Good OSINT is:
- source-driven
- date-aware
- pivot-based
- validated by at least one other source
Bad OSINT is:
- random searching
- trusting screenshots without provenance
- ignoring archive / timeline context
Seed types
- username / handle
- email address
- domain
- company / org name
- phone number
- IP / ASN
- image
- document metadata
- repo / package name
Default order
1. normalize the seed
2. exact-match search
3. alias / variant search
4. archive / historical search
5. technical pivots
6. social / content pivots
7. verify
8. document findings + source + date
02Best Services by Goal
General discovery
Google / Bing / Brave
Use:
- exact phrase search
- operators
- cached snippets
- pivoting from unique strings
Wayback Machine
Use:
- old pages
- deleted content
- previous endpoints
- old staff / contact pages
Infra / domain OSINT
crt.sh# subdomains via CT logsShodan# banners / exposed servicesCensys# cert / host pivotsSecurityTrails# DNS / historical DNS if availableViewDNS# reverse IP / DNS helpers
1. exact search for domain
2. RDAP / WHOIS
3. crt.sh for subdomains
4. Wayback for old paths / robots.txt / JS
5. GitHub search for domain / secrets / emails
6. Shodan / Censys for exposed services
7. docs / PDFs / press releases / old job ads
Starting from a username
1. exact search with quotes
2. Sherlock / WhatsMyName
3. search with site names
4. GitHub / GitLab / package registries
5. avatar / bio / profile reuse
6. related domains / emails / aliases
7. timeline check to verify same person