Add Wiki & Add more resources investigations

This commit is contained in:
Jieyab89
2024-02-06 01:07:19 +07:00
parent b3850fa328
commit a8f6bb6888
6 changed files with 133 additions and 1 deletions

View File

@@ -0,0 +1,49 @@
# Detect Fake Facebook Profiles
- Check the join date
Make sure the joining date is old and has related posts like the first post and look at the relative posts, make sure they are recent
- There are no posts or photos and other content
First, look at the detailed account information. If the average number of posts is few and most of them are private or only friends, try to interact with the target by profiling the account
- Persons age does not accord with the profile content
Look at posts and photos and what is shared there according to age
- There are no friends who have the same surname
There is no list of friendships such as close friends, family related to the target or things the target is interested in
- Friend lists whose profiles are fake
Check the friend list, whether the account has the same indicators or patterns as the points explained here. You can see and investigate your friendship list from photos, posts and look for other sources, whether from purchased or fake accounts
- Use of stock image for profiles
You can do a reverse image search to determine where the photo came from. If you find this photo circulating a lot on the internet and a little information on the internet, you can be sure that it is fake or generated by AI or editing skill
- Profile picture do not show face or clear image
There are no related facial photos and the photos in the album are not clear, such as blurry, depicting logos or cartoon photos and other things
- Friend lists are different culture, location and language
- Too few friends or to many friend list
The account is still quiet or has too many friends. It is possible that a new account was created or the account has been created several times for a specific purpose and is not consistent with the bio and profile linked to the friends list. Try to chat or interact with your friends list, if there is no response and the chat is like a robot reply, you don't follow the fanpage then it's definitely fake
- Profile name is different to the profile name as in the url
- The like post, photo are on single topic
- Bio inconistencies
Reff:
- https://www.bellingcat.com/resources/2021/11/01/a-beginners-guide-to-social-media-verification/
- https://docs.google.com/spreadsheets/d/18rtqh8EG2q1xBo2cLNyhIDuK9jrPGwYr9DI2UncoqJQ/edit#gid=930747607
- https://www.bellingcat.com/resources/2021/11/09/first-steps-to-getting-started-in-open-source-research/?utm_campaign=Digital%20Investigations&utm_medium=email&utm_source=Revue%20newsletter

View File

@@ -0,0 +1,20 @@
# How To Make Collection
- Passive Collection
Search for information from open information sources. Utilizing information sources from the internet such as Google, Datasets, Scarapping platforms and other things, you can also utilize AI, Big Data and ML for your analysis needs. This is very useful if you want to create further analysis as well as your own private platform
- Active Collection
Use of various techniques to search for certain insights or information such as scanning, penetration testing, social engineering and post-exploit. This can be useful for carrying out further, valid and detailed espionage or collecting your data from the source you have hacked
- Aditional Information
Why ML, Big Data and AI need? For example for threat intelligence and data mapping
> Structuring data into ontologies and events
> Classifying events and entities, helping human analysts prioritize alerts
> Forecasting events and entity properties through predictive models
> They were able to make more informed decisions faster
> The information they accessed became more relevant and actionable
> Their existing security solutions were improved

View File

@@ -0,0 +1,19 @@
# OSINT Tips Analysis
There are still many steps you can do, I can't mention them all, this is a brief scenario that I often do
- Collection
This stage the researcher will collect information which are on social media profiles, media images, videos, sounds, education and other things
- Processing
Researchers will analyze and validate from data example the images in the post and view the metadata and data that has been collected
- Exploitation
At this stage the researcher will carry out sample analysis using Google Maps to do geoint and get pin points from the image. Exploitation also sometimes referred to as analysis e.g with social engineering and other things
- Production
Production, in this stage researcher will make a report containing what data researchers can start from the collection, processing and exploitation (analysis) stages and data that has been validated and mature

View File

@@ -0,0 +1,7 @@
# Where OSINT Data From?
- Law Enforcement Sources
- Paid Sources
- Open Source
- Data Breach
- Social Engineering & HUMINT

9
wiki/Who used OSINT.md Normal file
View File

@@ -0,0 +1,9 @@
# Who OSINT Used
- Ethical Hacking and Penetration Testing
- Journalist
- Identifying External Threats
- Law Enforcer
- Goverment
- Company
- General