Featured image of post Day 9 Open Source Intelligence

Day 9 Open Source Intelligence

This article discusses the use of tools that can help gather information about a target for exploitation or other purposes, such as finding all social media accounts belonging to the target

Main Topics

This article discusses the use of tools that can help gather information about a target for exploitation or other purposes, such as finding all social media accounts belonging to the target.

The author shares the article for learning purposes only and takes no responsibility for any misuse of the information provided.

finduser

One of the tools mentioned is “finduser,” which helps find various usernames from a target’s social media. The installation process involves cloning the tool from GitHub and running it in the command line. The output provides information about the target on different platforms, which can be used for further mitigation according to specific needs.

Finduser installation

~$ git clone https://github.com/mishakorzik/UserFinder

It’s time for us to use this tool

~$ cd finduser

~$ bash finduser

Then this is the result

 1
 2
 3
 4
 5
 6
 7
 8
 9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
santricyber@santricyber:~/UserFinder$ bash UserFinder.sh 
 __   __  ______  _______  ______      _______  ___  __    _  ______   _______  ______ 
|  | |  ||      ||       ||    _ |    |       ||   ||  |  | ||      | |       ||    _ |
|  | |  ||  ____||    ___||   | ||    |    ___||   ||   |_| ||  _    ||    ___||   | ||
|  |_|  || |____ |   |___ |   |_||_   |   |___ |   ||       || | |   ||   |___ |   |_||_ 
|       ||____  ||    ___||    __  |  |    ___||   ||  _    || |_|   ||    ___||    __  |
|       | ____| ||   |___ |   |  | |  |   |    |   || | |   ||       ||   |___ |   |  | |
|_______||______||_______||___|  |_|  |___|    |___||_|  |__||______| |_______||___|  |_|

             .:.:;.. UserFinder v1.0 Developer: misha korzhik ..;:.:.

[>] Input Username: santricyber

[>] Checking username santricyber on global info-stealer: 
[+] No result found

[>] Checking username santricyber on social networks: 
[+] Instagram:  Found! https://www.instagram.com/santricyber
[+] Facebook:  Found! https://www.facebook.com/santricyber
[+] Twitter:  Found! https://www.twitter.com/santricyber
[+] YouTube: Not Found!
[+] Blogger:  Found! https://santricyber.blogspot.com
[+] GooglePlus:  Found! https://plus.google.com/+santricyber/posts
[+] Reddit:  Found! https://www.reddit.com/user/santricyber
[+] Wordpress:  Found! https://santricyber.wordpress.com
[+] Pinterest:  Found! https://www.pinterest.com/santricyber
[+] Github:  Found! https://www.github.com/santricyber
[+] Tumblr: Not Found!
[+] Flickr:  Found! https://www.flickr.com/photos/santricyber
[+] Steam: Not Found!
[+] Vimeo: Not Found!
[+] SoundCloud:  Found! https://soundcloud.com/santricyber
[+] Disqus:  Found! https://disqus.com/santricyber
[+] Medium:  Found! https://medium.com/@santricyber
[+] DeviantART: Not Found!
[+] VK:  Found! https://vk.com/santricyber
[+] About.me: Not Found!
[+] Spotify: Not Found!
[+] MixCloud: Not Found!
[+] Scribd:  Found! https://www.scribd.com/santricyber
[+] Badoo: Not Found!
[+] Patreon: Not Found!
[+] BitBucket:  Found! https://bitbucket.org/santricyber
[+] CashMe:  Found! https://cash.me/santricyber
[+] Behance:  Found! https://www.behance.net/santricyber
[+] GoodReads: Not Found!
[+] Instructables:  Found! https://www.instructables.com/member/santricyber
[+] Keybase:  Found! https://keybase.io/santricyber
[+] Kongregate: Not Found!
[+] LiveJournal: Not Found!
[+] AngelList:  Found! https://angel.co/santricyber
[+] last.fm: Not Found!
[+] Dribbble: Not Found!
[+] Codecademy: Not Found!
[+] Gravatar:  Found! https://en.gravatar.com/santricyber
[+] Pastebin:  Found! https://pastebin.com/u/santricyber
[+] Foursquare:  Found! https://foursquare.com/santricyber
[+] Roblox:  Found! https://foursquare.com/santricyber
[+] Gumroad:  Found! https://www.gumroad.com/santricyber
[+] Newgrounds: Not Found!
[+] Wattpad:  Found! https://www.wattpad.com/user/santricyber
[+] Canva:  Found! https://www.canva.com/santricyber
[+] CreativeMarket:  Found! https://creativemarket.com/santricyber
[+] Trakt: Not Found!
[+] 500px:  Found! https://500px.com/santricyber
[+] Buzzfeed: Not Found!
[+] TripAdvisor:  Found! https://tripadvisor.com/members/santricyber
[+] HubPages: Not Found!
[+] Contently:  Found! https://santricyber.contently.com
[+] Houzz:  Found! https://houzz.com/user/santricyber
[+] blip.fm:  Found! https://blip.fm/santricyber
[+] Wikipedia:  Found! https://www.wikipedia.org/wiki/User:santricyber
[+] HackerNews: Not Found!
[+] CodeMentor: Not Found!
[+] ReverbNation: Not Found!
[+] Designspiration: Not Found!
[+] Bandcamp: Not Found!
[+] ColourLovers:  Found! https://www.colourlovers.com/love/santricyber
[+] IFTTT: Not Found!
[+] Ebay:  Found! https://www.ebay.com/usr/santricyber
[+] Slack: Not Found!
[+] OkCupid: Not Found!
[+] Trip:  Found! https://www.trip.skyscanner.com/user/santricyber
[+] Ello:  Found! https://ello.co/santricyber
[+] Tracky: Not Found!
[+] Tripit:  Found! https://www.tripit.com/people/santricyber#/profile/basic-info
[+] Basecamp: Not Found!
[+] Saved: 

