Open Source Intelligence Scenario and Information Gathering

Gauloran

Moderasyon Ekibi Lideri
7 Tem 2013
8,198
670
In this post, we'll create an open-source intelligence scenario with CTF (OSHINT) on the TryHackMe platform and go through with our scenario practically. Let's start it will be an exciting topic.

OPEN SOURCE INTELLIGENCE SCENARIO AND INFORMATION GATHERING

First of all, let's assume that we have a visual that we don't know by whom, and let's try to get information from this visual. First, when we scan the image in any of the Exif tools, we get the following result.

M918NO.png


We can see the same information when we open our visual with the notepad

CJHObG.png


We see that the copyright of the picture we have analyzed belongs to the name "OWoodflint". When we search this name on Google, the following results are displayed:

KM8aS6.png


the Twitter address of the name is "OWoodflint", a website, and a Github profile were found. Let's go into all of them one by one. First I view the Twitter address.

1SV6f0.png


When we examine user tweets, we see that the physical address of the network card, namely "BSSID" is a shared tweet. When we search this address on "wigle.net", which shows the wireless network map, it shows London.

MNaNxf.png


When we look at his Twitter bio, we learn that he's someone who likes to take pictures, produce open-source projects. And he likes cats. In addition, it's possible to learn about his interests from the profiles he follows. Other than that, there is no remarkable finding on his Twitter account. Let's view the website now.

8edW9S.png


It's clear that the nickname "OWoodflint" belongs to the person named "Oliver Woodflint". Later on the page, there is an article and we can understand Oliver was in New York on the date he shared the article.

Now let's have a look at his Github profile.

Jz0xT9.png


Our friend Oliver shared his e-mail address with us in his Github profile different from our previous information. Good. Thus, we obtained the user's e-mail address from the Github profile. If we create a table of the information we have gathered about the user based on only one picture:

Kod:
Name: Oliver Woodflint
Hometown: London
********: New York
Hobbies and Interests: Photography, Producing Open Source Projects, Cats

Source: https://www.turkhackteam.org/sosyal...k-istihbarati-senaryosu-ve-bilgi-toplama.html
Çevirmen/Translator Gauloran
 
Son düzenleme:
Üst

Turkhackteam.org internet sitesi 5651 sayılı kanun’un 2. maddesinin 1. fıkrasının m) bendi ile aynı kanunun 5. maddesi kapsamında "Yer Sağlayıcı" konumundadır. İçerikler ön onay olmaksızın tamamen kullanıcılar tarafından oluşturulmaktadır. Turkhackteam.org; Yer sağlayıcı olarak, kullanıcılar tarafından oluşturulan içeriği ya da hukuka aykırı paylaşımı kontrol etmekle ya da araştırmakla yükümlü değildir. Türkhackteam saldırı timleri Türk sitelerine hiçbir zararlı faaliyette bulunmaz. Türkhackteam üyelerinin yaptığı bireysel hack faaliyetlerinden Türkhackteam sorumlu değildir. Sitelerinize Türkhackteam ismi kullanılarak hack faaliyetinde bulunulursa, site-sunucu erişim loglarından bu faaliyeti gerçekleştiren ip adresini tespit edip diğer kanıtlarla birlikte savcılığa suç duyurusunda bulununuz.