SlideShare a Scribd company logo
3
Most read
5
Most read
6
Most read
OSINT: OPEN
SOURCE
INTELLIGENCE
GATHERING
101
WHAT IS OSINT?
 OSINT stands for Open Source INTelligence
 According to The U.S. Department of Defense (DoD), OSINT is "produced from publicly available
information that is collected, exploited, and disseminated in a timely manner to an appropriate audience
for the purpose of addressing a specific intelligence requirement.
 These methods allow for legal collection and analysis of individuals and organizations.
 OSINT gathering is the widely accepted first step in both security testing and penetration or hacking.
WHERE TO FIND OPEN SOURCE INTELLIGENCE?
 Physical Media: magazine archives, printed
newspapers, radio recordings
 Public Government Data: (applicable to all
levels of government) gov’t reports, FOIA,
directories of contacts
 Internet media: social media, blogs, Youtube
 Commercial sources: software APIs, Open CV
 Google Patent Search
 Unsecured or open directories
BENEFITS OF OSINT
For Individuals
 Verify information prior to blind dates or
online dating sites
 Crime and safety information
 Travel safety
 New or recently enacted ordinances & laws
For Professionals
 Emerging technologies
 Due diligence on potential vendors
 Ensuring culture fit with potential hires
 Competitor markets
 Verified consumer contact information
TOOLS AND FRAMEWORKS TO IMPLEMENT OSINT
Online
 osintframework.com
 Shodan
 Natural language & geek language on search
engines
Operation Systems
 Security focused Linux Operation Systems
 Open source Chromium
 Locally run scripts from sites like github.com
UNCONVENTIONAL METHODS OF OSINT
Public Libraries
 Hold newspaper & magazine archives
 Free Access to commercial contact data sites
like reference USA
 Free access to academic journals and abstracts
Form an LLC or Unaccredited University
 Allowed to collect data within reason
 Free access to certain services for free with a
.edu email address
 Provide analysis services in exchange for
submitted data: see data.com’s old business
model

More Related Content

PPTX
Osint {open source intelligence }
PPTX
Tools for Open Source Intelligence (OSINT)
PDF
OSINT for Attack and Defense
PDF
PPTX
Maltego Information Gathering
PDF
OSINT- Leveraging data into intelligence
PPTX
C language ppt
Osint {open source intelligence }
Tools for Open Source Intelligence (OSINT)
OSINT for Attack and Defense
Maltego Information Gathering
OSINT- Leveraging data into intelligence
C language ppt

What's hot (20)

PDF
Osint presentation nov 2019
PDF
Open Source Intelligence (OSINT)
PDF
Offensive OSINT
PPTX
osint - open source Intelligence
PDF
Open source intelligence information gathering (OSINT)
PPTX
Getting started with using the Dark Web for OSINT investigations
PPT
Open source intelligence
PDF
OSINT - Open Source Intelligence "Leading Intelligence and Investigation Tech...
PDF
What is Open Source Intelligence (OSINT)
PDF
From OSINT to Phishing presentation
PPTX
OpenSourceIntelligence-OSINT.pptx
PPT
Owasp osint presentation - by adam nurudini
PDF
OSINT: Open Source Intelligence - Rohan Braganza
PPTX
Bsides Knoxville - OSINT
PDF
Threat Intelligence
PPTX
How to Use Open Source Intelligence (OSINT) in Investigations
PDF
OSINT with Practical: Real Life Examples
PPTX
Let’s hunt the target using OSINT
PDF
OSINT 2.0 - Past, present and future
Osint presentation nov 2019
Open Source Intelligence (OSINT)
Offensive OSINT
osint - open source Intelligence
Open source intelligence information gathering (OSINT)
Getting started with using the Dark Web for OSINT investigations
Open source intelligence
OSINT - Open Source Intelligence "Leading Intelligence and Investigation Tech...
What is Open Source Intelligence (OSINT)
From OSINT to Phishing presentation
OpenSourceIntelligence-OSINT.pptx
Owasp osint presentation - by adam nurudini
OSINT: Open Source Intelligence - Rohan Braganza
Bsides Knoxville - OSINT
Threat Intelligence
How to Use Open Source Intelligence (OSINT) in Investigations
OSINT with Practical: Real Life Examples
Let’s hunt the target using OSINT
OSINT 2.0 - Past, present and future
Ad

Similar to OSINT: Open Source Intelligence gathering (20)

