Spoiler Spoiler Message
Spoiler Spoiler Message
| Table of contents |
+---------------------------------------------------------------+
| 0x01 INTRODUCTION............................. |
| 0x02 DOXXING INFORMATION..................... |
| 0x03 IP HUNTING............................... |
| 0x04 OSINT TOOLS.............................. |
| 0x05 GOOGLE DORKING........................... |
+---------------------------------------------------------------+
██████╗ ██████╗ ██╗ ██╗██╗ ██╗██╗███╗ ██╗ ██████╗ ██████╗ ██████╗
██╔══██╗██╔═══██╗╚██╗██╔╝╚██╗██╔╝██║████╗ ██║██╔════╝ ╚════██╗ ██╔═████╗
██║ ██║██║ ██║ ╚███╔╝ ╚███╔╝ ██║██╔██╗ ██║██║ ███╗ █████╔╝ ██║██╔██║
██║ ██║██║ ██║ ██╔██╗ ██╔██╗ ██║██║╚██╗██║██║ ██║ ██╔═══╝ ████╔╝██║
██████╔╝╚██████╔╝██╔╝ ██╗██╔╝ ██╗██║██║ ╚████║╚██████╔╝ ███████╗██╗╚██████╔╝
╚═════╝ ╚═════╝ ╚═╝ ╚═╝╚═╝ ╚═╝╚═╝╚═╝ ╚═══╝ ╚═════╝ ╚══════╝╚═╝ ╚═════╝
██████╗ ██╗ ██╗██╗██████╗ ███████╗
██╔════╝ ██║ ██║██║██╔══██╗██╔════╝
██║ ███╗██║ ██║██║██║ ██║█████╗
██║ ██║██║ ██║██║██║ ██║██╔══╝
╚██████╔╝╚██████╔╝██║██████╔╝███████╗
╚═════╝ ╚═════╝ ╚═╝╚═════╝ ╚══════╝
+---------------------------------------------------------------+
| 0x01 INTRODUCTION |
+---------------------------------------------------------------+
+---------------------------------------------------------------+
+---------------------------------------------------------------+
+-----------------------------------------------------------------------+
| What is Doxing? |
| Doxing or Doxxing is the act of publicly revealing |
| previously private person information about an individual |
| or organization, usually through the internet. Methods Employed |
| to acquire such information include searching publicly available |
| databases and social media websites, hacking, and social engineering. |
+-----------------------------------------------------------------------+
+----------------------------------------------------------------------------------
---------------------------------+
| Doxing often involves hackers attempting to embarrass or shame individuals by
publishing confidential information,|
| images or videos obtained from their personal accounts.
|
| Initially, doxxing was used by hackers to "out" the identities of fellow bad
actors/hackers. |
| However, more recently, it has been used to attack users with opposing
viewpoints. |
+----------------------------------------------------------------------------------
---------------------------------+
+---------------------------------------------------------------+
| 0x02 DOXXING INFORMATION |
+---------------------------------------------------------------+
In a doxing attack, hackers might publish someone's:
????Real name
????Telephone number
????Social Security number
????Home address
????Employer
????Personal photographs
1. Celebrity Doxxing
It’s not uncommon for journalists to find out a celebrity’s personal life
information and to publish such gossip on their media platforms.
However, doxxing isn’t your regular entertainment news.
Here, the hacker publishes the celebrity’s sensitive information such as their
payment card info,
email address, social security number or phone numbers.
2. Faulty Doxxing
Sometimes, doxxing is done by internet vigilantes who can’t be bothered to properly
research or investigate their victims to ensure they have the right person.
Instead, they wrongly link people to activities or situations that are unrelated to
them. Due to such “faulty” doxing, hence the name, innocent people face:
reputation loss,
employment loss,
harassment,
physical harm, or
loss of life.
3. Revenge Doxxing
Sometimes, people use doxing as a means of taking revenge.
They publish their enemy’s some publicly identifying information online to cause
them shame.
4. Swatting Doxxing
Another method of doxing is known as “swatting.”
This occurs when a person wrongly accuses someone of a crime and sends police (or a
SWAT team, hence “swatting”) to the victim’s address to cause them harassment.
However, often such doxxing can prove fatal for the victim.
5. Crime Doxxing
While the swatting is done for fun, there are some people that use doxxing to
execute serious crimes like murder.
They reveal their enemies’ personal information online and provoke others to harm
them.
The motive can be personal revenge or showing disagreement or hatred towards any
specific cause, religion, activity or race.
