSINT investigations here
- Learn about the main differences between the old and new Facebook design here
- Check out this new OSINT tool, called Redditor. It’s similar to Tweetdeck but just for Reddit
- Need some new OSINT resources? Then check out this amazing collection
- Dutch's talk about leveraging Telegram for OSINT purposes
- Sinwindie’s attack surface for Twitter. For similar flow charts, click here
- Interested in detecting deep fakes? Microsoft has launched a new tool to detect them
- Here’s a great thread about some of the most popular dark net markets. Get free and daily updates about new dark net sites
- Update about PimEye – a facial search engine
- Wanna track ‘dictators’? Check out this website that tracks aircraft associated with specific countries
- New updates for SentinelHub
- Also new updates for WhatsMyName – a username search engine developed by Micah in collaboration with OSINTCombine and many others.
- Search for 393+ million US court records on JudyRecords
- Practice OSINT and work on real cases. Tracelabs has announced monthly OSINT Search Party CTFs!
- Micah will be at the OSINT Symposium in Australia and OSMOSISCon in October
- Rae will be presenting at the Bsides conference in Copenhagen on 18/19 September
- Lisette will be presenting at OSMOSISCon in October – check out her new website too
Episode 41: Special Guest Ines Narciso, video search tool Peteyvid, estimating crowd sizes, and more on facial recognition (even for dogs)
Special Guest
Inês Narciso (@IWN_LX) – Ines worked in the Portuguese Intelligence Service for 12 years. She started up doing OSINT in 2008 and later became an OSINT and online undercover operations project manager. In 2019, she joined Iscte Iul a Lisbon University where she teaches Digital Methods and conducts research on disinformation. Since then, she’s also built a company that uses OSINT to find people’s ancestors and build family trees. In her spare time, she also helps pro bono fellow journalists in Portugal and abroad in their investigations and women who have been a victim of revenge porn or intimate image abuse.
People in this Episode
- Micah Hoffman (@webbreacher)
- Nico (@DutchOSINTGuy)
- Matthias Wilson (@mwosint)
- Nixintel
- Lorand Bodo
- Sector035
- Ritu Gill (@OSINTTechniques)
Links to what we discussed
- Protecting personal privacy against unauthorized deep learning models: https://sandlab.cs.uchicago.edu/fawkes/
- Search for videos across 60 platforms: https://www.peteyvid.com/
- Estimate the size of a crowd with this tool: https://www.mapchecking.com/
- Twitter thread about the video conferencing platform Zoom: https://twitter.com/securitytrails/status/1284187387103457282
- Great verification case study in French: https://ledesk.ma/desintox/le-bonimenteur-de-habanos-sa-encore-frappe-il-sest-paye-un-panama-paper/
- Twitter search tricks: https://www.labnol.org/internet/twitter-search-tricks/13693/
- Improved face detection software that even works on animals: https://www.omgubuntu.co.uk/2020/07/digikams-improved-face-detection-for-photos-even-works-on-animals
- Blog that has started dropping “0Days” with regards to the TOR project: https://www.hackerfactor.com/blog/index.php?/archives/888-Tor-0day-Stopping-Tor-Connections.html
- New Telegram update: https://telegram.org/blog/profile-videos-people-nearby-and-more
- Upcoming virtual OSINT Symposium between 10 and 13 October: https://www.osintsymposium.com/event-details/australian-osint-symposium-1
Self Promotion
- Learn more about Ines’s work: https://medialab.iscte-iul.pt/ (in Portuguese with some English articles)
- The Open Source Intelligence Skills-building Conference (October 2020): https://www.osmosiscon.com/
- German Open Source Intelligence Conference (GOCON): https://www.gosintcon.de/ – if you have any questions, reach out to Matthias (@mwosint)
Episode 40: Geolocating IPs and mobile phones, PimEye, 3D reconstruction of facial images and more...
People in this Episode
- Micah Hoffman (@webbreacher)
- Matthias Wilson (@mwosint)
- Nixintel
- Technisette
- Baywolf88
Links to what we discussed
- https://www.instagram.com/hushpuppi/?hl=en Big phishing criminal Hushpuppi arrested in Dubai. His Instagram account was well-known for flaunting his wealth. Allowed investigators to track his movements and identify his financial assets.
