OSINT Tools vs. Methodology by Alex Lozano
Résumé
TLDRIn this session, Alex Lano discusses the essential aspects of OSINT tools and methodologies. He defines OSINT tools as software platforms used for gathering and analyzing open-source information, emphasizing their role in automating data collection and enhancing efficiency. Lano categorizes various OSINT tools and highlights their strengths, such as rapid data retrieval, while also addressing weaknesses like the potential for false positives. He introduces OSINT methodologies as structured processes that ensure ethical and accurate intelligence gathering, outlining the intelligence cycle and its importance in investigations. The session concludes with a call for critical thinking in using tools and the integration of methodologies to enhance OSINT investigations.
A retenir
- 🔍 OSINT tools automate data collection and enhance efficiency.
- 📊 Methodologies ensure systematic and ethical intelligence gathering.
- ⚖️ Critical thinking is essential for effective OSINT investigations.
- 🛠️ Tools can be categorized by purpose and use case.
- 📚 Resources for OSINT include articles, blogs, and books.
- 🌀 The intelligence cycle includes planning, data collection, and analysis.
- ⚠️ Tools have strengths and weaknesses that must be understood.
- 💡 Combining tools with methodologies improves investigation outcomes.
- 🌐 Advanced platforms integrate multiple OSINT tools for better analysis.
- 📈 Continuous learning and adaptation are key in the OSINT field.
Chronologie
- 00:00:00 - 00:05:00
The speaker expresses gratitude to the audience and the organizing team of the conference, introducing the session on OSINT tools and methodologies. They outline the session's structure, which includes definitions, purposes, strengths, weaknesses, and classifications of OSINT tools and methodologies, along with resources for investigations.
- 00:05:00 - 00:10:00
The speaker defines OSINT tools as software platforms or techniques for gathering and analyzing open-source information, emphasizing their goal of automating data collection and improving analysis. They mention various tools and their use cases, highlighting the importance of reliability and accuracy in data collection.
- 00:10:00 - 00:15:00
The strengths of OSINT tools include rapid data retrieval and automated analysis, while weaknesses involve the potential for false positives and the need for user expertise. The speaker contrasts this with OSINT methodologies, which ensure ethical compliance and structured workflows but can be time-consuming and require manual verification.
- 00:15:00 - 00:20:00
The speaker categorizes OSINT tools based on their purposes, such as search and information gathering, social media intelligence, and dark web tools. They emphasize the importance of understanding the different categories to effectively utilize the tools in investigations.
- 00:20:00 - 00:25:00
The speaker discusses the difference between individual OSINT tools and advanced platforms, noting that tools are designed for specific tasks while advanced platforms integrate multiple tools for automation and collaboration. They highlight the benefits of using advanced platforms for data collection and analysis.
- 00:25:00 - 00:30:00
The speaker shares collections of OSINT tools and resources, emphasizing the importance of having access to a variety of tools organized by categories. They provide examples of popular collections and frameworks that can aid investigators in their work.
- 00:30:00 - 00:35:00
The speaker introduces OSINT methodologies, focusing on the intelligence cycle, which includes planning, data collection, processing, analysis, and dissemination. They stress the importance of following this cycle to ensure thorough and effective investigations.
- 00:35:00 - 00:43:43
The speaker concludes by reiterating the importance of both OSINT tools and methodologies, emphasizing that critical thinking and proper methodology are essential for effective investigations. They encourage the audience to think deeply about their investigative needs and the tools they choose to use.
Carte mentale
Vidéo Q&R
What are OSINT tools?
OSINT tools are software platforms or techniques used to gather and analyze open-source information.
What is the purpose of OSINT methodologies?
OSINT methodologies ensure systematic, ethical, and accurate intelligence gathering.
What are some examples of OSINT tools?
Examples include Google Dorking, Maltego, and various social media intelligence platforms.
What is the intelligence cycle?
The intelligence cycle includes planning, data collection, processing, analysis, dissemination, and feedback.
What are the strengths of OSINT tools?
Strengths include rapid data retrieval, automated analysis, and expanded data sources.
What are the weaknesses of OSINT methodologies?
Weaknesses can include being time-consuming and requiring manual verification.
How can I improve my OSINT investigations?
By combining tools with structured methodologies and practicing critical thinking.
What is the importance of critical thinking in OSINT?
Critical thinking helps determine the relevance and application of the information gathered.
What resources can I use for OSINT methodologies?
Resources include articles, blogs, books, and online communities focused on OSINT.
How can I categorize OSINT tools?
OSINT tools can be categorized by purpose, such as information gathering, social media intelligence, and data analysis.
Voir plus de résumés vidéo
New AMD and Intel GPUs were revealed!
The End of Forsaken?...
Food for thought: How your belly controls your brain | Ruairi Robertson | TEDxFulbrightSantaMonica
Self-Building AI Just Shocked Experts: The Future of Automation Is Here!
7 (Harsh, but true) reasons New Zealand might NOT be for You
Why living in New Zealand has become Impossible
- 00:00:01[Music]
- 00:00:08Um hello to everyone. Uh thanks for for
- 00:00:12being here for watching my session. Uh
- 00:00:16also I would like to thank first of all
- 00:00:19uh the team of oin ambition. I would
- 00:00:21like to to to thank
- 00:00:24uh
- 00:00:25dafush all of them. They are doing an
- 00:00:28amazing job with hosting ambition
- 00:00:30organizing this conference and with
- 00:00:32everything they do for the hosting
- 00:00:34community uh newsletter a lot of tips a
- 00:00:38lot of LinkedIn activity uh they
- 00:00:40basically leverage all all of the social
- 00:00:42media sources they can and share a lot
- 00:00:45of things uh uh so so I would like to
- 00:00:48thank them and and well today in my
- 00:00:50session uh hosting tools and
- 00:00:53methodologies the eternal dilemma I will
- 00:00:55talk about uh these two parts of OSIN uh
- 00:00:59two essential parts. Uh first I will
- 00:01:03give a definition uh purpose reliability
- 00:01:05use cases about about each one of them.
- 00:01:08Uh then we will cover strengths and and
- 00:01:11weaknesses uh why are they important?
