Skip to main content

Posts

Username Osint #3

 Today I'm gonna share a very great and useful website to easily hunt down any user with just their username, yes you've read it right you just need to have your targets username only, and for this you don't have to install any tool. So let's start our today's blog. In one of my blog i've already told you the importance of username in our life and how you can easily learn about a person by their usernames, if you haven't read that blog yet than i would recommend you to go and read that blog first to understand the importance of username. So in this blog i'm sharing another best website to investigate your target with just their username and that website is NAMINT is one of the best source and also very popular among osint researchers because of it's simple look and the information it returns is really amazing. In the image above is the interface of the namint website with some blank boxes, you have to enter some information about your target such as

Username Osint #2

Today we will gonna use a tool for username osint but before reading this blog i recommend you guys to go back and read my previous blog because in that blog i've explained the importance of username and why it is crucial for every osint investigator to investigate a username, so do not forget to read my previous blog. So in this blog we are gonna use a tool named sherlock which is an open source tool developed by sdushantha. Sherlock will search usernames in 300 different social media platforms for better results. It is also one of the widely used tool in osint and hacking industries. In order to use sherlock we need to install it first on our system, i'm gonna use my windows subsystem linux for this blog and i assume that you guys are using wsl too. Commands git clone https://github.com/sherlock-project/sherlock.git After cloning the tool go inside the sherlock directory and install the required packages by running the  python3 -m pip install -r requirements.txt command

Username OSINT #1

Hey readers! Welcome back to another awesome blog, in today's blog we are gonna learn and explore about usernames and how did a person can easily be track down by their usernames which they use on their social media platforms, now you might be thinking that it's just a username and it can't give much info about the target, well you are wrong because a username can say a lot about you and your personality. A username can not only reveal your real identity but it will also lead a hacker or investigator at your door step, because whatever username we choose for online world it's somewhere related or conntected to our fantasies, dreams, or actions in real world, infact username osint is one techniques used by stalkers to stalk you online, okay so now you guys have understand the importance of the username osint let's move on to the practical part of the blog and for this blog we are gonna use a website called namechk . Namechk is one of the best platform to start inv

Location Tracking Using IP-Tracer

 Welcome back to the osintlearner's blog, in todays blog we are i'm gonna show you how you can trace an ip address using a tool called IP-Tracer. Ip-tracer is an open source ip tracking tool developed by rajkumardusad , but before we dive into practical method let me explain about IP Address because it is the most important topic in cyber security field and without having the knowledge of networking you guys won't be able to move foward in your hacking career. What is IP Address? An ip address or internet protocol is a unique string of character that identifies the computer in a network and each computer has it own ip address. There are two versions of ip address, 1) Ipv4 and 2) Ipv6. IPv4 cotains 32bit long unique string and IPv6 contains 128bit long unique hexadecimal address. Okay, now you guys know about ip address so let's start the practical part of this blog. In order to trace the ip address we first need to clone/download the tool from github, but if you are

All About Google Dorks

 Hello and welcome again to osintlearners blog, today i'm very excited while writing this blog because today we are gonna talk about a most useful and powerfull technique in the field of Cyber Security and OSINT and believe me after knowing this technique you won't be able to live without using this technique in your investigation, so let's move forward and start the blog. Google dorking is a technique used by many IT professionals, hackers, osint investigators and also used by many pro internet users to filter out the results from google. Basically google has some pre-defined keywords which anybody can use to get the desired results. Now we all know that there are three WEB's on internet Surface Web, Dark Web and Deep Web and we all know that many illegal things found on the Dark and Deep web but there is a fact about surface web is that there are tons of hidden information are also available on surface web which we can't see on our result section and that's wh

Email Osint #1

Today we are gonna perform a very basic email osint with the help of a website named epieos . Epieos is a very famous website amongst hackers and osinters because it used to be freemium and used to give some decent information about the target but now you have to register on the website in order to use or see basic information, anyways it is still useful for us, so without any further delay let's start our today's blog.  In order to perform this task you should know about the importance of an email address, i'm gonna perform this task on my own mail address because performing any activity in osint without proper permission can land you in a jail , so let's start.   First register your account by visiting the epieos , you can use temparory email services to register on the website. After emtering your email goto your inbox and verify your email. After verifying your email, enter the email of your target and hit enter. As you guys can see in the images attached above th

How to Get Someone's Location By Sending A Link?

In this blog we are gonna learn that how easy it is to get someone's location by just sending a link, so without any delay let's start. First we need to install a tool named Storm-Breaker developed by ultra security in python. This tool can not only give us location or ip address of the victim but with the help of this tool we can also hack our targets microphone. But for now our main focus is to how to gather ip address of our target. So first power on your linux machine or if you have python installed on your windows machine then it'll run on windows too. Commands: git clone https://github.com/ultrasecurity/storm-breaker.git   cd Storm-Breaker pip3 install -r requirements.txt  Now after installing the requirements.txt file now start the tool python3 st.py, a web portel will open login to that portal by entering " admin : admin " I'm gonna perform this attack on localhost but if you want to perform this attack on LAN then you can use ngrok. So now copy th

What is Open Source Intelligence?

This is my first blog and in this blog i will try to make my readers understand a very famous technique called OSINT, so let's start. What is Open Source Intelligence Technique or OSINT? Open Source Intelligence Technique or OSINT is a technique used to gather information about a company, organization, a person or any product from publicly available sources. It is widely used by many Gov Agencies to spy on neighboring countries and to catch criminals. Osint is not only used by gov's but it is also used by normal peoples but in a different and very normal way. Basically normal people  use osint to find someone on social media platforms,  finding reviews about a product, or to find study notes and all these things we do in our daily life is called OSINT. Osint can be used in various ways like to spy on someone, to uncover something about someone which should not be available publicly, and etc. In osint investigation an investigator uses search engines like Google, Bing, Yahoo an