- https://pimeyes.com/en/ Matches facial images from across the web
- https://keyfindings.blog/2020/07/01/saving-images-from-google-maps-and-street-view/ Getting photo sphere images from Google Maps using developer tools
- https://nixintel.info/osint/geolocating-mobile-phones-with-an-ip/ Gives insight on the locations of IP adresses
- https://twitter.com/SebMeineck/status/1281577528164003841 PimEye reaction to a recent article (https://netzpolitik.org/2020/pimeyes-face-search-company-is-abolishing-our-anonymity/), now you can’t upload a pic anymore. You can only allow PimEye access to your camera
- https://pskreporter.info/pskmap Shows ham radio operators (with call sign and location) worldwide. Might be useful is ever working on a case involving ham radios
- https://twitter.com/LorandBodo/status/1281606517825974273 This website allows users to create a 3d reconstruction from a single image. super useful for osint investigations.
- https://medium.com/@CassiusXIII Guide to corporate OSINT recon
- https://keyfindings.blog/2020/07/12/how-to-geolocate-mobile-phones-or-not/ Follow-up on the IP geolocation article
- https://medium.com/analytics-vidhya/who-where-whomwith-wwww-a-facial-recognition-tool-for-image-based-data-gathering-and-graph-dd8f2b13c279
- https://www.reddit.com/r/videos/comments/fxgi06/not_new_news_but_tbh_if_you_have_tiktiok_just_get/fmuko1m/?context=1 TikTok mobile app security issues and how they may impact your investigations.
Self Promotion
- Micah Hoffman, Nico Dekens & John TerBush: SANS SEC487 Open-Source Intelligence (OSINT) Gathering & Analysis. Several options for Live Online & In Person
Episode 39: Ibexmind with Peter King, Twitter history, aircraft and drone monitoring, TraceLabs OSINT Virtual Machine and more...
People in this Episode
- Micah Hoffman (@webbreacher)
- Nico Dekens (@dutch_osintguy)
- Rae Baker (@wondersmith_rae)
- Nixintel
- Ginsberg5150
- Special Guest: Peter King (@ibexmind) additional info: https://ibexmind.com/
Links to what we discussed
- https://spoonbill.io/ Shows historic profile and pinned tweet changes for Twitter accounts.
- https://radar.freedar.uk/VirtualRadar/desktop.html Aircraft monitoring site but includes military/drones too.
- https://www.inquirer.com/news/philly-protests-arrests-fbi-lore-elisabeth-blumenthal-george-floyd-20200617.html Good OSINT case study, using social media to ID suspect
- https://citizenevidence.org/2020/06/26/investigating-infrastructure-links-with-passive-dns-and-whois-data/ Explains how to use OSINT to investigate a website, very beginner friendly
- https://www.tracelabs.org/trace-labs-osint-vm/ Trace Labs OSINT VM
- https://www.sans.org/webcasts/tech-tuesday-workshop-introduction-osint-video-image-verification-115875/ Nico’s free SANS image verification workshop
- https://www.youtube.com/channel/UCynWOUeHAOflEQtJnrZpkNA/videos Layer8 OSINT and Social Engineering conference videos are posted
- https://www.youtube.com/watch?v=-Psyw3ADNvo&feature=youtu.be Sector035’s Google Dorking 10 minute tip
- https://www.osintcombine.com/post/download-social-media-videos-without-tools OSINTCombine’s blog post on using the web developer tools in web browsers to download videos on several social media platforms
- https://twitter.com/TraceLabs/status/1273950482214641665 Trace Labs has renamed their Missing CTF to OSINT Search Party CTF and is doing monthly global events!
