Open-Source Intelligence (OSINT)

Publicly available information used to gather insights about targets in penetration testing.

  • Purpose: Identify company structure, employee details, security weaknesses
  • Key Role: Guides planning and prioritization of deeper tests

Social Media & Job Boards

  • Platforms: LinkedIn, Facebook, X (Twitter), Instagram, Indeed, Glassdoor
  • Insights Gained:
    • Organizational structure & key personnel (new hires, roles)
    • Technology stack & upcoming projects (from job descriptions)
    • Cultural/operational clues (budget cuts, rapid remote-work shifts)
    • Insider threats via disgruntled employees’ posts
  • Examples:
    • LinkedIn posting for “Network Engineer” mentioning Fortinet & Azure → infer tools in use
    • Employee tweet about system upgrade → ideal testing window

Information Disclosures

Unintended exposure of sensitive data online.

  • Vectors:
    • Misconfigured servers (directory listings, status pages)
    • Insecure data storage (public S3 buckets)
    • Faulty application code (verbose errors/logs)
  • Sources: Web apps, APIs, server headers
  • Real Examples:
    • AWS S3 misconfig → 540 M records exposed
    • Error page revealing SQL queries & API keys
  • Mitigations:
    • Use generic error messages, secure log storage
    • Disable directory listing; patch software
    • Harden APIs: enforce auth, sanitize inputs

Cryptographic Flaws

Weaknesses in encryption identified via OSINT.

  • Common Issues:
    • Expired certificates → MITM risk
    • Weak algorithms (e.g., SHA-1) → collision attacks
    • Improper issuance → rogue certificates
  • Tools: OpenSSL, SSL checkers, Certificate Transparency (CT) logs
  • Notable Cases:
    • Symantec misissuance (2013)
    • Egyptian gov’t rogue certs (2017)
    • Apple macOS intermediate CA misconfig (2019)

DNS Lookups

Use dig / nslookup to harvest DNS records (A, CNAME, NS, PTR).

  • Purpose: Map domains ↔ IPs, discover subdomains and hidden hosts
  • Reverse DNS: Verify source of IP traffic (dig -x 8.8.8.8)
  • Attacks:
    • DNS Flood/Amplification (Mirai 2016)
    • Cache Poisoning (Kaminsky 2008)
    • Unauthorized Zone Transfers
  • Defenses: Randomize transaction IDs/ports; restrict AXFR

Certificate Transparency Logs

Public, auditable logs of SSL/TLS certificates (Google initiative).

  • Components:
    • Monitors: detect suspicious certificates
    • Auditors: verify log integrity
  • Benefits:
    • Reveal misissuance & rogue certs
    • Uncover hidden subdomains (e.g., dev.example.com)
  • Revocation Mechanisms: OCSP, CRL, OCSP Stapling

Search Engine Analysis

Leverage advanced operators to pinpoint data.

  • Operators:
    • "" (exact phrase), - (exclude), AND/OR (Boolean)
    • site:, intitle:, inurl:, filetype:
  • Use Cases:
    • Locate sensitive PDFs: site:example.com filetype:pdf "confidential"
    • Exclude drafts: "security report" -draft
  • Additional Tools:
    • Reverse image search (TinEye, Google Images)
    • Google Alerts: continuous monitoring of keywords

Summary: OSINT combines social platforms, web archives, DNS enumeration, certificate transparency, and search-engine techniques to build a stealthy, comprehensive target profile and inform a focused penetration testing strategy.