Resources to Get Started in OSINT
How should you get started with Open Source Intelligence? Where should you go to learn more about it?
There are so many places to learn that it can be difficult to even think about where to go or what you should do.
βοΈ Core Concepts
- Search smarter, not harder
- Follow digital breadcrumbs
- Never underestimate what someone posts publicly
- OSINT is legalβ¦ but not always ethical β know your boundaries
π§° Tools to Learn First
- Google Dorking β Search like a beast
- Wayback Machine β See deleted or changed websites
- Shodan β Scan the internet for exposed devices
- DNSDumpster β Free domain reconnaissance
- ExifTool β Extract metadata from photos
- Maltego CE β Visualize relationships and entities
- SpiderFoot β Automated open-source intelligence tool
- OSINT Framework β Curated collection of OSINT tools and techniques
π Must-Read OSINT Resources
- Bellingcatβs OSINT Guides β Investigative journalism techniques for open-source analysis
- Bellingcat Toolkit β Tools for online investigations
- Trace Labs β Crowdsourced investigations to help find missing people
- OSINT Industries: Case Studies β OSINT workflows and real-world examples
- Sector035 - Week in OSINT β Weekly roundup of OSINT tools and news
- Intel Techniques Blog β In-depth investigations by Michael Bazzell
- Maltego Blog Master List - Maltego Managed Resources for OSINT Investigators
π― Where to Practice
- What’s My Name β Investigate usernames across hundreds of platforms
- Awesome-OSINT GitHub β Curated list of OSINT tools
- Have I Been Pwned β Look up exposed email/password combinations
- Quiztime β Learn visual verification and geolocation through daily challenges
- OSINT Dojo β Free training, badges, and CTF walkthroughs
- The OSINT Startpage β All-in-one homepage for tools, guides, and news
Β© 2024 Michael Weems