- https://www.npr.org/sections/health-shots/2017/04/09/523011446/how-playing-tetris-tames-the-trauma-of-a-car-crash?t=1593371114814 How Playing Tetris helps Tame Trauma
Self Promotion
- Micah Hoffman, Nico Dekens & John TerBush: SANS SEC487 Open-Source Intelligence (OSINT) Gathering & Analysis. Several options for Live Online & In Person
- Several Online workshops at dutchosintguy.com
Ep 35: (Originally aired May 3) Guest Aliaume Leroy, a new Verification Handbook released, using birds to help geolocate and more....!
People in this Episode
- Micah Hoffman
- Dutch_OsintGuy
- Nico Technisette
- Matthias Wilson (MWOsint)
- Special Guest: Aliaume Leroy (@Yaolri) more info on: https://www.bbc.co.uk/search?q=aliaume+leroy
Links to what we discussed
- https://www.aliseeks.com/search Good resource for recon when conducting IP infringement related work on seller that are active on AlieExpress
- https://twitter.com/datajournalism/status/1255106297592254465 The new verification handbook got released this week, lots of useful osint tips, tricks and case studies by industry experts
- https://twitter.com/BenDoBrown/status/1255547411201691651 Thread By Benjamin Strick about an ongoing campaign of Chines and Russian named Bots that are attacking a Chinese Businessman who has been critical of China’s response of Covid19
- https://twitter.com/dutch_osintguy/status/1256163055215489026?s=20 How birds and where they live can help during osint investigations
- https://twitter.com/ShadowDragonIO/status/1256324472115564544 Nice webcast/podcast with some good insights in intelligence gathering, osint and the usage of online persona’s
- https://twitter.com/baywolf88/status/1252630129085480966 A nice site to send reverse image searches to multiple sites and links to several other image related tools
- https://medium.com/@lorenzoromani/facial-recognition-with-python-and-elasticsearch-quick-tutorial-85cd02fe903d Setting up your own facial recognition using Python and Elasticsearch
- https://www.osintessentials.com/starter-tool Simple tool to give tips on how to start off with OSINT investigations. Similar to Micah’s YOGA, just more basic
- https://keyfindings.blog/2020/05/03/using-the-wipo-ip-portal-for-osint/ Company research and reverse image searching using the WIPO IP Portal, there’s lots of data to be found in the patent, (trade-)mark and design databases on this portal
- https://digitalforensicstips.com/2020/04/nation-state-quality-osint-on-a-taco-bell-budget-part-1/ Matt Edmondson’s OSINT blog post on using Amazon Web Services (AWS) for OSINT
- This site also helps to identify type of birds in a picture: https://merlin.allaboutbirds.org/photo-id/ (thnx to 89Kenny)
Self Promotion
- Dutch_Osintguy : July 9, 2020 Workshop advanced searching and monitoring with Google for professionals
- Micah Hofmann & Dutch_Osintguy Nico: Several options to follow the SANS SEC487 Open-Source Intelligence (OSINT) Gathering and Analysis now with GOSI CERT !
Ep 34: (Originally aired 19 April) Interview with the famous Arno Reuser, using UntappdScraper for checkin location data, and more
People in this Episode
- Micah Hoffman
- Nico (Dutch_OsintGuy)
- Matthias Wilson (MWOsint)
- Nixintel
- Kirby Plessas (kirbstr)
- Sector035
- John TerBush (thegumshoo)
- Special Guest : Arno Reuser (@ArnoReuser) more info on ArnoReuser.com & http://bibliography.opensourceintelligence.biz/
Links to what we discussed
- https://intelx.io The site hosts breach data that are easily searchable (for free)! We spoke about this in regards to its scraping of Pastebin pastes. If you have a paid account, you can access them.
- https://untappd.osint.ninja This page is the webification of the UntappdScraper script Micah made. Makes it easy to analyze user-reported drinking behavior.
- https://twitter.com/MwOsint/status/1249416474600628226 Another source for company research is import/export data. Find out who does business with a company and which means of transportation they use. The tweet depicts one example for such a (paid) database, in some countries this data is freely accessible
- https://groundwork.azavea.com/ Annotation tool designed for geospatial data, useful for osint geo related research
- https://medium.com/@Dutchosintguy/start-caring-stop-sharing-9c108d957b2c Blog by Dutch_Osintguy about the human factor in cyber and how easy it can be for bad actors to gain access to certain video calling session by using basic osint techniques
- https://github.com/mattnotmax/cyberchef-recipes Great Cyberchef recipes which can be used for OSINT and cyber
- https://twitter.com/olihough86/status/1250514824255221762 Pastebin has disabled its search function, even for Pro customers. This is bad news for OSINT because Pastebin was such a valuable resource, especially for threat intel.