PPT
1482734.ppt
PDF
Tools and Techniques Used in Open Source Intelligence.pdf
PDF
3i mind-open mind-web
PDF
3i mind-open mind-web
PDF
The Osint Codebook Cracking Open Source Intelligence Strategies Alexandre Deg...
DOCX
OSINT Forum – Week 5For this forum, you are to answer one or mor.docx
PPTX
Session 03 Business Intelligence
DOCX
Steven Greschner - About Me
PDF
What makes OSINT Methodologies Vital for Penetration Testing?
PPTX
Osint - null chennai meetup
PPTX
Osint skills
PPTX
Are you aware of the threat intelligence platform open source?
PDF
Consumers' and Citizens' Privacy
DOCX
Reply to post 1 & 2 with 250 words  each.Post 11.  What va
PDF
File000095
PDF
Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...
DOCX
ESSENTIALS OF Management Information Systems 12eKENNETH C..docx
DOCX
ESSENTIALS OF Management Information Systems 12eKENNETH C.
PDF
Adjusting Your Security Controls: It’s the New Normal
PPTX
Open Source Insight: Happy Birthday Open Source and Application Security for ...
1482734.ppt
Tools and Techniques Used in Open Source Intelligence.pdf
3i mind-open mind-web
3i mind-open mind-web
The Osint Codebook Cracking Open Source Intelligence Strategies Alexandre Deg...
OSINT Forum – Week 5For this forum, you are to answer one or mor.docx
Session 03 Business Intelligence
Steven Greschner - About Me
What makes OSINT Methodologies Vital for Penetration Testing?
Osint - null chennai meetup
Osint skills
Are you aware of the threat intelligence platform open source?
Consumers' and Citizens' Privacy
Reply to post 1 & 2 with 250 words  each.Post 11.  What va
File000095
Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...
ESSENTIALS OF Management Information Systems 12eKENNETH C..docx
ESSENTIALS OF Management Information Systems 12eKENNETH C.
Adjusting Your Security Controls: It’s the New Normal
Open Source Insight: Happy Birthday Open Source and Application Security for ...
Ad

Recently uploaded (20)

PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
cuic standard and advanced reporting.pdf
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Approach and Philosophy of On baking technology
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PPTX
Machine Learning_overview_presentation.pptx
PPTX
Spectroscopy.pptx food analysis technology
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PPTX
A Presentation on Artificial Intelligence
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Electronic commerce courselecture one. Pdf
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Empathic Computing: Creating Shared Understanding
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Reach Out and Touch Someone: Haptics and Empathic Computing
Spectral efficient network and resource selection model in 5G networks
Assigned Numbers - 2025 - Bluetooth® Document
gpt5_lecture_notes_comprehensive_20250812015547.pdf
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
cuic standard and advanced reporting.pdf
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Encapsulation_ Review paper, used for researhc scholars
Approach and Philosophy of On baking technology
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
Machine Learning_overview_presentation.pptx
Spectroscopy.pptx food analysis technology
NewMind AI Weekly Chronicles - August'25-Week II
A Presentation on Artificial Intelligence
“AI and Expert System Decision Support & Business Intelligence Systems”
Electronic commerce courselecture one. Pdf
Building Integrated photovoltaic BIPV_UPV.pdf
Digital-Transformation-Roadmap-for-Companies.pptx
Empathic Computing: Creating Shared Understanding
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf

OSINT: Open Source Intelligence gathering

  • 2. WHAT IS OSINT?  OSINT stands for Open Source INTelligence  According to The U.S. Department of Defense (DoD), OSINT is "produced from publicly available information that is collected, exploited, and disseminated in a timely manner to an appropriate audience for the purpose of addressing a specific intelligence requirement.  These methods allow for legal collection and analysis of individuals and organizations.  OSINT gathering is the widely accepted first step in both security testing and penetration or hacking.
  • 3. WHERE TO FIND OPEN SOURCE INTELLIGENCE?  Physical Media: magazine archives, printed newspapers, radio recordings  Public Government Data: (applicable to all levels of government) gov’t reports, FOIA, directories of contacts  Internet media: social media, blogs, Youtube  Commercial sources: software APIs, Open CV  Google Patent Search  Unsecured or open directories
  • 4. BENEFITS OF OSINT For Individuals  Verify information prior to blind dates or online dating sites  Crime and safety information  Travel safety  New or recently enacted ordinances & laws For Professionals  Emerging technologies  Due diligence on potential vendors  Ensuring culture fit with potential hires  Competitor markets  Verified consumer contact information
  • 5. TOOLS AND FRAMEWORKS TO IMPLEMENT OSINT Online  osintframework.com  Shodan  Natural language & geek language on search engines Operation Systems  Security focused Linux Operation Systems  Open source Chromium  Locally run scripts from sites like github.com
  • 6. UNCONVENTIONAL METHODS OF OSINT Public Libraries  Hold newspaper & magazine archives  Free Access to commercial contact data sites like reference USA  Free access to academic journals and abstracts Form an LLC or Unaccredited University  Allowed to collect data within reason  Free access to certain services for free with a .edu email address  Provide analysis services in exchange for submitted data: see data.com’s old business model