全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

Information Reconnaissance by Accumulating Public Information Data Sources

DOI: 10.4236/oalib.1111463, PP. 1-25

Subject Areas: Computer and Network Security

Keywords: Open Source Intelligence, Maltego, Tor, Google Dorks, Metagoofil, theHarvester

Full-Text   Cite this paper   Add to My Lib

Abstract

In the Internet age, the most valuable pieces of data when investigating an individual are phone numbers, email addresses, and usernames. These data points, which are typically freely shared by their owners, can act as a pri-mary key to link research on a person to other data sources dispersed throughout the web. The Internet has made obtaining a wealth of data an accessible activity requiring only creativity and persistence. An investiga-tor with the motivation to identify information on a certain person or or-ganization can use these data points to build links and present useful in-formation on a target. Our paper aims to study connecting disparate data from publicly accessible sources to provide detail into someone or some-thing is called Open Source Intelligence (OSINT). In this paper, we intro-duce the subject of OSINT both in a broad sense as well as through docu-menting hands-on experience in scraping information on one of the mem-bers of this research group as well as generic internet targets. The first fo-cus is on presenting the overall concept including norms and techniques that may be used to investigate an individual. The second focus is on deep-diving a specific tool along with a method for adding data sources to present the broad scope of available information. Several useful tools that are common in the OSINT space are presented. Finally, we found the chal-lenge in narrowing the focus to the intended target and in relating it to use-ful information.

Cite this paper

Duffy, M. , Pan, X. and Wilson, S. (2024). Information Reconnaissance by Accumulating Public Information Data Sources. Open Access Library Journal, 11, e1463. doi: http://dx.doi.org/10.4236/oalib.1111463.

References

[1]  Hassan, G.N.A. and Hijazi, R. (2018) Open Source Intelligence Methods and Tools: A Practical Guide to Online Intelligence. Apress, Berkeley. https://doi.org/10.1007/978-1-4842-3213-2
[2]  (2020) Open Source Intelligence (Osint). https://www.esd.whs.mil/Portals/54/Documents/DD/issuances/dodi/311512p.pdf?ver=2019-03-06-093811-687
[3]  (2021) Nato osint handbook v1.2. https://www.studocu.com/en-us/document/collin-college/operating-system-security/nato-osint-handbook-v12-jan-2002/87709361
[4]  Gibson, H. (2016) Acquisition and Preparation of Data for OSINT Investigations. In: Akhgar, B., Bayerl, P. and Sampson, F., Eds., Open Source Intelligence Investigation, Springer, Cham, 69-93. https://doi.org/10.1007/978-3-319-47671-1_6
[5]  Tails. https://tails.net/
[6]  Chapple, M. (2019) Tor and the Dark Web: Exploring the Basics. https://www.linkedin.com/learning/tor-and-the-dark-web-exploring-the-basics?trk=lynda_redirect_learning
[7]  Kalpakis, G., Tsikrika, T., Cunningham, N., Iliou, C., Vrochidis, S., Mid-dleton, J. and Kompatsiaris, I. (2016) OSINT and the Dark Web. In: Akhgar, B., Bayerl, P. and Sampson, F., Eds., Open Source Intelligence Investigation, Springer, Cham, 111-132. https://doi.org/10.1007/978-3-319-47671-1_8
[8]  Kali Linux Tools Listing. https://tools.kali.org/tools-listing
[9]  (2020) Introduction to Maltego Standard Entities. https://docs.maltego.com/support/solutions/articles/15000035722-introduction-to-maltego-standard-entities
[10]  (2020) What Is Open Source Intelligence (OSINT) and How to Conduct OSINT Investigations in Maltego. https://www.maltego.com/blog/what-is-open-source-intelligence-and-how-to-conduct-osint-investigations/
[11]  Make It Your Own. https://www.maltego.com/pricing-plans/
[12]  Social Links PRO. https://docs.maltego.com/support/solutions/articles/15000054072-social-links-pro#overview-0-0
[13]  Who, What & Why. https://haveibeenpwned.com/About
[14]  Multiple Listing Service (MLS): What Is It. https://www.nar.realtor/nar-doj-settlement/multiple-listing-service-mls-what-is-it
[15]  Bridge API Documentation. https://bridgedataoutput.com/docs/platform/
[16]  (2020) TRX Transform Library Guide. https://docs.maltego.com/support/solutions/articles/15000024277-trx-transform-library-guide
[17]  (2020) Edgar—Search and Access. https://www.sec.gov/edgar/search-and-access
[18]  PhoneInfoga. https://github.com/ExpertAnonymous/PhoneInfoga
[19]  Tech, T. (2020) Smart Searching with Google Dorking. https://exposingtheinvisible.org/guides/google-dorking/
[20]  Riley, J. (2017) Understanding Metadata. https://digital.library.unt.edu/ark:/67531/metadc990983/
[21]  Martorella, C. (2015) Metagoofil. https://github.com/laramies/metagoofil
[22]  Metagoofil Does Not Find Any Results #13. https://github.com/laramies/metagoofil/issues/13
[23]  (2020) Metagoofil—Python 3. https://github.com/Hackndo/metagoofil
[24]  (2020) The Harvester. https://github.com/laramies/theHarvester
[25]  Mason, R.O. (1986) Four Ethical Issues of the Information Age. https://www.gdrc.org/info-design/4-ethics.html
[26]  18 U.S. Code § 1030—Fraud and Related Activity in Connection with Computers. https://www.law.cornell.edu/uscode/text/18/1030
[27]  Wong, C. (2024) What Is Phishing? Examples, Types, and Techniques. https://www.csoonline.com/article/514515/what-is-phishing-examples-types-and-techniques.html
[28]  Pham, T., Cirincione, G.H., Verma, D. and Pearson, G. (2008) Intelligence, Surveillance, and Reconnaissance Fusion for Coalition Operations. https://apps.dtic.mil/sti/pdfs/ADA520498.pdf
[29]  Buchler, N., Fitzhugh, S.M., Marusich, L.R., Ungvarsky, D.M., Lebiere, C. and Gonzalez, C. (2016) Mission Command in the Age of Network-Enabled Operations: Social Network Analysis of Information Sharing and Situation Awareness. Frontiers in Psychology, 7, Article 937. https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4916213/. https://doi.org/10.3389/fpsyg.2016.00937
[30]  Hershey, P., Wang, M.C., Graham, C., Davidson, S., Sica, M. and Dudash, J. (2012) A Policy-Based Approach to Automated Data Reduction for Intelligence, Surveillance, and Reconnaissance Systems. MILCOM 2012: 2012 IEEE Military Communications Conference, Orlando, 29 October-1 November 2012, 1-6. https://doi.org/10.1109/MILCOM.2012.6415574

Full-Text


comments powered by Disqus

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133

WeChat 1538708413