????PHISHING
https://i.imgur.com/UmvkFfl.png
????Facebook Doxing
https://i.imgur.com/4GDJZGd.png
????Instagram Doxing
https://i.imgur.com/UrVUMkp.png
????Email Doxing
https://i.imgur.com/LZJuRJw.png
????Twitter Doxing
https://i.imgur.com/QOxFKIS.png
????Telegram Doxing
https://i.imgur.com/3AKMxUa.png
????LinkedIn Doxing
https://i.imgur.com/rWcLzID.png
????IP Locators
https://i.imgur.com/g8ixeq7.png
????Ip Hunting
https://i.imgur.com/wf83f6i.png
????Vehicles Search
https://i.imgur.com/deGrDH1.png
????Archives Data
https://i.imgur.com/gGsiKQp.png
????Directories
https://i.imgur.com/9ZPxcWB.png
????Mac Address
https://i.imgur.com/KBxoTrU.png
????EXIF Data
https://i.imgur.com/raKnyDv.png
????Company Search
https://i.imgur.com/chfAsf7.png
????Documents Doxing
https://i.imgur.com/tQQt8Af.png
????Crypto Doxing
https://i.imgur.com/OHhNP5v.png
????File Uploader
https://i.imgur.com/apPA8EQ.png
????URL Analysis
https://i.imgur.com/xeRneM8.png
????Fake Mails
https://i.imgur.com/oJxf4fB.png
????Maps Data
https://i.imgur.com/H6mWp9x.png
????Data Leaks
https://i.imgur.com/3BsDhol.png
DBAN https://dban.org
SDelete https://technet.microsoft.com/
en-us/sysinternals/sdelete.aspx
Tool URL
Is doxing is Illegal ?
Doxxing is immoral and illegal,
and if you are discovered bothering individuals and disclosing their personal
information,
you could face serious legal consequences, including imprisonment.
Detecting and prosecuting these types of crimes is often challenging for law
enforcement.
In India you get punishment under IT ACT 2000 for doxing or identity theft.
+---------------------------------------------------------------+
| 0x03 IP HUNTING |
+---------------------------------------------------------------+
IP HUNTING TRICKS 2022
What is IP address?
An IP address is a unique address that identifies a device on the internet or a
local network.
IP stands for "Internet Protocol," which is the set of rules governing the format
of data sent via the internet or local network.
Types of IP addresses
There are different categories of IP addresses, and within each category, different
types.
Consumer IP addresses
Every individual or business with an internet service plan will have two types of
IP addresses:
their private IP addresses and their public IP address. The terms public and
private relate to the network location
— that is, a private IP address is used inside a network, while a public one is
used outside a network.
Private IP addresses
Every device that connects to your internet network has a private IP address.
This includes computers, smartphones, and tablets but also any Bluetooth-enabled
devices like speakers,
printers, or smart TVs. With the growing internet of things, the number of private
IP addresses you have at home is probably growing. Your router needs a way to
identify these items separately,
and many items need a way to recognize each other.
Therefore, your router generates private IP addresses that are unique identifiers
for each device that differentiate them on the network.
Public IP addresses
A public IP address is the primary address associated with your whole network.
While each connected device has its own IP address,
they are also included within the main IP address for your network.
As described above, your public IP address is provided to your router by your ISP.
Typically, ISPs have a large pool of IP addresses that they distribute to their
customers.
Your public IP address is the address that all the devices outside your internet
network will use to recognize your network.
Public IP addresses
Public IP addresses come in two forms – dynamic and static.
Dynamic IP addresses
Dynamic IP addresses change automatically and regularly.
ISPs buy a large pool of IP addresses and assign them automatically to their
customers.
Periodically, they re-assign them and put the older IP addresses back into the pool
to be used for other customers.
The rationale for this approach is to generate cost savings for the ISP.
Automating the regular movement of IP addresses means they don’t have to carry out
specific actions to re-establish a customer's IP address if they move home,
for example. There are security benefits, too, because a changing IP address makes
it harder for criminals to hack into your network interface.
Static IP addresses
In contrast to dynamic IP addresses, static addresses remain consistent.
Once the network assigns an IP address, it remains the same. Most individuals and
businesses do not need a static IP address,
but for businesses that plan to host their own server, it is crucial to have one.
This is because a static IP address ensures that websites and email addresses tied
to it will have a consistent IP address
— vital if you want other devices to be able to find them consistently on the web.
This leads to the next point – which is the two types of website IP addresses.
Shared IP addresses
Websites that rely on shared hosting plans from web hosting providers will
typically be one of many websites hosted on the same server.
This tends to be the case for individual websites or SME websites, where traffic
volumes are manageable,
and the sites themselves are limited in terms of the number of pages, etc. Websites
hosted in this way will have shared IP addresses.
Dedicated IP addresses
Some web hosting plans have the option to purchase a dedicated IP address (or
addresses).
This can make obtaining an SSL certificate easier and allows you to run your own
File Transfer Protocol (FTP) server.
This makes it easier to share and transfer files with multiple people within an
organization and allow anonymous FTP sharing options.
A dedicated IP address also allows you to access your website using the IP address
alone rather than the domain name
— useful if you want to build and test it before registering your domain.
What is IPv4?
IPv4 is an IP version widely used to identify devices on a network using an
addressing system.
It was the first version of IP deployed for production in the ARPANET in 1983.
It uses a 32-bit address scheme to store 2^32 addresses which is more than 4
billion addresses.
It is considered the primary Internet Protocol and carries 94% of Internet traffic.
What is IPv6?
IPv6 is the most recent version of the Internet Protocol.
This new IP address version is being deployed to fulfill the need for more Internet
addresses.