- https://techcrunch.com/2020/04/16/clearview-source-code-lapse/ This is more privacy than OSINT but the Clearview AI application source code and other files were found in a public location.
Self Promotion
- https://www.eventbrite.com/e/1-day-osint-skills-101-training-by-osint-curious-registration-92599869703 OSINT Curious 1 day OSINT 101 course!
- Kirby is teaching online OSINT classes. Visit https://academy.plessas.net for more details.
- Micah and Dutch_Osintguy will be doing OSINT SEC487 SANS Live Online trainings in the coming months. Visit https://www.sans.org/find-training/search?types=10&coursecode=SEC487&msc=course-page for details.
Ep. 36: Interview with Jane Lytvynenko on disinfo, the "OSINT State of Mind", cropping images and facial recognition reverse searching and more!
Originally aired May 17, 20202
People in this Episode
- Micah Hoffman
- Nixintel
- John TerBush
- Rae Baker
- Lorand Bodo
- Chris Kubecka
- Nico Dekens
- Special Guest: Jane Lytvynenko (@JaneLytv) more info on: https://www.buzzfeednews.com/article/janelytvynenko
Links to what we discussed
- https://twitter.com/SANSInstitute/status/1260219450449633281 webinar SANS @MIC with Dutch_Osintguy talking about the “OSINT State of Mind”
- https://twitter.com/msfrpy/status/1258467675065499650 Great tip by Musafir.py showing the importance of cropping sections of pictures to figure out a location using reverse image search
- https://twitter.com/ding0snax/status/1260648866551967744 Great resource with lots of search engines and other recourses for OSINT
- https://twitter.com/lorenzoromani/status/1260513489392721923 New blog post by Lorenzo Romani related to facial recognition on social media. Follow up of a previous post from Lorenzo
- https://twitter.com/dutch_osintguy/status/1261227044899348480 How to bring back search name by face in Google reverse image search
- https://twitter.com/osintcombine/status/1260479927893319680 New awesome free tool from OSINT Combine (Chris Poulter). Rapid data visualization from local CSV files
- https://twitter.com/LorandBodo/status/1260537315291795463?s=19 How to detect bot networks on Twitter – case study by Lorand
- https://twitter.com/DanielGallagher/status/1258620989275070464 Create 3D models from images
- https://twitter.com/ZusorOW/status/1258885451055800320?s=19 Open source softwares’ reliance on various other open source software. The end of GoodTwitter is the end for twint
- https://datajournalism.com/read/handbook/verification-3 The new OSINT / Datajournalism verification handbook
Self Promotion
- Dutch_Osintguy : July 9, 2020 Workshop advanced searching and monitoring with Google for professionals
- Micah Hofmann, Dutch_Osintguy Nico & John Terbush: Several options to follow the SANS SEC487 Open-Source Intelligence (OSINT) Gathering and Analysis now with GOSI CERT !
- John TerBush Recorded Future podcast https://www.recordedfuture.com/insikt-weekly-podcast/
Episode 33: We speak with guest Jan Tegze from sourcing.games, analytic thinking, beyond EXIF in photos, and more...
