Tools(OSINT) every security engineer should be aware off

Tools(OSINT) every security engineer should be aware off

We will try to solve three questions in this blog. Let’s explore !!

1. What is OSINT … 2. Why is OSINT … 3. When is OSINT …

What is OSINT ??

If you’ve heard the name but are wondering what it means, OSINT stands for open-source intelligence, which refers to any information that can legally be gathered from free, public sources about an individual or organization.

Quote: “Our life is what our thoughts make it Marcus

Why is OSINT ??

When you are working in the security operations it might be a proactive or reactive environment it doesn’t matter at all. You need to gather information about the attacker in order to restrict/block it is so vital.

What information we will gather mostly from OSINT tools….

IP address, Hash Values,domains,URL’s and file information

Below are some of the OSINT tools and their links …

Virustotal: https://www.virustotal.com/gui/home/upload

AbuseIPDB : https://www.abuseipdb.com/

IBM X-Force Exchange: https://exchange.xforce.ibmcloud.com/

AlienValut: https://otx.alienvault.com/dashboard/new

BGP Tool kit: https://bgp.he.net/

Whois lookup: whois.doamintools.com

check website is malicious/scam: https://www.urlvoid.com/

Site review: https://sitereview.bluecoat.com/

Url testing: https://trustedsource.org/

Sucuri:https://sitecheck.sucuri.net/

Cross-Browser testing: https://www.browserling.com/

Above are some of the OSINT tools…Feel free to add more in the comment section…

When is OSINT used ??

There is no particular time or occasion when we should you these tools, we should always keep some tools in handy. Having a “stethoscope” for a doctor. Having “Photos” for an actor. Having a “ camera” for a cameraman and having “OSINT” tools for a security engineer is that important.


Thanks for reading this far “very much appreciated”. If possible do Follow Me for more stuff like this. Happy Learning !!

Let’s make this world a better place to live. Peace !!

要查看或添加评论,请登录

KARAN KOHALE的更多文章

  • Basic Threat Intelligence Tips: How to Protect Your Business from Cyber Threats

    Basic Threat Intelligence Tips: How to Protect Your Business from Cyber Threats

    As cyber threats become more sophisticated, it's essential for businesses to understand the importance of threat…

  • Learning How To Do Cybersecurity Investigations

    Learning How To Do Cybersecurity Investigations

    This is a curated list of what I’ve learned in the last 1 Year. Most of the analysis comes from LetsDefend.

  • 4 Methods to Bypass two factor Authentication

    4 Methods to Bypass two factor Authentication

    Since the dawn of the World Wide Web, attackers have been involved in discovering techniques to compromise systems…

  • The Dark Web - Part 1

    The Dark Web - Part 1

    Hello folks, it’s been a while. Have you heard of illegitimate buying and selling on the web before? Have you heard…

  • Malware Analysis for Beginners:

    Malware Analysis for Beginners:

    In this exercise, We’ll be performing static and dynamic analysis of brbbot.exe malware to understand it’s behaviour by…

    3 条评论
  • 7 Ways to Check the Data Breach on the Internet!

    7 Ways to Check the Data Breach on the Internet!

    In the early days when the internet was being developed, people were used to struggling to connect over the internet…

  • Email Spoofing - Send Emails using anyone else’s Id

    Email Spoofing - Send Emails using anyone else’s Id

    Hello Hackers! Do you know that about 2.7 million emails are sent every second and a lot are sent in these 10 seconds I…

    3 条评论
  • Persistence Using Windows Terminal “Profiles”

    Persistence Using Windows Terminal “Profiles”

    While doing some research on persistence, I stumbled upon an interesting technique to persist on a windows machine…

  • How to Break Windows Password?

    How to Break Windows Password?

    In this write up we are going to break any windows password. You would be thinking how is it possible, we haven’t heard…

    1 条评论

社区洞察

其他会员也浏览了