- 00:01:14What are the strengths and weaknesses of
- 00:01:16each? We will explore simos in tools,
- 00:01:18categories, advanced platforms,
- 00:01:20collections and resources. will try to
- 00:01:23uh classify these tools and and give um
- 00:01:28useful resources for you to to use then
- 00:01:31on your uh ocean investigations. Then we
- 00:01:34will explore oin methodologies. Also
- 00:01:37we'll talk about categories. We'll talk
- 00:01:38about resources, workflows, books,
- 00:01:41techs. And finally we'll give a final uh
- 00:01:46verdict. Um so I I suppose everyone is
- 00:01:49hearing me. I see some some comments in
- 00:01:52the chat but uh I think we're good. Of
- 00:01:55course. Let me present a little bit
- 00:01:57about myself. Let me talk a little bit
- 00:01:59about myself. I'm Alex Lano. I'm the CEO
- 00:02:01of CyberG, an intelligence company based
- 00:02:04in Barcelona. I'm also a private
- 00:02:06investigator and and I like to share
- 00:02:09some tips, uh, cheats, uh, staff
- 00:02:12resources on LinkedIn. So, uh, pretty
- 00:02:15much that's all all information you can
- 00:02:17find about me is on LinkedIn. I also I'm
- 00:02:20a nursing professor at the University
- 00:02:23uh, of Barcelona. So, that's the basic
- 00:02:26information about me. Let's start with
- 00:02:28the presentation and with the the value
- 00:02:30I want to give you
- 00:02:32today. So OSIN tools what are OSIN
- 00:02:35tools? Osin tools are software platforms
- 00:02:39or techniques used to gather and analyze
- 00:02:41opensource information. What's the goal
- 00:02:44of these uh osin tools? To automate data
- 00:02:47collection, enhance efficiency and
- 00:02:49improve analysis. Are they reliable?
- 00:02:52Yes, they they give us data accuracy.
- 00:02:56Some of them we'll talk about this later
- 00:02:58and and depending on the tools
- 00:03:01effectiveness and source credibility
- 00:03:03we'll we'll get more accurate uh better
- 00:03:06accurate data or less accurate data uh
- 00:03:09use cases. Why do we need closing tools
- 00:03:12gathering large scale data automating
- 00:03:15our researches and data collection and
- 00:03:17also to visualize connections and and to
- 00:03:20pivot between uh different types of data
- 00:03:24sources. On my right hand I have
- 00:03:26different tools. Probably you know all
- 00:03:28of them. We have Prime an advanced
- 00:03:30platform by social links. We have
- 00:03:32Montiggo another advanced platform.
- 00:03:34Google EPOS uh oin rocks face tech ID
- 00:03:38giant. So these are examples of of oin
- 00:03:41tools but we'll talk about uh and give
- 00:03:44more examples uh during my presentation.
- 00:03:47On the other hand we have OSIN
- 00:03:50methodologies. What are osin
- 00:03:52methodologies? These are structured
- 00:03:53processes and best practices for
- 00:03:55conducting oin investigations. The
- 00:03:58purpose is to ensure systematic ethical
- 00:04:01and accurate intelligence gathering.
- 00:04:04Reliability ensures intelligence is
- 00:04:06verified and contextualized proper
- 00:04:09properly. And then the use cases we have
- 00:04:11we can conduct structure investigations.
- 00:04:14Uh we can avoid errors and avoid also
- 00:04:18misinformation. Again on my right hand I
- 00:04:20have the intelligent cycle. is the basic
- 00:04:22cycle everyone should know uh when
- 00:04:25whenever they start uh in the oen space
- 00:04:27or in the intelligence space and
- 00:04:30direction data collection processing and
- 00:04:32exploitation analysis and production
- 00:04:34dissemination and feedback. This is the
- 00:04:36intelligence cycle uh a general cycle we
- 00:04:40should all follow whenever we're doing
- 00:04:41our investigations uh whenever we're uh
- 00:04:45collecting information and then turning
- 00:04:47turning that information into
- 00:04:48intelligence. We'll talk more about it
- 00:04:51later. So what are the strengths and
- 00:04:53weaknesses of each hosting tools?
- 00:04:56Strengths rapid data retrievaling tools
- 00:04:59are very important when whenever we talk
- 00:05:02about collecting data. Uh then closing
- 00:05:05methodologies become very important when
- 00:05:08we talk about um analyzing this these
- 00:05:12data and and extracting intelligent.
- 00:05:14It's not the same. That's a big mistake.
- 00:05:17It's not the same collecting data uh and
- 00:05:22turning this data into intelligence that
- 00:05:24can help us make uh informed decisions.
- 00:05:27So the strengths of tools are rapid data
- 00:05:29retrieval, automated analysis and
- 00:05:32expands data
- 00:05:34sources. However, they have some
- 00:05:36weaknesses also. They can generate false
- 00:05:38positives for misleading data. They
- 00:05:41require user experience to interpret
- 00:05:43correctly. Some of the tools and and
- 00:05:45that's another important thing to
- 00:05:47mention. Some of them are easy to use.
- 00:05:50They have a a easy user interface. Some
- 00:05:53others uh require expertise and and are
- 00:05:57not as easy. And then uh these tools can
- 00:06:00become obsolete with changing changing
- 00:06:03technologies. Not all the tools uh are
- 00:06:07developed or are maintained in the same
- 00:06:10way. Meaning that sometimes these tools
- 00:06:13uh will lose re reliability. Why?
- 00:06:15Because uh one day they will be uh
- 00:06:18online the the next day they won't they
- 00:06:20will they will be offline or outdated
- 00:06:22and then we won't be able to use them.
- 00:06:25On the other hand, oin methodologies
- 00:06:27strengths ensures ethical and legal
- 00:06:29compliance, ensures accuracy and
- 00:06:31credibility and provides structured
- 00:06:34intelligence workflows. It's important
- 00:06:37whenever we want to uh carry out
- 00:06:40investigations that we follow the same
- 00:06:42process, the same process and more if
- 00:06:44we're working uh as a team. Why? because
- 00:06:48uh we will we will need to to do this
- 00:06:51like our client or whoever is behind the
- 00:06:54investigation. We will need to have uh a
- 00:06:57warranty that what we're doing is the
- 00:06:59same uh and not just like in inventing
- 00:07:03or trying to
- 00:07:04uh make up uh the investigation uh while
- 00:07:08we are doing it. In some cases of course
- 00:07:10improvisation is correct but also we
- 00:07:13should follow a step of processes that
- 00:07:16we will talk about them later.