- Nico (Dutch_Osintguy)
- Matthias Wilson (MWOsint)
- Nixintel
- Lorand Bodo (Lorandbodo)
- Rae Baker (wondersmith_rae)
- Technisette
- Special Guest : Jan Tegze (@jantegze) more info on sourcing.games
- Training yourself how to be an analytical thinker https://medium.com/@raebaker/training-yourself-to-be-an-analytical-thinker-476bdb7e7c99
- Related to having an Analytical mind this shows analytical techniques in action through real cases https://study.sagepub.com/system/files/beebepherson2e_im_0.pdf
- Shows how EXIF data works, but also encourages people to keep digging into images even when EXIF data has been removed because it can still contain material of interest https://nixintel.info/osint/the-secret-life-of-jpegs/
- 3 useful links for getting familiar with using api’s and python https://twitter.com/unknownuser1806/status/1244632977746718720?s=21
- Alternative to Python? https://julialang.org/
- Thread by Thomas from Pointer on fake news during covid (graphic images warning) https://twitter.com/Thms_Pointer/status/1245701702092759042
- Great dashboard from OSINTCombine with loads of information on COVID19 from multiple sources https://twitter.com/osintcombine/status/1244383237494824960
- Nice quiz on OPSEC, more OSINT related quizzes to come as well https://twitter.com/aware_online/status/1243087218270486529
- Great case in which lots of different OSINT techniques are used. Tracking illicit arms trading with GEOINT, reverse image searching, SOCMINT (Twitter and Facebook), corporate research and maritime OSINT https://openfacto.fr/mv-single-eagle-from-second-hand-cars-to-air-defense-systems/
- An OSINT/DFIR project on an OSINT tool with a surprising outcome https://keyfindings.blog/2020/03/23/be-careful-what-you-osint-with/
- How to land a job in OSINT https://osintcurio.us/2020/04/01/how-to-land-an-osint-job/
- Facebook tips and 10 minute tip video https://osintcurio.us/2020/04/02/facebook-tips/
- Micah and Dutch_Osintguy will be doing OSINT SEC487 Sans Cybercast trainings the coming months https://www.sans.org/course/open-source-intelligence-gathering
- Stay tuned for more OSINTcurious lunches/breaksfast/dinner https://twitter.com/osintcurious
Episode 32: Chris Poulter from OSINTCombine talks tools and debuts one during the webcast! Also: disinfo during the COVID-19 crisis and more...
People in this Episode:
- Micah Hoffman (WebBreacher)
- Nico (Dutch_Osintguy)
- Matthias Wilson (MWOsint)
- Nixintel
- Lorand Bodo (Lorandbodo)
- Rae Baker (wondersmith_rae)
- Kirby Plessas (kirbstr)
- Special guest: Chris Poulter (@osintcombine) and more info on https://www.osintcombine.com/
Links to what we discussed:
- OSINT Combine’s talk at the #sansosintsummit https://www.sans.org/cyber-security-summit/archives/file/summit-archive-1582052110.pdf
- Nixintel spots fake Twitter accounts blog https://nixintel.info/osint/signs-youre-following-a-fake-twitter-account/
- DeepL is a topnotch translation tool, which is now offering support for Chinese and Japanese https://twitter.com/DeepLcom/status/1240548128731914240
- Thread about group or video chat invites. Want to address this because during covid19 quarantaine we will see a lot of these links posted openly. This might pose a threat for businesses. https://twitter.com/noneprivacy/status/1238779890461270017?s=21
- OPSEC during Covid19 is important when sharing your home offices or desktops while working from home. https://twitter.com/dutch_osintguy/status/1241286386344439808?s=20
- Corporate Reconnaissance and OSINT blog by Rae Baker https://osintcurio.us/2020/03/17/corporate-reconnaissance/
- TraceLabs Missing CTF https://www.eventbrite.ca/e/trace-labs-global-missing-ctf-iv-an-osint-ctf-for-missing-persons-tickets-99910394680
- Username enumeration tool WhatsMyName got a cool web frontend thanks to, none other than Chris Poulter (OSINTCombine) – https://whatsmyname.app
- Lorand showed some websites that you can use to tackle and fact check dis-information
- https://www.reuters.com/manipulatedmedia
- https://firstdraftnews.org/latest/fake-news-complicated/
- http://verificationhandbook.com/
- https://disinfo.quaidorsay.fr/encyclopedia
- https://toolbox.google.com/factcheck/explorer
Self promotion:
- Micah’s SEC487 course has moved to CyberCast format. 6 full days of online OSINT learning streaming to you via GoToTraining. Classes https://www.sans.org/course/open-source-intelligence-gathering#type-cybercast
- Rae speaking at layer8 about Martine OSINT
- Kirby has webinars almost every Thursday at https://academy.plessas.net and has moved all custom training seminars online. Also check out our curated and commentated subscription news feed
- Interested in fighting mis and disinformation around COVID19? Then join the Slack channel. DM Lorand on Twitter for more info
Episode 31: Jeff Lomas of BleuBloodHound, MWOsint demos the MSFT video indexer and more...
