0:01 open source intelligence isn't a modern
0:03 technique it has been around since the
0:05 very beginning in fact during the second
0:06 world war Lieutenant General Samuel B
0:08 Wilson who headed the American defense
0:10 intelligence agency in the 70s made an
0:12 astounding claim that he received 90 of
0:13 intelligence data through open sources
0:15 but what exactly is open source
0:16 intelligence and what does it mean in
0:17 the Modern Age of Technology well in
0:19 simple terms open source intelligence or
0:21 ocean refers to the process of gathering
0:23 publicly available information about a
0:24 person company or an organization from a
0:26 variety of sources that are accessible
0:27 for anyone to see these sources can
0:29 range from social media platforms and
0:30 websites to public records and news
0:32 articles for example let's say you want
0:34 to find out more information about who
0:35 this particular person hangs around with
0:37 but when you go to their Facebook's
0:38 friend list you notice that they've
0:39 hidden or concealed this information so
0:41 what can you do in a scenario like this
0:42 well if you go ahead and open up their
0:44 profile photo cover photo or any other
0:46 post made by them that is set to public
0:47 you can look at the likes or comments to
0:49 possibly get some Clues such as the full
0:50 names of their friends and the people
0:51 they frequently interact with this small
0:53 amount of intelligence that we just
0:54 gathered is called open source
0:55 intelligence now you might be wondering
0:57 that okay so what if we got their full
0:58 names how can we find more about them
0:59 well this is where our first oceans
1:01 technique called Google hacking or
1:02 Google Dorking comes into play but
1:04 before we get into that a quick
1:05 disclaimer while Gathering publicly
1:07 available information is legal using it
1:09 to compromise security or engaging in
1:10 other activities with ill intent can
1:11 still result in trouble real quick this
1:13 video is meant for educational purposes
1:15 only and strongly discourages an ethical
1:17 Behavior anyway coming back to the topic
1:18 Google Dorking involves utilizing Google
1:20 search engine with special search
1:21 operators to find information that may
1:23 not be easily found through regular
1:24 searches for example let's say we're
1:26 looking to purchase a Wireless Wi-Fi
1:27 adapter and we conduct a search on
1:29 Google in this scenario Google will
1:30 present us with wireless adapters
1:31 available on different websites from
1:33 across the globe but what if we
1:34 specifically want to see search results
1:36 from a particular website like Amazon
1:38 well in that case we can employ a
1:39 special search operator called site
1:41 colon followed by amazon.com in the
1:42 search query like this to exclusively
1:44 see search results limited to Amazon
1:45 this practice is essentially what we
1:47 refer to as Google hacking or Google
1:49 Dorking now similarly if you possess the
1:50 full name of your target you can go
1:51 ahead and search for every publicly
1:53 available PDF Excel or Word document
1:55 posted online containing the exact name
1:57 using the file type search operator to
1:58 accomplish this you would first enter
1:59 the victim's name enclosed an inverted
2:01 Comet like this and then write file type
2:03 to specify the types of files you want
2:04 to search for the all research operator
2:06 used here tells the search engine to
2:07 also include Excel and Word Documents in
2:09 the search results after hitting enter
2:10 the search results will display all the
2:12 documents that may be associated with
2:13 the provided name this can be very
2:15 effective as the documents found might
2:16 include court records resumes or other
2:18 official documents that can give insight
2:19 into a person's life the beautiful
2:21 aspect of Google Dorking is that if you
2:22 wish to refine these search results even
2:24 further by targeting a particular
2:25 website such as the victims University
2:27 or workplace you can achieve it by
2:28 incorporating the sitecolon search
2:30 operator we discussed earlier now if you
2:31 would like to experiment with different
2:33 search operators on your own I will
2:34 provide a link to a cheat sheet in the
2:35 description down below that includes
2:37 various search operators specifically
2:38 tailored for open source intelligence
2:40 Additionally you can also visit a
2:41 website called the Google hacking
2:42 database where several people have
2:44 created and posted multiple search
2:46 strings to find juicy information now if
2:47 your victim has a photo of themselves as
2:49 their profile picture you can conduct a
2:50 search for them based on their facial
2:51 features using a fascinating tool called
2:54 demise this tool utilizes AI facial
2:55 recognition to search for the same
2:56 person across the internet and help us
2:58 gather additional information about
2:59 their online presence and if the victim
3:00 has upload did a photograph of
3:02 themselves standing outside next to a
3:03 building or something without providing
3:05 any specific information as to where
3:06 they might be you can head over to
3:08 images.google.com click on search by
3:10 image and upload that photograph to
3:11 initiate a reverse image search by
3:13 analyzing the visual characteristics of
3:14 the image and comparing it to similar
3:16 images across the web Google May provide
3:17 valuable information about where the
3:19 photograph was taken or other related
3:20 details additionally if you couldn't
3:22 find anything using Google images you
3:23 can also explore other tools available
3:25 for conducting reverse image searches by
3:26 searching for them on the Internet next
3:28 if you have managed to obtain the email
3:29 address of your victim through Google
3:31 Dorking or any other means you can also
3:32 conduct a reverse email search on them
3:34 using a useful tool called fbos this
3:35 tool allows you to search for social
3:37 media accounts associated with an email
3:38 address and explore other activities
3:40 carried out by the owner of that email
3:41 such as their contributions to Google
3:43 Maps finding multiple social media
3:45 accounts of our victim is a great way to
3:46 learn more about their interests for
3:48 example a programmer is likely to have
3:49 an active profile on GitHub while an
3:51 artist may have profiles on platforms
3:53 like Pixar or deviantART exploring
3:54 different social media accounts can
3:55 provide valuable insights into the
3:57 Hobby's passions and creative Pursuits
3:59 of an individual when looking for social
4:00 media accounts associated with a person
4:02 there's another fantastic website called
4:04 socialsearcher.com this website allows
4:05 you to perform a comprehensive Google
4:07 search using the victim's full name
4:09 across multiple social media platforms
4:10 simultaneously and save a lot of
4:12 valuable time slash effort you can also
4:14 head over to checkusernames.com and
4:15 search for a specific username on over
4:17 more than 100 social media platforms
4:19 this tool can be very effective as many
4:20 people prefer using a single username
4:22 across the internet similar to feos a
4:24 website called that's that is another
4:25 great tool for finding information on
4:27 both email addresses and phone numbers
4:28 phone numbers can also provide a wealth
4:30 of information when conducting an ocean
4:31 investigation and if you're interested
4:33 in learning more about phonos and
4:34 techniques you can check out my detailed
4:35 video on the topic by clicking the I
4:37 button above Intel techniques by Michael
4:39 basil is also a good resource which
4:40 provides multiple tools to gather
4:41 information about our targets from their
4:43 social media accounts this website
4:44 gathers all the important links in one
4:46 place saving us time that we would
4:47 otherwise spend manually going through
4:49 our targets profiles anyway guys this is
4:51 it for the video now I could go ahead
4:52 and discuss several more tools and
4:54 sources that can be utilized for finding
4:55 information about someone but I want to
4:56 encourage you to visit the ocean
4:58 framework yourself and explore the
4:59 multiple tools available there if you
5:01 have any questions regarding the video
5:02 make sure to ask them in the comments
5:04 section below and I will see you in the