- 00:07:18Weaknesses can be time consuming and
- 00:07:20that's a big problem. Uh sometimes
- 00:07:23intelligence needs to be fast in some
- 00:07:25cases. We need we need the information
- 00:07:27and we need to make the decisions fast.
- 00:07:30So following a a structure methodology
- 00:07:33can be time consuming and sometimes we
- 00:07:35won't be able to use also requires
- 00:07:38manual verification. Uh we're in a in a
- 00:07:41world that it's turning more and more
- 00:07:44into automat automation meaning that uh
- 00:07:49everything that is manual is uh getting
- 00:07:52um less important.
- 00:07:55Thus using these type of methodologies
- 00:07:58we and can take us a lot of time and and
- 00:08:00and means uh acting manually which in
- 00:08:04some cases can can become a weakness.
- 00:08:06And finally needs adaptability to new
- 00:08:08tools and data sources. we're using for
- 00:08:11example an advanced platform advanced
- 00:08:13sourcing platform um and we don't know
- 00:08:16how to use it or they update the
- 00:08:18platform we will need to also update the
- 00:08:22methodology because maybe things are
- 00:08:24done differently and and that's that
- 00:08:27also is going to take us time and we
- 00:08:30will have to adapt to the changes of the
- 00:08:32tools so let's explore some tools I see
- 00:08:35some comments here uh okay no questions
- 00:08:39yet let's explore some oin tools uh
- 00:08:42categories of oin tools. Remember oin
- 00:08:46tools help collect analyze and visualize
- 00:08:48public available data and these tools
- 00:08:50fall into various categories based on
- 00:08:53the purpose they have. categories. For
- 00:08:55example, let's classify them into search
- 00:08:58and information gathering. We have
- 00:09:00Google Dorking. Google uh is an
- 00:09:02important tool and important resource to
- 00:09:04use. Shoddan senses also we have social
- 00:09:06media intelligence. Um
- 00:09:10uh so we have platforms such as social
- 00:09:14in scramble maltiggo in framework. We
- 00:09:17have email and username tools. Have I
- 00:09:19been found? What's my name? Giant. We
- 00:09:21have website and domain tools. who is
- 00:09:24look up way back machine DNS dumpster.
- 00:09:27Uh we have IP and network tools just to
- 00:09:31gather information about IPs and
- 00:09:33networks. Dark web such as uh the search
- 00:09:35engine giant AMA and Darkhole uh the
- 00:09:38hide and wiki. We have data bridges and
- 00:09:41leaks tools, dehy bridge forums,
- 00:09:43intellects, geoloccation and mapping
- 00:09:45tools such as Google maps, geospy,
- 00:09:47geocrippy, image and video in Gendex,
- 00:09:51YouTube data viewer, phone number and
- 00:09:53people search through caller APIs people
- 00:09:56uh threat intelligence and malware and
- 00:09:58meta data analysis tools such as PA or
- 00:10:00exit tool. I'm sure um many of you know
- 00:10:04all of these tools or or a high
- 00:10:07percentage of these tools. uh we use
- 00:10:09them daily uh some of us in our
- 00:10:12investigations. So this is an initial
- 00:10:14classification so that we understand
- 00:10:17that uh not all the tools work the same
- 00:10:20but instead there are different purpose
- 00:10:22for each one.
- 00:10:24Let's talk also about a controversial
- 00:10:27topic I I I like to uh discuss with with
- 00:10:32some of my colleagues and and oin
- 00:10:34professionals uh which is osing tools
- 00:10:37and osing advanced platforms. Okay. Um
- 00:10:41let me see you not mention us. Okay.
- 00:10:44user search I uh yeah that's a that's a
- 00:10:47great uh tool also uh a great platform
- 00:10:50that uh some some friends are developing
- 00:10:54but let's continue tools and advanced
- 00:10:57platforms uh what's the difference okay
- 00:11:00let's start with what's the difference
- 00:11:02tools usually are individual
- 00:11:05applications designed for specific doing
- 00:11:08tasks meaning I have a problem for
- 00:11:11example I want to investigate an email
- 00:11:13address I will use a specific tool for
- 00:11:16extracting data uh from that email
- 00:11:19address such as if I have a Gmail uh I
- 00:11:22could use Gant. Okay. Um they are
- 00:11:26usually small websites, applications or
- 00:11:29scripts and they operate standalone
- 00:11:32often requiring manual use. They can be
- 00:11:36combined they can use uh multiple tools
- 00:11:39with other tools and create an osing
- 00:11:41workflow. Okay. So within tools you we
- 00:11:44can have a list u of different tools and
- 00:11:47then use each one of them for one two
- 00:11:50maybe three specific tasks but then we
- 00:11:53will have to use another one and then on
- 00:11:57the other side we have oin advanced
- 00:11:59platforms I'm a big fan of these
- 00:12:01advanced platforms um especially for
- 00:12:04data collection not for data analysis
- 00:12:07but for data collection I believe they
- 00:12:10give you a quantitative and a
- 00:12:12qualitative uh improvement and value
- 00:12:16towards investigations. What are oin
- 00:12:18advanced platforms? They are
- 00:12:20comprehensive systems that integrate
- 00:12:22multiple oing tools. They enable you to
- 00:12:25automate. Automation is a is a key uh
- 00:12:29thing within advanced platforms. They
- 00:12:31use algorithms and sometimes they are
- 00:12:34more and more integrating artificial
- 00:12:36intelligence for data analysis and
- 00:12:38collection. They support multiple users
- 00:12:40for team investigations and aggregates
- 00:12:42and correlates data from various uh
- 00:12:45various sources. Okay, let's let's talk
- 00:12:49first about some collections of tools
- 00:12:51and then we will mention some advanced
- 00:12:53platforms my my favorite advanced
- 00:12:56platforms um and and just give some some
- 00:13:02details about each one of them. Uh if I
- 00:13:04stop sometimes it's because I'm reading
- 00:13:06the chat in case I'm missing something
- 00:13:08or or I can answer a question. Okay, but
- 00:13:10but let's continue. Collections of
- 00:13:14tools. Again, one of my goals in this in
- 00:13:17this presentation is to give you
- 00:13:18resources and to and to give you value
- 00:13:21with uh different tools uh names,
- 00:13:25collections, websites that then you can
- 00:13:27use later uh in your investigations or
- 00:13:30for gathering information. Okay. So, uh,
- 00:13:33first one I I I've shared I I'm going to
- 00:13:36share eight of my favorite collections
- 00:13:39of hosing tools. Meta OIN, which
- 00:13:42aggregates toposing tools and resources,
- 00:13:45um, and includes over 5,000 tools,
- 00:13:48resources, and links. Okay. uh it pri
- 00:13:52prioritizes popular tools groups
- 00:13:54citation counts uh meaning the the more
- 00:13:58uh popular a tool is uh I'm sure they
- 00:14:02are going to show it more and and you
- 00:14:04will have a better access to it uh which
- 00:14:06is this website I believe it's it's one
- 00:14:08of the resources uh sometimes whenever
- 00:14:11we are stuck or we're are out of our com
- 00:14:15comfort zone meaning that uh we don't
- 00:14:17know what tool to use or maybe we're
- 00:14:18investigating something from another
- 00:14:21country or maybe we want to check for
- 00:14:24business databases just uh things like
- 00:14:28that. It's important to to at least try
- 00:14:32to see if we can find the answer uh
- 00:14:34inside this this site meta. Another uh
- 00:14:38great toolkit is Belling Belling online.