People in this Episode:
- Micah Hoffman (WebBreacher)
- Dutch_Osintguy
- Matthias Wilson (MwOsint)
- Nixintel
- Sector035
- Special Guest: Jeff Lomas (@BleuBloodHound)
Links to what we discussed:
- Jeff Lomas talked about his blog on cell tower info, DFIR and OSINT https://osintcurio.us/2019/08/19/making-sense-of-osint-cell-tower-data-for-dfir/
- People being monitored by the geotagged social media trough Echosec https://twitter.com/KarlSwannie/status/1233092121822978048
- An semi automated website for lookups on a domain, ip or email. Covers dns, location, whois and more. Opsec! don’t know if requests are tracked https://synapsint.com/
- OSINT CTF that gives people a chance to practice their skills. It covers a wide range of areas like government databases, social media, archived websites as well as some basic digital forensic and cyber security knowledge. https://ctf.cybersoc.wales/
- Vis graphing tool for win, linux and osx in beta. Sort of Maltego alternative made with help of occrp.vis.com https://docs.alephdata.org/guide/vis-desktop
- Guideline by US DoJ : Legal Considerations when Gathering Online Cyber Threat Intelligence and Purchasing Data from Illicit Sources https://www.justice.gov/criminal-ccips/page/file/1252341/download
- Useful to manually create charts in your OSINT investigations https://www.draw.io/
- Bram (Aware Online) has been on fire this week, posting lots of quick OSINT tips. Might be worth a shout-out https://twitter.com/aware_online
- Great detailed blog on how to build your own web scraper using Python https://hackernoon.com/how-to-build-a-web-scraper-with-python-step-by-step-guide-jxkp3yum
- TikTok OSINT thread https://twitter.com/summer__heidi/status/1234308465662627840
- The Cyber Intelligence Analyst Cookbook has some good information about CTI and OSINT process and analysis. https://github.com/open-source-rs/The-Cyber-Intelligence-Analyst-Cookbook/
- Scrapy: An open source and collaborative framework for extracting the data you need from websites. https://scrapy.org/
Skills Demo:
Matthias a.k.a MWOsint – https://keyfindings.blog/2020/03/08/using-the-microsoft-video-indexer-for-osint/ demo
Self Promotion:
- Dutch_OsintGuy added new events to his website for several trainings and workshops https://dutchosintguy.com/events-and-blogs/
- Dutch_Osintguy : Workshop understanding Google’s search results and advanced searching techniques workshop (Dutch language only) together with Aware Online. March 20th in Amsterdam. https://www.aware-online.com/workshop-google-voor-gevorderden/
- Micah (WebBreacher) has multiple SANS SEC487 live classes (https://sans.org/sec487) coming up in the coming months and is looking forward to the GIAC GOSI OSINT certification (https://giac.org/gosi) moving into beta testing in April.
Episode 30, A brief chat about WhatsApp, a new OSINT-dedicated Linux build and more..
- Ginsberg5150
- Nixintel
- Sector035
- WhatsApp invite debacle: https://twitter.com/JordanWildon/status/1230829082662842369
- Nixintel his short blogpost about it: https://nixintel.info/osint/whatsapp-dorks-and-tricks/
- Open source maps and satellite imagery used to verify claims about Chinese human rights abuses https://twitter.com/bayer_julia/status/1229441850781642754
- A Pastebin bot on Twitter: https://twitter.com/leak_scavenger (by https://twitter.com/rnd_infosec_guy)
- SN Radar http://snradar.azurewebsites.net – geolocation tool for VK posts.
