This phase is about reach, casting wide, and staying precise. APIs can automate pulls from social media, search engines, and breach databases, speeding up the initial data collection process.
Always consider language and region. Does your target speak Italian? Use local engines, native platforms, and translation tools that don’t strip context, like ShadowDragon’s multi-language suite for global investigations.
People
Start with people. Search engines are baseline, but you can refine your searches with advanced operators like site:, filetype:, intitle:, and inurl:. Layer in reverse image search tools like TinEye and Google Images to backtrack profile pics or leaked photos.
Social platforms are intelligence goldmines. Tools like Mention monitor activity across networks. Sherlock and Holehe hunt usernames and emails across dozens of platforms. Plug those emails and usernames into HaveIBeenPwned or DeHashed to confirm exposures. For phone numbers, run reverse lookups through Truecaller or Whitepages.
Public records add structure. Tap into sources such as:
- PACER for lawsuits
- Zillow for real estate
- State-level voter rolls
- Genealogy platforms like Ancestry
These sources help to build timelines, verify identities, or reveal family connections.
Organizations
Analyzing an organization’s structure alongside its digital presence and public records can reveal critical insights during OSINT investigations.
For website analysis, investigators begin by examining the organization’s primary domain to collect metadata information as well as backlinks and server details. Use tools like BuiltWith and Netcraft to check technology stacks. The Wayback Machine enables researchers to investigate previous versions of an organization’s website.
Public financial disclosures provide insights into business activities and financial health. The SEC manages the EDGAR database, which serves as a repository for corporate filings. OpenCorporates maintains a directory of worldwide business organizations, and sanctions lists reveal the identities of prohibited companies and individuals.
Social media profiles can map organizational structure and identify important staff members. You can find technical projects and developer contributions through GitHub repositories.
Events
Events and geospatial analysis are key elements in OSINT investigations. Google News collects news articles about specific subjects which allows for rapid access to up-to-date events, while Factiva goes further by providing global news databases. Tap into local news sources to obtain region-specific details that major news platforms frequently overlook.
Verification is crucial. The InVID tool verifies viral content by checking videos and images to reveal false information and validate authenticity during fast-paced news reporting.
Geospatial intelligence adds another layer of analysis:
- Google Earth allows users to access geographic data which helps to analyze terrain and infrastructure.
- Sentinel Hub supplies satellite imagery in real time to track environmental changes and ongoing activities.
- SunCalc functions as a tool for analyzing shadow positions which helps verify timestamps in pictures and videos.
Social media geotags also provide critical location data. ExifTool retrieves metadata from images and videos which reveals location coordinates along with timestamps and details about the capturing device.
Technical systems
Technical systems analysis is a critical aspect of OSINT, focusing on network mapping, DNS exploration, and dark web reconnaissance. Tools like Shodan, Censys, and Nmap enable deep inspection of exposed Internet of Things (IoT) devices, public-facing services, and network configurations.
DNS records also offer valuable insights. Analyzing MX, TXT, and SPF records reveals information about email servers, authentication settings, and domain associations. These details help identify potential weaknesses and track domain ownership.
Dark web monitoring uncovers hidden discussions and leaked data. Pastebin and JustPaste.it are common drop sites for breached information, while Tor forums often provide access to underground markets and hidden discussion boards where sensitive information is traded.