- 00:14:42Um you all know the Bellinkats the
- 00:14:44company uh they are also doing amazing
- 00:14:47stuff um in Ocean and then they are
- 00:14:50volunteers and staff that collaborate
- 00:14:52they collaborate to update uh this tool
- 00:14:55tool entries they have toolkit with uh
- 00:14:59hundreds of of tools and then you can
- 00:15:02download this toolkit in CSV format.
- 00:15:05Okay. Uh again most of these collections
- 00:15:08organize the different tools in
- 00:15:10categories which help us as
- 00:15:12investigators to just like um check if
- 00:15:16for example we're investigating an image
- 00:15:18or we're trying to geolocation just go
- 00:15:21directly to the category uh we need and
- 00:15:24we have oin framework um it focuses on
- 00:15:27free oing tools and resources I've read
- 00:15:30uh in the comments that yeah advanced
- 00:15:32platforms are expensive um usually
- 00:15:36individual investigators cannot uh
- 00:15:38afford them. But uh when when we're
- 00:15:41talking about companies, I I believe
- 00:15:43it's a essential investment uh to have
- 00:15:48an advanced platform or to combine uh
- 00:15:50some of them. Okay. Uh the the way you
- 00:15:53can investigate and we're talking about
- 00:15:55volume um uh you can you can handle
- 00:15:58different much many more cases and you
- 00:16:00can collect uh automatically a lot of
- 00:16:04information. For me it's a it's a an
- 00:16:06essential investment. Okay. Uh we were
- 00:16:09in OS framework. Some tools may require
- 00:16:12registration or payments but but most of
- 00:16:15them are free and and it was originally
- 00:16:19designed for information security
- 00:16:20purposes. Okay. Then we have start me
- 00:16:23pages. Different start me pages. One of
- 00:16:25my favorites is Nick uh start me page
- 00:16:30which includes most topics and fields.
- 00:16:33Okay. again organized by categories and
- 00:16:37and you can
- 00:16:39find many tools probably most of them
- 00:16:43most of the uh most used and popular
- 00:16:45ones in in this part page. Okay. Of
- 00:16:49course we have cyber detectives
- 00:16:51collection over a thousand resources and
- 00:16:55focuses on automation as oinking a
- 00:16:58strength. Then we have Arnold browsers
- 00:17:01oin reperatorium. I will recommend you
- 00:17:03to take this reperatorium also. Um it's
- 00:17:07a it's a a very comprehensive
- 00:17:10reparatorium. This this person has been
- 00:17:12in the oin field for like 40 years. So
- 00:17:15so it's someone reliable that knows what
- 00:17:17he's doing. And again we have asin
- 00:17:20collection another start me page. And
- 00:17:22finally we have au hosting tools. He has
- 00:17:25more than 10,000 posting tools and
- 00:17:28resources uh organized within different
- 00:17:32uh categories and I will say this is the
- 00:17:34largest website uh well the website the
- 00:17:37largest website yes containing awesome
- 00:17:40tools. So these are some snapshots so
- 00:17:43that you have a visually some reference
- 00:17:46about how uh these sites look and how
- 00:17:49can we use them. uh this metaosin for
- 00:17:52example you can you can click in any of
- 00:17:54these circles and then you will start
- 00:17:56receiving uh resources and links that
- 00:17:59you can use for investigations. There's
- 00:18:01also the availability to just uh do some
- 00:18:05searches on a on a table. So you have
- 00:18:07the graphical way of seeing uh the site
- 00:18:09and then the table way also oing
- 00:18:12framework. I'm sure you know about this
- 00:18:15framework, but it's uh a classic one and
- 00:18:17and we couldn't miss it uh in this
- 00:18:20presentation. You just start clicking uh
- 00:18:23the dots and then you will find
- 00:18:25different tools uh for different
- 00:18:27purposes. And then uh I just wanted to
- 00:18:30give you an example of a start me page.
- 00:18:32Uh these these pages really save us a
- 00:18:35lot of time. And again, usually when
- 00:18:38when we're doing investigations that are
- 00:18:40not related directly to what we usually
- 00:18:43do, uh this can become very helpful and
- 00:18:46I'm sure you can find a star me page
- 00:18:49about anything uh in the ocean field.
