CIP Cyber

OSINT Tools Worth Sharing

Table of Contents

http://www.ehacking.net/2014/02/osint-tools-worth-sharing.html
P { margin-bottom: 0.08in; }A:link { }
Open source intelligence is the next
big thing, it will change the processes and systems of current
intelligence structure. By looking at broader perspective, we can
easily find the application of OSINT from business intelligence to
security agencies, in short marketing firms, media houses, hackers,
security and military agencies blah blah blah can get benefits out of
from OSINT. But how, when and where to use OSINT ? This is actually a
topic to discuss because if you have a weapon but you don’t know how,
when and where to use, then believe me this weapon is useless.
The answer of how to use open source
intelligence is hidden on the tools and techniques, so in this
article we will cover some great tools that are available in the
market; and you can utilize them to make your hacking practice
efficient (if you know what I mean). Some of the tools listed below
are available on Kali Linux (the successor of backtrack) but if you
are using any other distribution or even Windows OS then you can
download and use them.

H2 { margin-bottom: 0.08in; }H2.cjk { font-family: “Droid Sans”; }H2.ctl { font-family: “FreeSans”; }P { margin-bottom: 0.08in; }A:link { }

Maltego

Maltego is the tool that can gather
information (believe me, it can gather). Maltego is a unique platform
developed to deliver a clear threat picture to the environment that
an organization owns and operates. Maltego’s unique advantage is to
demonstrate the complexity and severity of single points of failure
as well as trust relationships that exist currently within the scope
of your infrastructure. 

H2 { margin-bottom: 0.08in; }H2.cjk { font-family: “Droid Sans”; }H2.ctl { font-family: “FreeSans”; }P { margin-bottom: 0.08in; }A:link { }

SHODAN

SHODAN is a search engine that lets you
find specific computers (routers, servers, etc.) using a variety of
filters. Some have also described it as a public port scan directory
or a search engine of banners.

H3 { margin-bottom: 0.08in; }H3.western { font-family: “Liberation Sans”,sans-serif; }H3.cjk { font-family: “Droid Sans”; }H3.ctl { font-family: “FreeSans”; }P { margin-bottom: 0.08in; }A:link { }

H2 { margin-bottom: 0.08in; }H2.cjk { font-family: “Droid Sans”; }H2.ctl { font-family: “FreeSans”; }P { margin-bottom: 0.08in; }A:link { }

theHarvester

theHarvester is intended to help Penetration testers in the early
stages of the penetration test in order to understand the customer
footprint on the Internet. It is also useful for anyone that wants to
know what an attacker can see about their organization.

The objective of this program is to gather emails, subdomains,
hosts, employee names, open ports and banners from different public
sources like search engines, PGP key servers and SHODAN computer
database.

Now we want to know about your favorite tool, it might be possible that you would not find your tool in the list aforementioned list; but it is not a big deal because it is not a final list. You can share the best tools other than mentioned one. I personally like and enjoy thehavester and maltego, what do you like most ?

CIP Cyber Staff

CIP Cyber Staff

CIP Cyber Staff comprises CIP cybersecurity experts committed to delivering comprehensive information on critical infrastructure protection. The content covers diverse topics, equipping professionals to defend organizations and communities in an ever-evolving cyber landscape.

Most popular

Industrial Cybersecurity

Want always be up to date?

Don't miss the latest news

By subscribing to our mailing list, you will be enrolled to receive our new trainings, latest blog posts, product news, and more.

CIP Training & Certifications

Transform your cybersecurity skills with CIP Cyber’s comprehensive training & course offerings

Related Articles

Best Practices for Open Source Security

Introduction The use of open-source code has been increasing since developers generally use community-built code according to the application functionality and use content-security policies and

Want always be up to date?

Don't miss the latest news

By subscribing to our mailing list, you will be enrolled to receive our new trainings, latest blog posts, product news, and more.

CIP Training & Certifications

Transform your cybersecurity skills with CIP Cyber’s comprehensive training & course offerings