SOCMINT Tools

Gauloran

Moderasyon Ekibi Lideri
7 Tem 2013
8,198
670
more than half of the world uses social media nowadays and with the increase in usage, some problems come up that require intelligence. SOCMINT, one of the sub-branches of intelligence, deals with these problems.

giphy.gif


SOCMINT is the branch of intelligence that performs intelligence activities in social media. SOCMINT tries to get information about the target person using both social engineering tools (OSINT: open source cyber intelligence)

giphy.gif


Failing when using SOCMINT

It is a possibility to fail when using SOCMINT. Failure can have many consequences. When using SOCMINT, if you are good at the concepts such as fake information, fake self-disclosure then you can be 80% successful. If you can't do these things, it can be a big problem for you. But I'm not saying that we can't be successful without doing the concepts.

Causes of failure:

Account layout is incorrect
Be impetuous
Not believable
Communication problems

this kind of problems are very likely to lead you to failure

giphy.gif


How can we a**** these errors?

1) Account layout

This can be a big problem for you. to prevent this, instead of searching social media, you can gain more followers with tag method, just search these tags #gt #geritakipyapılır etc. well it is also good that you don't have many followers. And share your photos once a month. Accounts with a high number of followers and photos which have been shared recently are very likely to be fake accounts. Edit your bio like a normal person. for example type the team the target person supports. So the target person may notice this :)

2) Be impetuous

If there is one common part in social engineering and socmint, it is patience. If necessary, try to get close to the target person for 2 months and if you have an impatient personality don't get involved in socmint and social engineering.

3) Not believable

you need to be a good liar in socmint and social engineering and there should be no contradictions in your lies.

4) Communication problems

communication is also very important in our daily life. If you don't communicate with effectively, you can't succeed at social enginering and socmint. If the communication cannot be provided, the target person may suddenly not be interested in you or you can stop dealing with the target person thinking that "I can't get information from the man, it isn't worth wasting my time." So, to prevent this, let the target person continue the conversation.

SOCMINT Tools


Kod:
Smallseotools
Tinfoleak
usersearch.org
foller.me
Tweet Mapper
TWINT
Been Verified
Tineye
Pipl.com
Tweetedtrips
Haveibeenpwned.com
intelx.io
Webmii
Collecting emails on LinkedIn

giphy.gif


Smallseotools

This tool detects us if a target's image is fake. After logging into Smallseotools.com, we should find the reverse image search option and upload our image to the page, after the scan the page shows whether the photo is shared in all browsers. Smallseotools doesn't just search for photos, it finds target website ip, correct typos, etc. but is necessary for photo scanning.

Firstly We should go Smallseotools.com. Lots of tools will be waiting for us in the main menu, but we need to find the "Images Editing Tools" section.

us21rc.jpg


Now we enter the "Reverse Image Search" section at the beginning.
It wants us to upload pictures there. we upload our image and click on the image search.

us2KhR.jpg


Finally, you need to select the browser to search. We choose one of these 3 browsers and it finds similar images to us.

us2q8e.jpg


Tinfoleak

The Tinfoleak tool is used for Twitter. Go to Tinfoleak's website, we enter the target person's Twitter name. We type our e-mail address in the space below. Twitter information is sent to us by e-mail 2-3 minutes after the scan.

First, we type Tinfoleak in Google or another browser and log in the first page.

In the main menu, it will ask for the target person's Twitter address and your own email. Let's fill them properly.

us24ly.jpg


After filling it properly, we wait 5 minutes and we receive a mail.
We click on the link in the email and it shows us the information it has collected.

us29EM.jpg


usersearch.org

This tool helps us find the social media accounts of a nick we found. Go to usersearch.org. The search section appears for us to search. and iff you want you can change the search type. (You can also search for social networks, dating sites, email search, phone search)

usUaRe.md.jpg


I select social network search and searched the TurkHackTeam. This is the result,

[url]https://i.imgyukle.com/2020/08/20/usULUP.jpg[/url] [/ IMG]

[B][SIZE="4"][COLOR="red"]foller.me[/COLOR][/SIZE][/B]

This tool does the same work. just like tinfoleak. It helps us to get information about the target person's Twitter account. It shows information such as When he/she joined Twitter, how many reetwets, how many likes, how many tweets, etc. It isn't very difficult to run this tool, after typing foller.me in any browser, after typing the name of the account to be analyzed in the main menu, the information will appear.

[IMG]https://i.imgyukle.com/2020/08/20/usUstp.jpg

Tweet Mapper

It is a tool made for Twitter. This tool shows the ******** of the target person's tweet, but don't get it wrong. It only finds tweets containing ********. Tweet mapper is used to save time. It is very simple to use. If you type "tweet mapper" in Google or another search engine, you'll see it.

We entered Tweet Mapper and the user search section will be waiting for us in the main menu.

usUMYS.jpg


The website gave an account name as an example, I will go through this account. I typed the sample account given to us in the search part and the result was:

usUZvb.jpg


He shared a ******** and showed us this ********. Twitter's company came out as an example

Been Verified

This tool is based on the name, surname, phone number, home address, criminal record, family, etc. However, this tool is to find personal information. This tool is very easy to use as it is useful. After typing Google Been Verified, enter the first website and you will see a field that will ask for your name and surname.

usU6SQ.jpg


After writing the name and surname, It will ask us the victim's ********. Well this is up to you.

usWCWM.jpg


Finally, it will ask us the information type that we are interested in. Click on whatever information you want to know or click on all of them.