- 00:18:52Okay. So um these are my my examples of
- 00:18:57oing collections and and also of course
- 00:19:01uh as you may have seen through my
- 00:19:03LinkedIn I like to share uh my top email
- 00:19:06address tools, phone number tools, dark
- 00:19:09web tools. I have uh different templates
- 00:19:11and and cheat sheets where I explain all
- 00:19:15all these tools where I I mention these
- 00:19:17tools so that you can use them. Um as we
- 00:19:19can see for email address tools we have
- 00:19:2321 different well 21 different tools
- 00:19:26each of them uh different some of them
- 00:19:29are similar because again another tip
- 00:19:32whenever we are investigating and we
- 00:19:34don't find information by using one tool
- 00:19:37maybe another similar tool can give us
- 00:19:39that
- 00:19:40information check the comments uh okay
- 00:19:43we're we're discussing about uh
- 00:19:46investing investing in in Oene advanced
- 00:19:50platforms. Well, we we can talk about
- 00:19:52that later. Um and and well, as you can
- 00:19:56see, many tools, many categories, all of
- 00:19:59them organized and and at the end we
- 00:20:02have thousands and thousands of tools.
- 00:20:05Um on the other hand, top advanced
- 00:20:08platforms, uh we talked about tools.
- 00:20:11Let's talk a little bit about platforms.
- 00:20:13Uh I've selected eight of the platforms
- 00:20:15I like the most. uh first social links
- 00:20:18primal very uh useful for sock
- 00:20:22investigations a lot of sources I will
- 00:20:24give you an example you're investigating
- 00:20:26a Facebook account uh and you want to
- 00:20:29know his network you want to extract all
- 00:20:33the pictures you want to see all the
- 00:20:34comments uh in all these pictures you
- 00:20:38want just to get a a big picture of
- 00:20:40what's going on visualize this in a in a
- 00:20:44graph so that you
- 00:20:47correlate and you can find similarities
- 00:20:50or or mixed points between two entities.
- 00:20:54For example, if we're we are
- 00:20:55investigating a a gang, okay, uh we we
- 00:20:59can just like extract all of this
- 00:21:01information automatically in within
- 00:21:04minutes and then find uh just like
- 00:21:07multiple friends or mutual groups,
- 00:21:10multiple pages. uh we can do that all
- 00:21:12the time and and that's why I believe uh
- 00:21:15these type of platforms uh this is a use
- 00:21:18case that that shows how these type of
- 00:21:21platforms can help us and and can can
- 00:21:24elevate in volume but also qualitative
- 00:21:27the the level of our investigations.
- 00:21:30Okay. uh they are adding also more and
- 00:21:32more uh artificial intelligence such as
- 00:21:35facial recognition uh futures. Um the
- 00:21:39object recognition futures uh and then
- 00:21:44uh you can you can just like think about
- 00:21:45all the possibilities this a tool like
- 00:21:49this can give you to to just adapt it to
- 00:21:51your uh specific use cases depending on
- 00:21:55what type of investigations you perform
- 00:21:57the most. Another one uh classic a very
- 00:22:01good platform uh Maltigo. Maltiggo uh
- 00:22:05probably one of the first ones, one of
- 00:22:07the most comprehensive ones. It enables
- 00:22:10you to just like add multiple multiple
- 00:22:13sources and and then just leverage all
- 00:22:16of these sources. I can say just like
- 00:22:18dark web sources, uh business data, um
- 00:22:22network data, uh everything and just
- 00:22:26like leverage leverage it in the same
- 00:22:29platform and and analyze, monitor,
- 00:22:32analyze large volumes of data instantly.
- 00:22:34Okay, we have a another one, the third
- 00:22:36one I will say scope. Now I I really
- 00:22:38like how they work. uh instant
- 00:22:42aggregated data for actionable insights,
- 00:22:44object recognition, analytics and
- 00:22:46automated reports. Um also we can we can
- 00:22:50automate reports with with these uh with
- 00:22:53these platforms. However, I I usually
- 00:22:56don't do that but in some cases also
- 00:22:59going back to what we said that time is
- 00:23:01essential in intelligence, it's
- 00:23:02important to have some some resource
- 00:23:05that can automate the even even the
- 00:23:08report uh making. Okay. And then we can
- 00:23:11visualize intelligence in a v variety of
- 00:23:13layouts. We have timelines, we have a
- 00:23:15dashboards, we have uh maps. So we can
- 00:23:19visualize everything we are doing in
- 00:23:21different layouts. Another one uh from
- 00:23:24Australia, Nexus explore. Uh it's super
- 00:23:28powerful for gint. Uh they have Robus
- 00:23:32public and corporate records access and
- 00:23:35and they have secure anonymized dark web
- 00:23:38and oin bro browsing. Um next for dark
- 00:23:43for dark web I know there are many more
- 00:23:45and I'm not saying these ones are like
- 00:23:47the best of the best. I will say these
- 00:23:49ones are the ones I've I've tried. I
- 00:23:52know more about them. Uh so that's why
- 00:23:55they are here. Uh probably you have some
- 00:23:58different thoughts in some cases but I I
- 00:24:00I I believe these ones are are worth it
- 00:24:04for sure. Darkhole vision um real-time
- 00:24:08thread monitoring uh with darknet data
- 00:24:11automated alerts and custom well
- 00:24:14customable secure search tools advanced
- 00:24:17exposure metrics to assess cyber risk.
- 00:24:20Then we have Paul Walker. I I wanted to
- 00:24:23add this which is uh more about
- 00:24:25investigating is about social listening.
- 00:24:28You know brand reputation is also inside
- 00:24:30the ocean space and this tool um what
- 00:24:34enables us is to
- 00:24:38um just to um just leverage social
- 00:24:43listening. I mean if we want to uh
- 00:24:46investigate or let's say monitor a
- 00:24:48company or an individual or just a topic
- 00:24:52we can use tools like toll walker that
- 00:24:55uh they have access to different data
- 00:24:58sources and that enable us to to monitor
- 00:25:01uh how the brand is performing what are
- 00:25:04they saying about about a brand what are
- 00:25:06the news that are showing up related uh
- 00:25:08to a brand to to an individual. This
- 00:25:10this can be effective also for executive
- 00:25:12protection for BIP uh monitoring. Uh a
- 00:25:16tool like this is always uh welcome into
- 00:25:19into our uh laboratory of of
- 00:25:24uh Osin laboratory. Okay. Then we have
- 00:25:26Black Dot Solutions. They are doing also
- 00:25:28a great job uh very focused on due
- 00:25:31diligence but also social media
- 00:25:32intelligence. Um and I I really like
- 00:25:35their platform also. And finally, Onyx
- 00:25:38FCast. Um, again, very similar to to the
- 00:25:41other ones. And I just wanted to give
- 00:25:43you my opinion about these tools, uh,
- 00:25:46these advanced platforms. And I see a
- 00:25:48lot of comments,
- 00:25:50uh, talking about, uh, well, discussing
- 00:25:53which one is
- 00:25:54[Music]
- 00:25:57better. Okay. Yeah.
