• עברית
  • Open source, technological, intelligence, cyberspace, overt

    Open source, technological, intelligence, cyberspace, overt

    Open source intelligence in cyberspace ‎(Overt, Technological)

    Open source intelligence in cyberspace ‎

    The main objective of the intelligence effort is to provide the client with as much information as possible.‎

    Open source intelligence (OSINT) –  collecting information from  open sources (press and electronic media, government-issued information, academic papers, open databases and so forth). OSINT is distinguished from classified intelligence sources. ‎ There is also semi-open source intelligence gathered by diplomatic channels, including ambassadors, military attaches, and others. ‎

    OSINT involves data processing, which includes location, selection, and gathering of data from public resources and analyzing it to produce useful military, political, or business intelligence. ‎

    OSINT includes a wide range of intelligence and sources of intelligence:  Mass ‎

    • Mass media – newspapers, magazines, radio and television‎.
    • Internet communities – and data created by internet users on forums, video clip storage sites, Wiki-based sites, blogs, etc‎.
    • Public information – government reports and official information, such as budgets, demographics, minutes of cabinet and legislature meetings, press conferences, speeches, shipping and aircraft warnings, reports by environmental agencies, government tenders, etc.‎
    • Observation and reporting – amateur aviation reports, reports by airwaves and satellite monitors, online satellite images, etc. ‎
    • Professional and academic sources – professional conferences and public symposiums, unions and associations, scientific literature, etc. ‎
    • Open geospatial information – maps, atlases, seaport and airport plans, aeronautical information, maritime navigation and geodesic data.‎

    Creating intelligence from open sources, in contrast to general research, applies intelligence processes to open sources in order to produce reliable and precise intelligence that will support decision-making on specific questions posed by a person or organization. ‎

    Open source information is handled the same way as intelligence from other sources (such as secret sources).‎

    In contrast to secret intelligence sources, intelligence produced from open sources has great value with regard to its technological aspects, with an emphasis of cyber defense, ‎ since the latter can exploit open source intelligence to identify and close existing loopholes and vulnerabilities in the systems for which it is responsible. ‎

    Links and additional reading material: ‎


    Open source intelligence in cyberspace


    Wikipedia  ‎

    Israel Open source Intelligence Heritage & Commemoration Center‎

    Appendix – concrete example of open source intelligence in a real event

    Hacking team Leak – 06/07/2015

    “Moreover, it is our ESSENTIAL policy that under NO circumstances we confirm or deny allegations: our clients’ privacy and security are of the HIGHEST importance to us”


    On Sunday, Hacking Team was hacked.

    The attackers have published a Torrent file with 400GB of internal documents, source code, and email communications to the public at large.

    In addition, the attackers have taken to Twitter, defacing the Hacking Team account with a new logo, biography, and published messages with images of the compromised data.

    • Implemented PC code to avoid AVG anti-virus
    • Support call recording from:

    o   Skype

    o   WhatsApp

    o   Facebook

    o   Viber

    o   Tencent

    o   Google Talk

    • It seems they have the “Android Exploit Delivery Network” that seems to have a 4-stage Android exploit
    • Have a file “SELINUX_Exploit”

    Installation vectors

    • “Network injection” – SBT solution
    • “Exploit portal” – A way to transform web pages or files to exploits


    • Social Engineering Toolkit

    o   Official website:

    o   Spanish intro:

    o   Linux distribution with security testing tools.

    • Network tools:






    o   Blog and Podcast.

    • Other tools:

    o   Maltego:

    o   Intelligence online tolos:

    o   Nirsoft Windows appes:

    o   Nmap: (Network mapping tool).

    o   Ettercap for man-in-the-middle atacks

    o   Wireshark: (Network protocol analyzer).

    • Exif and metadata:

    o   FOCA:

    o   ExifReader:

    o   ExifTool: and its GUI:

    • Search engines:





    • Spcialized searching engines:

    o PCs, webcams, IPs, geolocation…

    o Check a username in more than 150 services.

    o More services than NameCHK.

    o Similar to image searching of Google.

    • People searching:



    o   Wink

    • Metadata:

    o   Metagoofil ( offimatic document metadata (pdf, doc, xls, ppt, docx, pptx, xlsx).

    o   Libextractor ( Support more formats than Metagoofil but less detailed.

    • Domains:

    o professional watch over domains and contracting holder.

    o reliability analysis and domain visits.

    o check which domains and services share an IP or server.

    • Other:

    o   GooScan ( automatic google searching.

    o   SiteDigger ( from McAfee; like GooScan but also searching in Google cache and revealing vulnerabilities.

    o   OsintStalker (FBStalker & GeoStalker): Collecting info about a person from social network profiles.

    o get locations, dates, etc from social network accounts.

    o   Theharvester: search people/companies information using search engines and social networks

    For more information on cyber security and online cyber learning call now or leave your message and we will get back to you.

    Thinking of becoming a Cyber Specialist? Come and learn from our experts. For more information CLICK HIRE!

    Share this post:

    You might also like:

    cyber world elements Kernelios קרנליוס קורס סייבר ולימודי אבטחת מידע

    What is Cyberspace

    “The physical and logical space in which virtual processes exist which influence physical activity, physical life, and logic interactions.” In the emerging cyberspace, it is

    blue shield on a yellow circle Kernelios Principles for Planning Cyber Defense Systems

    Cyber Defense Systems

    From a multidimensional perspective, it is possible to view defense systems from two interesting points of view: one from an aspect of protecting the information

    Skip to content