OSINT Tutorial to Discover Antivirus of the Target
This OSINT tutorial demonstrates the “RECON-NG tool” on Kali Linux. It discovers the type of Anti-Virus software (AV) the victim is running on their internal
The internet is making the world a much smaller place over the period, allowing millions of users throughout the globe to interact and share digital information, ushering the rest of the world into the ‘digital world.’
Open-source intelligence (OSINT) in the digital world describes all the public data you can access and view.
Images are also incredibly helpful in an OSINT investigation since they can reveal what a target seems like, where the target has been, or any devices that were used.
Researchers can utilize pics to create the intelligence image, discover equipment used to capture photographs, determine where and when photos were taken, and determine if a social media profile relates to a target utilizing search engines and free resources.
This article is a list of tools and tips. It will show you how to look for, obtain, extract, and analyze digital photos.
For the basic image search, we have several search engines like Google, Yandex, TinEye, Baidu, etc.
Gettyimages, and Reuters Pictures are places to look for news or stock photos. Try Instagram, Flickr, or Pinterest for pictures posted on social media.
Let’s try some search engines to see what we can do with an image or discover.
So, I took the random image and upload it on Google search. The search engine showed several similar images and gave the result of the websites having similar pictures.
Figure 1 Google Image Search Engine
So, Yandex is almost similar to Google Image search but with extra features. So, first, upload the image, and as a result, it will give similar images. But also give you all image sizes; It will also show the websites having information about that image. You can also select the image area to crop and search specifically for that.
Figure 2 Yandex Image Search
There are tons of websites and tools available to help us recover the data of an image. Some of which are:
You can install the EXIF tool from the Git repository in Kali Linux. It helps to recover all the metadata related to the image like its image location, creation date, device from which the pic is taken, and so on.
All you need to do is, write the command “exif ImageLocation” on the Kali Linux terminal.
Figure 3 Meta Data of Image
Figure 4 GPS location Meta Data
We can retrieve metadata not only using Kali Linux but also with websites. There are several websites to retrieve image metadata, and one of them is metapicz. You can check the device name, its model number, image creation time, and so on.
Figure 5 Web-based EXIF tool
Two of the websites which can help you to detect image alterations are:
Forensically and FotoForensics is a collection of online digital image forensics tools. It includes Clone identification, error level analysis, metadata retrieval, and other features.
Figure 6 Forensically Image Forensic
Figure 7 FotoForensics Image Forensic
This article explored the different tools and websites to get image-related publically available data. We saw some vital search engines like Google and Yandex. Then tried some advanced tools on Kali Linux, such as ExifTool. We also tried web-based tools like metapicz, fotoforensics, etc.
Industrial Cybersecurity
September 28, 2023
Want always be up to date?
By subscribing to our mailing list, you will be enrolled to receive our new trainings, latest blog posts, product news, and more.
Transform your cybersecurity skills with CIP Cyber’s comprehensive training & course offerings
This OSINT tutorial demonstrates the “RECON-NG tool” on Kali Linux. It discovers the type of Anti-Virus software (AV) the victim is running on their internal
Introduction The use of open-source code has been increasing since developers generally use community-built code according to the application functionality and use content-security policies and
On the online platform, we frequently run upon publicly shared documents. The public is mostly unaware of the document’s data. Initial creation timeline, Last modification
Want always be up to date?
By subscribing to our mailing list, you will be enrolled to receive our new trainings, latest blog posts, product news, and more.
Transform your cybersecurity skills with CIP Cyber’s comprehensive training & course offerings