- OSINT Summit 2020 – https://www.sans.org/event/osint-summit-2020
- New Buscador-style OSINT dedicated Linux build called CSI Linux: https://csilinux.com/features.html
- Sigint through satellites interference http://www.osinteditor.com/resources/sentinel-1-c-sar-interference-analysis-intro/
- Citizens find the attackers of the Jawaharlal Nehru University attack: https://medium.com/dfrlab/citizen-sleuths-in-india-unmask-perpetrators-behind-jnu-attack-2a053f0b7556
Episode 29: Interview with OSINTTechniques, Google dorking SSIDs, a look at the Kobe Bryant helicopter crash using OSINT and more
People in this Episode
- Micah Hoffman
- Dutch_Osintguy
- Sector035
- And our special guest: Ritu Gill aka OsintTechniques
Links to what we discussed
- Tweet by Gonzo about searching SSID’s with a Google dork https://twitter.com/gonzos_int/status/1222541952413065216?s=11
- Another good name check lookup website https://twitter.com/dutch_osintguy/status/1223688324034060292
- Good read about deanonymizing TOR circuits https://twitter.com/x0rzkov/status/1224380928094613505
- Guest OSINT Curious blog by Jeff Lomas https://twitter.com/BleuBloodHound : https://osintcurio.us/2020/01/31/combing-through-video-faster-using-dfir-and-osint-skills/
- 50 cognitive biases in the modern world https://twitter.com/i_intelligence/status/1224230855213830145
- OSINT explanation of Kobe Bryant’s catastrophic helicopter crash https://www.youtube.com/watch?v=XSHpbGhy3Ko&feature=youtu.be
- How to find the most recent satellite imagery on earth https://twitter.com/mouthofmorrison/status/1212840820019208192
- Trace Labs Global CTF 3
- Google Geolocation API now includes Wi-Fi and Cell data https://developers.google.com/maps/documentation/geolocation/intro
- Tweet by Serge Courier: Scrape Google Maps (a tool and a browser extension to scrape results from a Google maps search – original blog post from Boolean Strings) https://twitter.com/secou/status/1225855494750818304?s=21
- 10 minute OSINT Curious tip “Viewing LinkedIn Profiles Anonymously” https://youtu.be/bIAdx3CAjtM
- Identifying and tackling manipulated media – a free online course offered by Reuters https://twitter.com/LorandBodo/status/1225415356409372672
- OSINTCombine have put together an importable bookmark stack https://twitter.com/osintcombine/status/1225181330595430400
- Ginger_T Article https://medium.com/@Ginger_T/my-journey-into-the-world-of-osint-is-now-just-over-one-year-old-ea6f6d90eda
Self Promotion
- SANS OSINT Summit – February 18th, next week! https://www.sans.org/event/osint-summit-2020/summit-agenda
- Dutch_OsintGuy Nico doing two OSINT workshops on March 20th and May 18th Google Advanced Searching and Monitoring (in Dutch) https://www.aware-online.com/workshop-google-voor-gevorderden/
- https://twitter.com/aware_online/status/1226504473310351360 Dutch_Osintguy Nico teaching in Amsterdam 21-22-23 OSINT module 1 in English
Episode 28: Bitcoin with Bellingcat's Brenna Smith, Finding who is running Wordpress even behind Cloudflare, and more
People in this Episode:
- Ginsberg5150
- Dutch_Osintguy
- Sector035
- Kirby Plessas
- And our special guest: Brenna Smith
Links to what we discussed:
- Archive of Brenna’s CryptOSINT newsletters can be found here https://us14.campaign-archive.com/home/?u=c435f53a5568f7951404c8a38&id=7f8ca9c380
- Our own technisette had a beautiful and healthy baby! Congratulations! https://twitter.com/technisette/status/1219631571851980801
- Introduction to OSINT (video) Micah was very lucky to meet and get to work with the talented Ritu Gill, (@OSINTTechniques). At the recent Trace Labs (@TraceLabs) and SANS (@SANSDefense) Missing Persons CTF in Washington DC, they both noticed that many people wanted to participate but had no idea how to get started. After a few discussions, they decided to make an Introduction to OSINT video. https://osintcurio.us/2020/01/16/introduction-to-osint-video/
- Lorand Bodo tweeted about a paper that describes a content manipulation (chameleon) attack https://twitter.com/LorandBodo/status/1220359046374600704 with a demo of the attack on Facebook.