- 00:26:00$75,000. As I mentioned, um, Eeky. Eeky
- 00:26:04is a is a good one. It's developed by uh
- 00:26:06Kembro uh a great guy also and and well
- 00:26:12yeah the discussion here as I see in the
- 00:26:14comments is okay is it worth it
- 00:26:18um is it worth it to spend that much
- 00:26:20money I will say for an individual
- 00:26:22investigator uh it's it's hard it's it's
- 00:26:26painful to do this type of investments
- 00:26:28but if you're a company I'm talking
- 00:26:30about companies such as uh let's say a
- 00:26:33bank uh here in Spain, Santandere or or
- 00:26:36maybe City Bank or or uh let's say
- 00:26:41whichever company Tesla um big companies
- 00:26:44out there uh their intelligence teams I
- 00:26:49believe that they must be equipped with
- 00:26:52the right platforms and avoid spending
- 00:26:55resources and time with individual
- 00:26:58tools. In some cases of course they they
- 00:27:00must have knowledge about both both with
- 00:27:03uh because of course the team must be
- 00:27:06must be
- 00:27:07um must be uh the oing professionals
- 00:27:12must must be the team must be formed by
- 00:27:15oing professionals. The sourcing
- 00:27:17professionals must have knowledge about
- 00:27:19how to develop or how to use uh normal
- 00:27:23tools, free tools, but also they should
- 00:27:26invest in this type of advanced
- 00:27:28platforms and just mix them uh mix both
- 00:27:31of them. Okay, it's not one is better
- 00:27:33than the other. Uh of course this is
- 00:27:36going to give us more qualitative and
- 00:27:37quantitative advantage but both mixing
- 00:27:41both of them is the key here. not just
- 00:27:43like relying only on advanced platforms.
- 00:27:47Okay. Um then let's explore Osin
- 00:27:50methodologies.
- 00:27:51Um let's let's continue with Osin
- 00:27:54methodologies. Again the the basic one,
- 00:27:57the most important one. Um the the
- 00:27:59intelligent cycle. Okay, let's let's
- 00:28:02review a little bit the intelligence
- 00:28:03cycle. Planning and direction. Uh plan,
- 00:28:06strategize, research, discuss, gather
- 00:28:08intelligence, execute task efficiently.
- 00:28:11Data collection will be the next step.
- 00:28:13Gather intelligence overtly and
- 00:28:14corporately utilizing various
- 00:28:17technological resources. Processing and
- 00:28:19exploitation. Just compile collected
- 00:28:21data into intelligence reports. Analysis
- 00:28:24and production. Analyze data. Determine
- 00:28:27relevance. Anticipate the outcomes.
- 00:28:29Evaluate impact on interests. Then
- 00:28:32dissemination and feedback. Deliver
- 00:28:34analysis to policy makers. Await
- 00:28:36feedback. Restart cycle as necessary. Um
- 00:28:39this I would like to mention that
- 00:28:41sometimes uh it's avoided like um we
- 00:28:44start an investigation and we don't
- 00:28:46really uh care about this cycle but uh
- 00:28:50just this this doesn't have to last for
- 00:28:52hours maybe you can collect data as we
- 00:28:55mentioned with uh doing some scrapping
- 00:28:57or extracting some data with advanced
- 00:28:59platforms and that can take us 20
- 00:29:02minutes uh and then doing the analysis
- 00:29:05if that data is super clear can take us
- 00:29:07just like five minutes or maybe it can
- 00:29:10take us days. But all of these steps
- 00:29:13should be uh reminded whenever we are
- 00:29:15organizing or we're trying to plan an
- 00:29:17investigation. Uh we should we should uh
- 00:29:20take into account all of these steps.
- 00:29:23Okay. Uh here I have more data uh about
- 00:29:27the intelligent cycle just some
- 00:29:29different tips I will say stepby-step
- 00:29:31tips. uh define objectives, identify
- 00:29:34requirements, select sources, develop
- 00:29:36plan. That's for the planning and
- 00:29:38direction step. For data collection, use
- 00:29:40diverse sources, automate if possible,
- 00:29:43verify credibility and stay ethical and
- 00:29:45legal for processing and exploitation.
- 00:29:47Organize data, remove redundancies,
- 00:29:50normalize formats and document sources.
- 00:29:52Documenting is also super important.
- 00:29:55anal analysis of and production.
- 00:29:57Identify patterns, assess reliability,
- 00:29:59contextualize data and generate insights
- 00:30:03for dissemination and feedback. The last
- 00:30:04step, create reports, tailor to
- 00:30:06audience, solicit feedback and update
- 00:30:09methods. And then general aspects,
- 00:30:11general um tips I will say, strive for
- 00:30:15precision and correctness. It's
- 00:30:17important to verify the data. uh we're
- 00:30:21not going to share um data with our
- 00:30:25client or with whoever if we haven't
- 00:30:28verified because let's say we make a big
- 00:30:31mistake and that leads to uh bigger
- 00:30:34mistakes uh afterwards then we will m
- 00:30:37maintain a sense of urgency the fastest
- 00:30:41also maintaining striving for precision
- 00:30:43but the fastest we can deliver our
- 00:30:46results our intelligence the better and
- 00:30:50and that happens a lot uh well we're
- 00:30:53living in a world of urgency but in the
- 00:30:56intelligence field this becomes even uh
- 00:30:59more important. Okay. Use credible
- 00:31:01sources and methods adhere to legal and
- 00:31:04moral guidelines. This depending when uh
- 00:31:09you have the ability to well and
- 00:31:11depending on the country you have more
- 00:31:13legal restrictions uh and all and and
- 00:31:16more freedom to do these type of
- 00:31:18investigations. stay flexible and ready
- 00:31:20to adjust. Okay. Uh we we are going to
- 00:31:23talk about methodologies but we must
- 00:31:25stay flexible because not all of the
- 00:31:27investigations are the same. I will say
- 00:31:29we should follow uh steps but uh also
- 00:31:33stay flexible. Okay. Uh and then ensure
- 00:31:37OBSAC operational security through all
- 00:31:40phases and that it's it's one of the
- 00:31:42most important uh aspect to consider.
