Skip to content

Information Gathering

OSINT Framework

Maltego

Shodan

Searching Shodan For Fun And Profit

  • city: find devices in a particular city
  • country: find devices in a particular country
  • geo: you can pass it coordinates
  • hostname: find values that match the hostname
  • net: search based on an IP or /x CIDR
  • os: search based on operating system
  • port: find particular ports that are open
  • before/after: find results within a timeframe

Security Header

https://securityheaders.com/?q=leecybersec.com&followRedirects=on

SSL Labs

https://www.ssllabs.com/ssltest/analyze.html?d=leecybersec.com&latest

Social Searcher

https://www.social-searcher.com/social-buzz/?q5=leecybersec.com

Google Hacking

site:leecybersec.com filetype:html
site:leecybersec.com -filetype:html
intitle:"index of" "backup"

Google Hacking Database

Source Code Public

About searching on GitHub

in:file web user:leecybersec
gitleaks -v -r=https://github.com/leecybersec/client-splunk

Netcraft

Netcraft’s DNS search: https://searchdns.netcraft.com

https://searchdns.netcraft.com/?restriction=site+contains&host=.leecybersec.com&position=limited

"site report": https://sitereport.netcraft.com

https://sitereport.netcraft.com/?url=https%3A%2F%2Fleecybersec.com

Recon-ng

marketplace search site
marketplace info recon/domains-hosts/bing_domain_web
marketplace install recon/domains-hosts/bing_domain_web
modules load recon/domains-hosts/bing_domain_web
options set source leecybersec.com

Theharvester

theHarvester -d leecybersec.com -b google

linkedin2username

python3 linkedin2username.py -u 'linkedin-username' -n <domain> -c <company-name>