- Blog by DJ Nemec about using pingbacks to umask a real IP address of a WordPress website that is behind Cloudflare https://t.co/DZY2yOiIRi?amp=1
- nixintel wrote a blog about using OSINT techniques to find out who is behind a WordPress site https://nixintel.info/osint/osint-techniques-whos-behind-a-wordpress-site/
- New chrome extension that lets you see who posted a video on Twitter first (thread in french https://twitter.com/BriceLeBorgne/status/1217470986095861760) tool on github https://github.com/briceleborgne/OriginVideo (To install the extension, you can download the file I put on Github. Unzip everything in a local folder. Activate developer mode on the Chrome “Extensions” page. Click on “Load the unpackaged extension”, select the folder, en load)
- “What is OSINT?” thread on Twitter https://twitter.com/WebBreacher/status/1219606025680101380
- TraceLabs Global Missing Persons CTF III – https://www.tracelabs.org/2020/01/trace-labs-global-ctf-iii-an-osint-ctf-for-missing-persons/
- New SpiderFoot release https://twitter.com/spiderfoot/status/1221427688109375488
Self Promotion
- Nico, Kirby, Micah, and others at SANS osint summit FEB 18th https://www.sans.org/event/osint-summit-2020
- Nico joined the recorded future podcast, talked about osint and threat intelligence. You can listen to it here https://www.recordedfuture.com/podcast-episode-142/
Episode 27 - OSINT Curious is a year old! And we have Vortimo's Roelof Temmingh!
Webcast 20200112 – #27
People in this Episode- Dutch_Osintguy
- Ginsberg5150
- Micah Hoffman
- Sector035
- And our special guest: Roelof Temmingh (VortimoTech)
- Aware online blogs: Searching Telegram via location – https://www.aware-online.com/en/search-for-telegram-groups-based-on-location/ and creating your own flowcharts – https://www.aware-online.com/en/create-your-own-osint-flowcharts/
- Micah’s OSINT MindMap – https://webbreacher.com/2018/07/12/osint-map/
- OSINT : Using Certificate Transparency lists. https://twitter.com/catalyst256/status/1214590663037198336
- Shodan filter reference: https://beta.shodan.io/search/filters
- Facial recognition by Yandex (vai Nelson Minar): https://nelsonslog.wordpress.com/2020/01/07/facial-recognition-for-the-public-yandex/
- Are you wondering what Emergency Action Messages (EAM) over the US Military High Frequency Global Communications System (HF-GCS) are? Find out all you need to know at this blog from @MilcomMP – https://mt-milcom.blogspot.com/p/what-is-emergency-action-message-or-eam.html
- https://www.bellingcat.com/news/mena/2020/01/09/video-apparently-showing-flight-ps572-missile-strike-geolocated-to-iranian-suburb/
- Osint quiz by sector – https://twitter.com/Sector035/status/1211038518635614208
- The ‘Hindsight Files’ – https://twitter.com/HindsightFiles
- From Kevin at National Child Protection Task Force Conference – “This is my conference that provides a bigger mix of OSINT with other legal methods. https://web.cvent.com/event/5b3168db-a94e-42f6-b1fa-ee35e90a6770/summary
- Kirby has a class in St Augustine Jan 21-22 – https://plessas.net/events
- Kirby will have her NDCAC law-enforcement only classes listed there soon as well.
- OSINT Summit this February https://www.sans.org/event/osint-summit-2020/summit-agenda – Use code OSINTPOD20 for special deal of $175 Summit tickets
- Webcast byDutch_Osintguy on operations security (OpSec) tradecraft and tips for online Open Source Intelligence (OSINT) Research – https://www.sans.org/webcasts/112735
- SecKC Tuesday 14th for workshops – https://seckc.org/#news-section