From the above results we get a lot of information about targets on several platforms which we can then do further mitigation, of course we use according to what we need from these assets.

Bug Bounty Helper

Another tool recommended for finding information about a target is a website called “Bug Bounty Helper.” This website is useful for testing website vulnerabilities. It provides a list of vulnerabilities and information that can be obtained from the target website, such as exposed configuration files, database files, login pages, SQL errors, and more. The author also shares some additional web references for doing open-source intelligence (OSINT) activities, including websites for analyzing data, checking phone number owners, Twitter engineering, social engineering, image search, and username verification.

1
https://dorks.faisalahmed.me/

by using this website there are several things that we can get from the target website that we will test the level of vulnerability, including:

 1
 2
 3
 4
 5
 6
 7
 8
 9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36

πŸ” Directory listing vulnerabilities
πŸ” Exposed Configuration files
πŸ” Exposed Database files
πŸ” Find WordPress
πŸ” Exposed log files
πŸ” Backup and old files
πŸ” Login pages
πŸ” SQL errors
πŸ” Publicly exposed documents
πŸ” phpinfo()
πŸ” Finding Backdoors
πŸ” Install / Setup files
πŸ” Open Redirects
πŸ” Apache STRUTS RCE
πŸ” Find Pastebin entries
πŸ” Employees on LINKEDIN
πŸ” .htaccess sensitive files
πŸ” Find Subdomains
πŸ” Find Sub-Subdomains
πŸ” Find WordPress #2
πŸ” Find WordPress [Wayback Machine]
πŸ” Search in GITHUB
πŸ” Search in OpenBugBounty
πŸ” Search in Reddit
πŸ” Test CrossDomain
πŸ” Check in ThreatCrowd
πŸ” Find .SWF file (Google)
πŸ” Find .SWF file (Yandex)
πŸ” Search SWF in WayBack Machine
πŸ” Search in WayBack Machine #2
πŸ” Search in WayBack Machine #3
πŸ” Search in WayBack Machine [List/All]
πŸ” Check in crt.sh
πŸ” Check in CENSYS [IP4] | [DOMAINS] | [CERTS]
πŸ” Search in SHODAN

Then for extras I have some web references for doing OSINT that are quite helpful

1
2
3
4
5
6
7
8
9
https://inteltechniques.com/menu.html   /analisa data menggunakan website ini
https://www.truecaller.com/    cek nama pemilik nomor telepon  
https://inteltechniques.com/menu.html
https://socialbearing.com/        twitter engineering
https://codeofaninja.com/tools/            social engineering
https://www.tineye.com
https://knowem.com/
https://checkusernames.com/     cek username
OSINT https://osintframework.com/

Overall, the article aims to provide readers with tools and resources that can aid in gathering information about targets for cybersecurity purposes. It offers insights into techniques like finding usernames on social media platforms and identifying website vulnerabilities. The author encourages responsible use of the information and hopes that the article will contribute to learning about cyber security.

hope this article helps us to learn cyber security!

comments powered by Disqus
Built with Hugo
Theme Stack designed by Jimmy