OSINT: How To Find Anything About Anyone Online
0 views
Apr 25, 2025
How To Find Anything About Anyone Online. Ready to uncover the secrets of OSINT? 🔍 In this eye-opening video, we'll walk you through the step-by-step process of OSINT: How To Find Anything About Anyone Online**! From social media sleuthing to public records hunts, we've got you covered! Learn the best tools and techniques that even professionals use to gather valuable information safely and ethically. Whether you're a researcher, a journalist, or just curious about digital footprints, this guide empowers you to become a master investigator. Don’t miss out — hit that play button now and unlock the digital world like never before! #OSINT #Privacy #OnlineSafety
View Video Transcript
0:00
wait what if I tell you that you could
0:01
dig deeper legally and uncover the truth
0:03
yourself about the email that seems
0:05
legit but something feels like it could
0:07
be a scam or maybe you have met someone
0:09
online and their story just doesn't add
0:10
up and you want to get every detail Well
0:13
it's policy point again And today we are
0:15
diving into five powerful OSINT tools
0:17
that investigators cyber security pros
0:20
and even hackers use to unmask anyone
0:22
online legally Trust me by the end of
0:24
this video you'll see the internet in a
0:26
whole new light Now before we jump into
0:28
the tools let's talk about OSINT This is
0:30
open-source intelligence Basically it's
0:32
a fancy term for gathering publicly
0:34
available data from the internet whether
0:36
law enforcement ethical hackers and even
0:38
cyber criminals use OSINT to uncover
0:40
information hiding in plain sight And
0:42
here's the kicker You can do this too
0:44
You know that weird moment when a friend
0:45
tags you in a photo from years ago and
0:47
you didn't even remember it existed now
0:49
imagine someone digging through your
0:51
entire online history Things could get
0:53
really awkward Now without further ado
0:55
let's start with our first tool One that
0:56
even hackers fear is Showdan Showdan is
0:59
the search engine for hackers It is like
1:00
Google but instead of searching for
1:02
websites which we usually do on Google
1:04
it searches for devices connected to the
1:06
internet Everything from webcams and
1:07
routers to industrial control systems
1:09
and even smart appliances like your
1:11
smart fridge and TV It scans the
1:13
internet for open ports and services
1:15
indexing all the devices it finds These
1:17
discovered devices often have unsecured
1:19
configurations outdated softwares or
1:21
default passwords What you can do with
1:23
Showdown is you can search for
1:24
vulnerable IoT devices example cameras
1:27
thermostats or even power grids You can
1:29
see the real-time status of each device
1:31
exposed to the internet including
1:32
geoloccation system details and software
1:35
versions You can also identify security
1:37
gaps like open ports or default
1:39
credentials For example in this casino
1:41
thermometer hack attackers found the
1:42
vulnerable thermometer device through
1:44
Showdan in the fish tank and they
1:45
exploited it to breach the network and
1:47
access sensitive data So yeah we can say
1:49
your smart fridge might be smarter than
1:51
you think and not in a good way Now that
1:53
we have covered exposed devices let's
1:55
move on to tracking people That leads us
1:56
to our second tool the harvester The
1:58
harvester is a reconnaissance tool If
2:00
you don't know what reconnaissance is it
2:02
means collecting information about a
2:03
target sometimes with limited
2:05
interaction to clarify could be passive
2:07
or active Where passive recon means no
2:09
direct interaction with the target like
2:11
scanning social media profiles or
2:13
looking for public records where active
2:15
recon involves some level of
2:16
interactions like pinging a server or
2:18
using a tool to gather response from the
2:20
target system So Harvester collects
2:22
publicly available information about
2:24
email addresses subdomains IP addresses
2:27
and employee names associated with a
2:29
company or organization How it works is
2:31
basically to harvest queries from search
2:33
engines like Google Bing and even
2:35
LinkedIn databases and other sources to
2:37
gather intelligence It's a favorite tool
2:39
for penetration testers to assess a
2:41
company's online footprint In a recent
2:43
penetration test researchers uncovered
2:46
over 21 million credentials belonging to
2:48
Fortune 500 companies just from publicly
2:51
indexed sources And guess what it's
2:53
shockingly easy to use Now let's take
2:55
things up a notch with a visual
2:56
representation tool Maltego Maltego is a
2:59
powerful data visualization tool that
3:01
creates relationship graphs It connects
3:03
dots between people organizations
3:05
domains email addresses social media
3:07
accounts and whatnot Maltego pulls data
3:09
from API public records and online
3:12
resources then organizes it into a
3:14
visual network graph These graphs can
3:15
show connections between entities that
3:17
would otherwise be hard to spot For
3:19
example in the Panama Paper scandal
3:21
investigators used similar graph-based
3:23
Osent tools to map out how offshore
3:25
accounts were connected to the shell
3:27
companies and high-profile individuals
3:29
Ever felt like you could be the next
3:30
Sherlock Holmes well with Maltego you
3:32
kind of can But OSINT isn't just about
3:34
maps Sometimes it's about automation
3:36
That leads to our next tool which is
3:38
Spiderfoot It is an automated Osent tool
3:40
that collects a wide variety of
3:42
information about a target from dozens
3:44
of data sources including IP addresses
3:46
domains emails and usernames How it
3:48
works is you can configure Spiderfoot to
3:50
scan for specific types of data like you
3:52
can ask for exposed credentials domain
3:54
information social media activity or
3:56
even data breaches And finally let's
3:58
talk about a tool that anyone can use
4:00
right now Google Docs It refers to the
4:03
advanced search operators that help
4:04
users uncover specific information
4:06
hidden in plain sight It's all about
4:08
crafting clever queries to extract
4:10
sensitive or overlooked data from Google
4:12
Google Docs use commands like file type
4:15
site and entitled to filter searches For
4:17
instance file type xls siteapple.com and
4:20
likewise you can find spreadsheets on a
4:22
specific website Another example
4:24
entitled index of inertial resume This
4:26
query will return results where the word
4:28
rumé appears in the URL of the
4:30
unprotected folder It all depends on
4:32
your creativity and for your information
4:34
You'll find links to all these tools in
4:36
our full ethical hacking guide for
4:37
beginners I put the link in the
4:39
description below What you can do with
4:40
it is you can discover unsecured files
4:42
and sensitive information accidentally
4:44
exposed online plus identify vulnerable
4:46
web servers by searching for default
4:48
configurations So there you have it five
4:50
powerful OSENT tools that can help
4:52
uncover information online But remember
4:54
with great power comes great
4:56
responsibility But wait what if hackers
4:58
are using these same techniques you want
5:00
to learn how hackers exploit these
5:01
methods and most importantly how you can
5:03
protect yourself check out my playlist
5:05
where I break down hacker techniques and
5:07
share practical tips to stay safe Click
5:09
the link now and let's outsmart the bad
5:11
guys together Don't forget to subscribe
5:13
to Policy Points for more informative
5:15
content If you like the effort do like
5:17
this video See you in the next one Until
5:19
then stay safe stay secure and take care
5:21
of
#Computer Security
#Hacking & Cracking
#People Search
#Search Engines
#Web Stats & Analytics