Making the Most of the Onboard Pt. 2

My previous post about my thoughts on the onboarding process dived a bit into some of the blockers I feel are worth addressing

Smartphone

独家优惠奖金 100% 高达 1 BTC + 180 免费旋转




TOP 15 OPEN SOURCE INTELLIGENCE TOOLS USED IN CYBER SECURITY

This time I have brought you with a piece of proper information about the tools used by security hackers for gathering information from the openly available free data.

This is one of the best frameworks which provides a proper amount of free available data and information about the required organizations or particular target. The tools OSINT Framework provides this information all free of charge. Moreover, many of the tools provided by this framework is useful for generating the search results given by google search in advanced manner. This is managed by Justin Nordin and also has a page in github.

Most of the times information required is about the social media, also it is obvious that people share the details more on their social media. This is a great tool used for such items or such type of information gathering. It is powered by knowem? group or you can say Barrywise.

You might have heard about data breaches across the globe, but aren’t you anytime worried about your privacy and security? Didn’t you get thought that you might have got your information leaked along with other? Answer to these questions is haveibeenpwned website. It allows you to search your digital belongings are leaked or not and if leaked where it was leaked and from where it was leaked.

Certain times you are obligated to find the information which is based on the criminal activities of an individual. This can be done using beenverified infrastructure or tool which is free and easily accessible by common person. It majorly provides the consumer initiated criminal background and people services. Not only this but it also has a mobile application for performing the task.

This program continuously manages your social data using internet assets. This is performed by monitoring those assets and further using them to store into inventory. Moreover, this stored data is used to identify whether they are under security risk or not. It was built by group of five members Zakir Durumeric, Alex Halderman, David Adrian, Dave Corcoran, Brian Kelly.

Now let’s talk about the business-related information gathering and we here are talking mainly about analysis related data. This tool can be used for lead generation, website profiler, competitive analysis, as well as business analysis or business intelligence tool. It is also possible using this tool as an extension in Chrome.

Many times, you have noticed that google uses your data in immense manner and does not work without accepting all of the permissions. So, backing on them would be possible by using some of the flaws in their computing. So, this website or say GHDb (Google Hacking Database) gives you daily updated vulnerabilities in google found out by people across the globe.

It is one of my favorites as well as mostly used tool. It provides most of the information in a accurate format in the form of flowchart or diagram manner, we can also gather information according to our preferences and most importantly according to or adjustments in the filed data.

One of the best python-based information gathering tool. It is a Web Reconnaissance tool which includes lots of modules, database interaction, convenient functions, auto command completion, etc. It gathers more number of open source available information easily and free of charge.

Another best and simple to use tool which can lead to loads of information about the organization as well as network driven communities. Moreover we can find information that is incidental to the network which are internally structured. Mainly this is used by the penetration tester or for the similar types of exercises.

You might notice that in our day to day life we are surrounded by the devices which are using the IoT (Internet of Things) as major technology. Not only this but many other types of devices using internet as it’s major source of working. So, Shodan is one of the tool which provides proper information of those types of devices which are not easy to search. It includes cameras, building sensors, security devices, gaming communities streaming lines, databases, etc. Shodan is most powerful tool which is used widely for searching the open source cameras or live feedback of videos.

You may have noticed that all the other OSINT tools work on the basis of gathered information in such a way that it doesn’t check backwards or recursively for each and every information. But SpiderFoot is a tool which performs such task so that no data is remained unsearched or unturened.

Sometimes we require to have information of location or specifically geolocation-based data of the sources. Here comes the use of this tool which gives the ability to get these information and search filter-based information on the map. Creepy is provided by ilektrojohn.

An advance information gathering tool which is based on the packet searching and packet sniffing. It searches for computer networks by sending the packets and analyzing the response came from them. It gives the features like host discovery as well as operating system detection.

It is a search engine that allows the users to search for different devices, sites and services. It is developed by Chinese security company Knownsec Inc. It uses Xmap and Wmap to collect information from the core to collect data from open devices and for fingerprint analysis.

Add a comment

Related posts:

Best 3 Data Analytics Certifications Worth Considering

In the age of information, data has become the driving force behind every major decision, innovation, and competitive edge. As organizations seek to navigate the vast digital landscape and harness…

Ketika seorang budayawan dilihat seorang newbie sebagai copywriter legend Indonesia

Ilmu email marketing memang tanpa batas, karena dengan membangun kebiasaan menulis disetiap waktu akan merangsang jaringan otak dan mendorong ide yang tersumbat Sampai pada klimaksnya apapun adalah…

Productivity 101

Over the last month and a half I have fallen into a vicious cycle of ‘I’ll do that tomorrow, I deserve a break’. Which has resulted in me becoming incredibly unproductive. As someone who considers…