- 00:31:45OBSE is essential. Okay.
- 00:31:49Categories of oin methodologies. Okay.
- 00:31:52Uh ocean methodologies include
- 00:31:55structured processes and best practices
- 00:31:57for conducting ocean investigations.
- 00:31:59Main categories include passive versus
- 00:32:02active ocean. Okay. If we don't
- 00:32:04interact, we're talking about passive
- 00:32:06oin. If we uh are interacting, if we're
- 00:32:10engaging with a target, we're talking
- 00:32:11about tactive methodologies by source
- 00:32:14type surface web intelligence, web in
- 00:32:17geospatial intelligence, geoing, social
- 00:32:19media intelligence,
- 00:32:21suggestions, gaming, digital
- 00:32:23footprinting and metadata, deep and dark
- 00:32:26web intelligence. These are some uh of
- 00:32:29course there are more but these are some
- 00:32:30of the methodologies by source type or
- 00:32:33types of intelligence. And then
- 00:32:35methodologies by purpose. Okay, we
- 00:32:38depending on what we're investigating,
- 00:32:41depending on um what our goals are, uh
- 00:32:46we can talk about threat intelligence,
- 00:32:49business intelligence, law enforcement
- 00:32:51investigations, median disinformation.
- 00:32:54Uh we talked before uh on a previous
- 00:32:56slide about brand reputation. Okay, all
- 00:32:59of these depending on the purpose we're
- 00:33:01doing different types of oin
- 00:33:04investigations or researches. Okay,
- 00:33:08where to look? We're talking about
- 00:33:10methodologies. Where do we have to uh
- 00:33:12look for them? Articles and blogs.
- 00:33:14Excellent articles and blogs out there.
- 00:33:17I would recommend Osin Ambition, Osin
- 00:33:20team also. Um social links has great
- 00:33:25articles. uh medi like just like
- 00:33:28subscribing to medium or being able to
- 00:33:31to just get notifications from them uh
- 00:33:34will give us a lot of tips and and and
- 00:33:37in some cases methodologies such as how
- 00:33:39to investigate on Facebook, how to
- 00:33:41investigate on Instagram. All of that
- 00:33:43super useful to mix all of these uh
- 00:33:46knowledge and just develop your your own
- 00:33:48methodologies, workflows, posting books,
- 00:33:51checklists, step-by-step guides. Okay?
- 00:33:54And let me give you some examples again
- 00:33:57so that you have different resources to
- 00:34:00to go and
- 00:34:02check. Uh ocean resources. These are
- 00:34:05some of I have a I have a PDF with a lot
- 00:34:08of these cheat sheets and most of the
- 00:34:11material material you can see here and
- 00:34:14and I just like to gather knowledge and
- 00:34:18mix it together and present it in a nice
- 00:34:20way. So we have books, different books,
- 00:34:22ocean books. We have news and blogs, uh
- 00:34:24a great list of news and blogs,
- 00:34:26podcasts, YouTube channels, virtual
- 00:34:28machines, um newsletters, telegram
- 00:34:32groups, all of them uh can give us uh
- 00:34:35knowledge and information that we can
- 00:34:38later on develop uh methodologies. Of
- 00:34:41course, these are resources. What will
- 00:34:43give us uh the biggest value uh and
- 00:34:46what's more important is just practicing
- 00:34:49investigating like spending years
- 00:34:52investigating different things so that
- 00:34:54we by our own experience know how to do
- 00:34:59uh anything we have to do just like okay
- 00:35:02I I've been investigating um or I've
- 00:35:04been yeah investigating
- 00:35:06um just like um gang members for years
- 00:35:12now I know how to do it or what are the
- 00:35:15steps I should follow. Uh so I will do
- 00:35:17document all these steps so that if I
- 00:35:20have to teach someone or someone has to
- 00:35:22help me I we have some steps to follow
- 00:35:25and we can be on the same page uh both
- 00:35:27of us u oin workflows are also super uh
- 00:35:31nice for for just developing
- 00:35:33methodologies. Um we can see here an
- 00:35:36example at the end posing is uh is I
- 00:35:41will say it's just having one data point
- 00:35:45and pivoting into other data points so
- 00:35:48that we can find more and more
- 00:35:50information. Okay, anytime uh we have a
- 00:35:52data point and we can find information
- 00:35:54about uh about it we have more
- 00:35:57information to expand. So it's a
- 00:35:59continuous process and and these type of
- 00:36:02workflows give us a lot of uh
- 00:36:04information or guidance about how we
- 00:36:07should proceed and and how we we should
- 00:36:11aot our investigations. Okay, in this
- 00:36:14case for example we have a real name
- 00:36:16then we get an email address, username,
- 00:36:18social networks, search engines
- 00:36:20location, IP address, domain names. uh
- 00:36:23we're in the collection um phase, but
- 00:36:26then we turn into the analysis phase and
- 00:36:28then we extract knowledge. Um so so this
- 00:36:32is a an interesting slide and an
- 00:36:35interesting workflow to follow and each
- 00:36:38of us can develop uh these workflows by
- 00:36:40ourselves or we can uh use uh what's out
- 00:36:45there which is a lot to just follow
- 00:36:48these these workflows and
- 00:36:51and see try them and see how they work
- 00:36:54in our own investigations. Again uh
- 00:36:57another example um we have Intel
- 00:36:59techniques workflows. Uh Intel
- 00:37:02techniques is a popular osing framework
- 00:37:04developed by Michael Bassel. He offers
- 00:37:07structure workflows for intelligence
- 00:37:08gathering. Uh of course Michael Basel
- 00:37:11and we'll mention it later. Uh he's the
- 00:37:13author of of the famous book so
- 00:37:16techniques. He has uh 11 editions so far
- 00:37:20and and you can that's like the bible of
- 00:37:22fosing. You can find a lot of tools, a
- 00:37:24lot of real cases and and ways to to
- 00:37:27leverage to install your own tools, how
- 00:37:30to how to prepare yourself for o
- 00:37:33investigations. But he also has a
- 00:37:35website with tools with workflows with
- 00:37:40uh blog with news and and I believe he
- 00:37:44was one of the first who started
- 00:37:46developing this type of workflows. So I
- 00:37:48I will I wanted to give him credit.
