mirror of
https://github.com/Jieyab89/OSINT-Cheat-sheet.git
synced 2025-12-12 07:40:57 -08:00
Add Wiki & Add more resources investigations
This commit is contained in:
49
wiki/Facebook investiagtions.md
Normal file
49
wiki/Facebook investiagtions.md
Normal file
@@ -0,0 +1,49 @@
|
||||
# Detect Fake Facebook Profiles
|
||||
|
||||
- Check the join date
|
||||
|
||||
|
||||
Make sure the joining date is old and has related posts like the first post and look at the relative posts, make sure they are recent
|
||||
|
||||
- There are no posts or photos and other content
|
||||
|
||||
First, look at the detailed account information. If the average number of posts is few and most of them are private or only friends, try to interact with the target by profiling the account
|
||||
|
||||
- Persons age does not accord with the profile content
|
||||
|
||||
Look at posts and photos and what is shared there according to age
|
||||
|
||||
- There are no friends who have the same surname
|
||||
|
||||
There is no list of friendships such as close friends, family related to the target or things the target is interested in
|
||||
|
||||
- Friend lists whose profiles are fake
|
||||
|
||||
Check the friend list, whether the account has the same indicators or patterns as the points explained here. You can see and investigate your friendship list from photos, posts and look for other sources, whether from purchased or fake accounts
|
||||
|
||||
- Use of stock image for profiles
|
||||
|
||||
You can do a reverse image search to determine where the photo came from. If you find this photo circulating a lot on the internet and a little information on the internet, you can be sure that it is fake or generated by AI or editing skill
|
||||
|
||||
- Profile picture do not show face or clear image
|
||||
|
||||
There are no related facial photos and the photos in the album are not clear, such as blurry, depicting logos or cartoon photos and other things
|
||||
|
||||
- Friend lists are different culture, location and language
|
||||
|
||||
- Too few friends or to many friend list
|
||||
|
||||
The account is still quiet or has too many friends. It is possible that a new account was created or the account has been created several times for a specific purpose and is not consistent with the bio and profile linked to the friends list. Try to chat or interact with your friends list, if there is no response and the chat is like a robot reply, you don't follow the fanpage then it's definitely fake
|
||||
|
||||
- Profile name is different to the profile name as in the url
|
||||
|
||||
- The like post, photo are on single topic
|
||||
|
||||
- Bio inconistencies
|
||||
|
||||
Reff:
|
||||
|
||||
- https://www.bellingcat.com/resources/2021/11/01/a-beginners-guide-to-social-media-verification/
|
||||
- https://docs.google.com/spreadsheets/d/18rtqh8EG2q1xBo2cLNyhIDuK9jrPGwYr9DI2UncoqJQ/edit#gid=930747607
|
||||
- https://www.bellingcat.com/resources/2021/11/09/first-steps-to-getting-started-in-open-source-research/?utm_campaign=Digital%20Investigations&utm_medium=email&utm_source=Revue%20newsletter
|
||||
|
||||
20
wiki/How to make collection.md
Normal file
20
wiki/How to make collection.md
Normal file
@@ -0,0 +1,20 @@
|
||||
# How To Make Collection
|
||||
|
||||
- Passive Collection
|
||||
|
||||
Search for information from open information sources. Utilizing information sources from the internet such as Google, Datasets, Scarapping platforms and other things, you can also utilize AI, Big Data and ML for your analysis needs. This is very useful if you want to create further analysis as well as your own private platform
|
||||
|
||||
- Active Collection
|
||||
|
||||
Use of various techniques to search for certain insights or information such as scanning, penetration testing, social engineering and post-exploit. This can be useful for carrying out further, valid and detailed espionage or collecting your data from the source you have hacked
|
||||
|
||||
- Aditional Information
|
||||
|
||||
Why ML, Big Data and AI need? For example for threat intelligence and data mapping
|
||||
|
||||
> Structuring data into ontologies and events
|
||||
> Classifying events and entities, helping human analysts prioritize alerts
|
||||
> Forecasting events and entity properties through predictive models
|
||||
> They were able to make more informed decisions faster
|
||||
> The information they accessed became more relevant and actionable
|
||||
> Their existing security solutions were improved
|
||||
19
wiki/OSINT analysis tips.md
Normal file
19
wiki/OSINT analysis tips.md
Normal file
@@ -0,0 +1,19 @@
|
||||
# OSINT Tips Analysis
|
||||
|
||||
There are still many steps you can do, I can't mention them all, this is a brief scenario that I often do
|
||||
|
||||
- Collection
|
||||
|
||||
This stage the researcher will collect information which are on social media profiles, media images, videos, sounds, education and other things
|
||||
|
||||
- Processing
|
||||
|
||||
Researchers will analyze and validate from data example the images in the post and view the metadata and data that has been collected
|
||||
|
||||
- Exploitation
|
||||
|
||||
At this stage the researcher will carry out sample analysis using Google Maps to do geoint and get pin points from the image. Exploitation also sometimes referred to as analysis e.g with social engineering and other things
|
||||
|
||||
- Production
|
||||
|
||||
Production, in this stage researcher will make a report containing what data researchers can start from the collection, processing and exploitation (analysis) stages and data that has been validated and mature
|
||||
7
wiki/Where OSINT Data From.md
Normal file
7
wiki/Where OSINT Data From.md
Normal file
@@ -0,0 +1,7 @@
|
||||
# Where OSINT Data From?
|
||||
|
||||
- Law Enforcement Sources
|
||||
- Paid Sources
|
||||
- Open Source
|
||||
- Data Breach
|
||||
- Social Engineering & HUMINT
|
||||
9
wiki/Who used OSINT.md
Normal file
9
wiki/Who used OSINT.md
Normal file
@@ -0,0 +1,9 @@
|
||||
# Who OSINT Used
|
||||
|
||||
- Ethical Hacking and Penetration Testing
|
||||
- Journalist
|
||||
- Identifying External Threats
|
||||
- Law Enforcer
|
||||
- Goverment
|
||||
- Company
|
||||
- General
|
||||
Reference in New Issue
Block a user