Osint Report.zip Apr 2026

## 3. Methodology 1. **Planning & Requirements Gathering** – Define search terms, tools, and legal constraints. 2. **Data Collection** – Use the following categories of sources: - **Domain & Infrastructure** – WHOIS, DNS, SSL/TLS, Shodan, Censys, VirusTotal. - **Web & Social Media** – Google Dorking, Bing, DuckDuckGo, Twitter, LinkedIn, Facebook, Instagram, TikTok, Reddit, GitHub, StackOverflow. - **People & Organizations** – Pipl, Spokeo, professional registries, corporate filings, news archives. - **Multimedia** – EXIF metadata extraction, reverse‑image search (TinEye, Google Images), video frame analysis. - **Geolocation** – Google Earth, OpenStreetMap, geotagged social posts. - **Dark Web / Forums** – Ahmia, TorSearch, specialized forums (use caution & legal guidance). 3. **Verification & Correlation** – Cross‑reference data points, timestamp verification, source reliability scoring (e.g., 1‑5). 4. **Analysis** – Apply the CIA triad (Confidentiality, Integrity, Availability) and threat‑modeling frameworks (e.g., ATT&CK, CAPEC). 5. **Reporting** – Compile findings, include evidence (screenshots, URLs, hash values).

---

---

## 5. Findings ### 5.1 Digital Footprint Overview | Asset Type | Identifier | Owner/Contact (if known) | Public Exposure | Comments | |------------|------------|--------------------------|-----------------|----------| | Domain | `example.com` | Registrant: John Doe (privacy‑protected) | Public website, SSL, subdomains | … | | Sub‑domain | `api.example.com` | Same as above | Exposes REST API (no auth) | Potential data leak | | IP Range | `192.0.2.0/24` | ISP: ExampleNet | Visible on Shodan (open ports 22, 80, 443) | … | | Social Account | `@example` (Twitter) | Owner: Jane Smith | 12k followers, 300 tweets | Recent tweet mentions partnership with X | | GitHub Repo | `example/example‑app` | Owner: example | 5 public repos, 1 contains `.env` file | **Sensitive** – contains API keys | | Document | `annual_report_2023.pdf` (found via Google) | Public | Contains executive emails | **PII** exposure |

### 5.2 Notable Indicators of Compromise / Risks | Indicator | Description | Evidence | Risk Level | |-----------|-------------|----------|------------| | **Hard‑coded API key** | `X-API-KEY: abc123…` found in public repo `config.js` | `https://github.com/example/example‑app/blob/main/config.js` | High | | **Exposed Admin Panel** | `https://admin.example.com` reachable without auth | Screenshot (see Appendix A) | Medium | | **Credential Leak** | Email‑password pairs from `data_leak_2024.txt` on Pastebin | `https://pastebin.com/abcd1234` | High | | **Phishing Campaign** | Same domain used in recent phishing emails targeting customers | Header analysis – `Received: from mail.example.com` | Medium | | **Geo‑Tagged Photos** | Instagram posts reveal office interior layout | EXIF GPS coordinates `40.7128, -74.0060` | Low‑Medium | OSINT Report.zip

### 5.3 Reputation & Sentiment Analysis - **Media Coverage (last 12 months):** 15 articles; 9 neutral, 4 positive (product launch), 2 negative (data‑leak). - **Social Sentiment (Twitter, Reddit):** 68 % neutral, 22 % positive, 10 % negative. Main negative topics: “privacy concerns”, “service outage March 2024”.

---

---

*--- End of Report ---*

---

---