Tineye

this tool shows us which websites use the image. We can also think of Smallseotools.com as just a visual search version.

first go to Tineye and we see the search screen in the main menu. You can also scan an image you uploaded as a url if you want.

usW5z8.md.jpg


When we search for the image, it will show us as a result if that image was shared elsewhere. If the image isn't shared on another page, it will give us the error "No Results Found".
Thanks to this website, you can understand whether the opposite account is fake or not.

usWeu0.md.jpg


Pipl.com

It's a tool used to identify the target person's name and surname. The phone number of the target person, the country of residence, family friends, and the photographs taken by the person are displayed... but this tool is often used by company owners for research purposes when recruiting employees. btw this is a paid tool.
Pipl.com has given us an example of how to use it. Let's look at these,

First, we type the name and surname of the person we are looking for in the search field.

usW3pv.jpg


you know many people can have the same name and last name. So, the result given to us is given with photos of the person, thus allowing you to distinguish better.

usW9w8.jpg


Finally, we choose the person we are looking for and information about him is given to us.

useIoe.jpg


Tweetedtrips

This tool shows us where the public posts are made but it requires ******** so we can use it for Twitter accounts that have a specified ******** and are open to the public.
So how do we use Tweetedtrips?

useND0.jpg


As you can see it gives us a search screen but in the menu, we type the target Twitter username and it will be revealed in which ********s the target person shares. (works if ******** feature is turned on)
I searched for a Twitter account with ******** turned on and the result was:

useg8p.jpg


We saw in which ********s he/she shared, we could spend a very long time if we had to do it manually, but thanks to this tool we found in which ******** he/she shared in 2 minutes.

Haveibeenpwned.com

This tool checks your email address for leaks. For example, you have subscribed to a website and you have asked for an e-mail to become a member and you type your e-mail. So if the website have your e-mail address, your e-mail address is at great risk. Thanks to Haveibeenpwned.com, you can find out if our e-mail is at risk.

You can use this website as follows while doing SOCMINT,
If you know the e-mail of the target, you can search this tool and if there is a leak, it will appear in the password.

It is very simple to use. Type "Haveibeenpwned.com" into the search engine, go to the first page that appears.

Intelx.io

Intelx.io is a search engine and data archive. There are many tools on this website (e-mail, phone number, social media, IP address, etc.). There are many query tools. Intelx.io is also available for website archives. (Like the Wayback Machine.)

To use this tool, there are 3 lines and we should click on these lines and select the "Tools" option, and the tools will appear.

useG58.md.jpg


Webmii

Webmi shows us the web pages and social media accounts related to the name and surname. Webmii is completely free tool saves us time in searching for people.
To use webmii, first we type "webmii" in our browser and go to the first page

usemGj.md.jpg


We type the name and surname of our target, I will type "TurkHackTeam" as an example.

useq8A.md.jpg


After typing the name and surname in the search section, we click on the search button and this screen will appear. (5-20 seconds)

useZyQ.jpg


It will show us everything related to the name and surname we searched for. As you can see in the image, social media accounts and videos appeared first. If we went further down, wikipedia and such pages would appear.

Collecting E-Mail Via LinkledIn

The reason we collect e-mails on LinkedIn is to be able to phish the next victim via e-mail. We can also choose our target person on LinkedIn. We will do this with the dork.

First we need to go Google Search section and type this:,
site: Linkedin.com "country, city, university, profession, etc." "@emailadress.com for example: ([email protected])"

use0AP.jpg


As you can see, I searched both the profession and the country and the e-mail addresses of both Brazilians and people interested in the computer programming appeared.

giphy.gif


..So these tools are generally used. By using these tools, you'll collect better information about the target person's social media account and finish your job faster.

giphy.gif


Source (TR): https://www.turkhackteam.org/sosyal-muhendislik/1932995-socmint-araclari.html
Translator Gauloran
 
Son düzenleme:
Üst

Turkhackteam.org internet sitesi 5651 sayılı kanun’un 2. maddesinin 1. fıkrasının m) bendi ile aynı kanunun 5. maddesi kapsamında "Yer Sağlayıcı" konumundadır. İçerikler ön onay olmaksızın tamamen kullanıcılar tarafından oluşturulmaktadır. Turkhackteam.org; Yer sağlayıcı olarak, kullanıcılar tarafından oluşturulan içeriği ya da hukuka aykırı paylaşımı kontrol etmekle ya da araştırmakla yükümlü değildir. Türkhackteam saldırı timleri Türk sitelerine hiçbir zararlı faaliyette bulunmaz. Türkhackteam üyelerinin yaptığı bireysel hack faaliyetlerinden Türkhackteam sorumlu değildir. Sitelerinize Türkhackteam ismi kullanılarak hack faaliyetinde bulunulursa, site-sunucu erişim loglarından bu faaliyeti gerçekleştiren ip adresini tespit edip diğer kanıtlarla birlikte savcılığa suç duyurusunda bulununuz.