@OSINT_Tactical
πšƒπšŠπšŒπšπš’πšŒπšŠπš• π™Ύπš‚π™Έπ™½πšƒ π™°πš—πšŠπš•πš’πšœπš 𝕏
2 years
🧡1/4: Pivoting: sometimes in #OSINT investigations, you can feel stuck & in a rabbit hole, you feel like you have explored all possible leads. You should make your own Attack surfaces like @sinwindie & take breaks to drink some β˜•οΈ, leave your screen alone and go back to it.
1
22
60

Replies

@OSINT_Tactical
πšƒπšŠπšŒπšπš’πšŒπšŠπš• π™Ύπš‚π™Έπ™½πšƒ π™°πš—πšŠπš•πš’πšœπš 𝕏
2 years
🧡2/4: I was on a target that uses the same username everywhere. I added the target's mobile phone to my contacts list, and then I let snapchat do the work for me. Snapchat proposed the target as a contact and I found a new username which wasn't used before by the target.
1
1
9
@OSINT_Tactical
πšƒπšŠπšŒπšπš’πšŒπšŠπš• π™Ύπš‚π™Έπ™½πšƒ π™°πš—πšŠπš•πš’πšœπš 𝕏
2 years
🧡3/4: Pivoted from the username found & used @whatsmynameproj which is a tool I cherish dearly, which took me to Gravatar. Went into the .json and found the MD5 hash. You may recall this great article by @OsintSupport :
1
4
13
@OSINT_Tactical
πšƒπšŠπšŒπšπš’πšŒπšŠπš• π™Ύπš‚π™Έπ™½πšƒ π™°πš—πšŠπš•πš’πšœπš 𝕏
2 years
🧡4/4: Decrypted the MD5 hash which gave me a new Gmail I hadn't seen the target use before, from the Gmail, pivoted to Ghunt (python tool), @epieos , found a Google Maps with reviews, and did the usual stuff that you do when you have a gmail, a whole new🌎 opened up after thisπŸ•΅οΈ
Tweet media one
1
3
14