- 00:37:51Okay. Uh these workflows provide
- 00:37:54step-by-step methodologies for
- 00:37:55collecting, analyzing and correlating
- 00:37:57data from v various online sources.
- 00:37:59Again, we start with a real name and we
- 00:38:01go to Twitter, Facebook, search engines,
- 00:38:04people search engines, uh resumeums. In
- 00:38:06each of the steps, we have different
- 00:38:09tools. Okay, that's how we integrate
- 00:38:11methodologies and
- 00:38:13tools also. This this I will say it's
- 00:38:16it's uh one of my favorites also and
- 00:38:19very interesting. uh so well back by by
- 00:38:22soy you probably know soy um Dimmitri
- 00:38:26he's head of product in social links and
- 00:38:29he he's always trying to improve and to
- 00:38:32give value to the oin community and in
- 00:38:35this case uh he developed uh a website
- 00:38:38uh and and a methodology called soil so
- 00:38:42weakness enumeration list which is a
- 00:38:45stepbystep guide to social media or
- 00:38:47investigations and and what he's trying
- 00:38:50to do is to um to analyze each one of
- 00:38:54the steps and and give us alternatives.
- 00:38:57For example, okay, we start with a
- 00:38:58username. What should we do later? Okay.
- 00:39:02Um how should we gather more information
- 00:39:06about this username or how can we uh
- 00:39:09analyze this username and find
- 00:39:11information somewhere else? Okay, that's
- 00:39:13just like a silly example, but uh he he
- 00:39:16he has a talent to structure everything
- 00:39:20in a way that uh if you start reading it
- 00:39:23and following it, it it makes completely
- 00:39:26sense and and if you follow processes
- 00:39:29like this and and you have to
- 00:39:31investigate a social media account or do
- 00:39:33a social media investigation, uh it's
- 00:39:35really worth it.
- 00:39:38Osin books uh another great resource to
- 00:39:41to find and to
- 00:39:44uh uh learn uh methodologies. I
- 00:39:47mentioned Michael Vasel's oin
- 00:39:49techniques. We have other books such as
- 00:39:51deep dive uh which is a very interesting
- 00:39:54book also and then oin uh the
- 00:39:56authorative guide into due diligence
- 00:39:59very spe specialized on do diligence but
- 00:40:03if we have to do an investigation about
- 00:40:05a company uh it's a great book I
- 00:40:07recommend it gives you also stepby-step
- 00:40:10guides and and tips of how to perform
- 00:40:13these type of
- 00:40:14investigations and then we have oin
- 00:40:17checklist uh each one of us can just
- 00:40:20develop uh create the their own uh
- 00:40:23checklist uh from their experience from
- 00:40:25all this knowledge uh that we can find
- 00:40:28in these resources just like
- 00:40:31uh divide our investigation. In this
- 00:40:34case, I did one for digital risk
- 00:40:36assessments with uh I believe 10
- 00:40:39categories, 10 or 11 categories and then
- 00:40:42I I
- 00:40:43I wrote all the steps I me or my team
- 00:40:48had to take to uh cover as much as
- 00:40:52possible uh a digital risk assessment of
- 00:40:55a BIP or of of our executive or someone
- 00:41:00famous, you know, uh
- 00:41:02having steps and having
- 00:41:05um a guidance of how to how to do this
- 00:41:08type of investigation so that any time
- 00:41:11we have to do one of this we won't miss
- 00:41:14anything okay and final verdict with
- 00:41:18this we will finish I will love to
- 00:41:20answer some questions or give my opinion
- 00:41:22uh about advanced platforms about
- 00:41:25methodologies about tools I will say
- 00:41:27tools are essential they are essential
- 00:41:30both free tools tools uh and advanced
- 00:41:33platforms. If we don't have the budget,
- 00:41:36I will I I will just uh remain with free
- 00:41:39tools. There are some of them that are
- 00:41:41great and and I I give credit to all of
- 00:41:44them to to the developers then that in
- 00:41:47some cases they just do this for fun or
- 00:41:49to help others. Uh okay, but tools are
- 00:41:52essential but require critical thinking
- 00:41:54and proper methodology to be
- 00:41:57effective. with this what I want to say
- 00:42:00um I have different telegram groups I
- 00:42:03follow uh many of them and I see hey can
- 00:42:06you give me a tool or can can someone
- 00:42:10tell me a tool for uh investigating an
- 00:42:13Instagram
- 00:42:15profile and next day hey can you give me
- 00:42:18a tool for investigating email addresses
- 00:42:20okay stop think critical thinking why do
- 00:42:25you need the tool for why is it
- 00:42:27important And what type of information
- 00:42:29do you want to gather? Uh why are you
- 00:42:33going to use this information later on?
- 00:42:35It's not obviously it's not about I have
- 00:42:38a website, I type an Instagram,
- 00:42:40Instagram username or an email address
- 00:42:43and then I get something. No, no. Just
- 00:42:46think and and and think uh deeply about
- 00:42:51why do you want the tool and and how
- 00:42:53you're going to use it. Okay. Uh so they
- 00:42:56are essential but they require critical
- 00:42:58thinking and proper methodology and
- 00:43:00second methodologies provide a structure
- 00:43:03ethical and reli reliable approach but
- 00:43:05can be enhanced with the right tools.
- 00:43:08Okay you you can develop a methodology
- 00:43:11that's my advice that you need to be
- 00:43:14aware of what are the right tools that
- 00:43:16will support your investigation and your
- 00:43:20methodology.
- 00:43:21Okay, with this being said, thanks to
- 00:43:24all of you. Um, sorry for my English in
- 00:43:27some times I've been I struggling a
- 00:43:30little bit, but well, thank you a lot.
- 00:43:34[Music]
- OSINT
- tools
- methodologies
- intelligence cycle
- data collection
- analysis
- critical thinking
- open-source information
- investigations
- resources