It was aimed to resolve issues that are associated with IPv4. With 128-bit address
space,
it allows 340 undecillion unique address space. IPv6 is also called IPng (Internet
Protocol next generation).
Internet Engineer Taskforce initiated it in early 1994. The design and development
of that suite are now called IPv6.
KEY DIFFERENCE
IPv4 is 32-Bit IP address whereas IPv6 is a 128-Bit IP address.
IPv4 is a numeric addressing method whereas IPv6 is an alphanumeric addressing
method.
IPv4 binary bits are separated by a dot(.) whereas IPv6 binary bits are separated
by a colon(:).
IPv4 offers 12 header fields whereas IPv6 offers 8 header fields.
IPv4 supports broadcast whereas IPv6 doesn’t support broadcast.
IPv4 has checksum fields while IPv6 doesn’t have checksum fields
When we compare IPv4 and IPv6, IPv4 supports VLSM (Variable Length Subnet Mask)
whereas IPv6 doesn’t support VLSM.
IPv4 uses ARP (Address Resolution Protocol) to map to MAC address whereas IPv6 uses
NDP (Neighbour Discovery Protocol) to map to MAC address.
Features of IPv4
Following are the features of IPv4:
Connectionless Protocol
Allow creating a simple virtual communication layer over diversified devices
It requires less memory, and ease of remembering addresses
Already supported protocol by millions of devices
Offers video libraries and conferences
Features of IPv6
Here are the features of IPv6:
Hierarchical addressing and routing infrastructure
Stateful and Stateless configuration
Support for quality of service (QoS)
An ideal protocol for neighboring node interaction
What is IP logger?
IP Logger URL Shortener allows you to track and register IP addresses, GPS
locations.
Step 1. Go to https://iplogger.org.
Step 3: For the purposes of this guide, we will use the URL Shortener. Enter the
URL and click Get Logger Code.
IP Logger URL Shortener - Log and Track IP addressesEnter any URL or link to any
image on the internet to shorten it and track IP addresses and clicks on your
short…
iplogger.org
⭕Grabify
Grabify IP Logger lets you track who clicked on your links. Find IP addresses from
Facebook, Twitter, friends on other sites.
Step 1: go to https://grabify.link
Step 2. Enter the link to the web page on the Grabify website and click the “Create
URL” button
Step 3: Now you will have a new tracking link, similar, for example.
https://grabify.link/GK9OK5 you can use the button below to change the link domain
to another domain that is less recognizable, or you can use your own domain.
Step 4: Save the tracking code or connection link that you will need to get the IP
addresses of those who clicked on your Grabify link.
Grabify IP Logger & URL ShortenerIf you're not sure on how to use this website,
just take a look at this video. Enter a URL that you want Grabify to…
grabify.link
⭕Blasze
Step 1: Go to https://blasze.com
Step 4. Copy the access code that you will need later to get the registered IP
addresses.
https://blasze.com
Whatstheirip
Step 2. Enter your email address and click the “Get Link” button.
Step 4: As soon as your friend clicks on one of the URLs, you will receive an email
with the IP address.
whatstheirip.com
When you know their IP, you’re just a step away from being able to find out their
location, name and other personal information.
And when you know all this information about someone, you can block someone’s
access to your chat room, your content, your website, etc.
Finding out someone’s IP is much easier than it seems at first. In fact, there are
several websites, such as IP Logger and Grabify IP Logger, that can help you do
this quickly and easily.
Here are the steps that you need to follow if you want to know how to get IP
address from Instagram account.
It is obvious that there is no way to really prevent someone from discovering your
IP. However, there is a way to mask your real IP.
If you want your own server to remain invisible to people on the web, the best
thing you can do is get residential IPs.
With residential proxies, you will get a stable, secure and fast connection, as
well as be untouchable for anyone who tries to identify your IP.
When you use residential proxies, nobody will know how to find IP address from
Instagram profile you are using. Instead, they will only be able to detect the
residential IP and its location.
Nonetheless, this doesn’t mean you should use proxies for malicious activities on
Instagram or any other website.
Proxies are there to offer you anonymity when you want to hide your true
geolocation or in similar situations
ip hunting
⚜ There are some different methods that you can use according to your convenience
as a complex is a method,
better will be the result. So read out all the methods discussed below and use any
of them to check out the location of any person by chatting on social sites.
✔️ Tracing IP Address Of Person On Facebook Chat Using Command Prompt
☠ By using the command prompt, you can actually trace out the IP address of a
person whom with you are chatting on facebook. Just
1⃣ First of all, start chatting with your friend whose IP address you want to get
and make sure that all other apps and background process must be stopped. Now press
Win+R of your keyboard.
3⃣ Now at the command prompt that appears type netstat -an and hit enter.
5⃣ Now you need to scan that IP address to know the actual location of the person
that you can check out from http://www.ip-adress.com/ip_tracer/
????To find open ports on a computer, you can use netstat command line.
????To display all open ports, open DOS command, type netstat and press Enter.
????To list all listening ports, use netstat -an |find /i “listening” command.
????To see what ports your computer actually communicates with, use netstat -an |
find /i “established”
????To find specified open port, use find switch. For example, to find if the port
3389 is open or not, do netstat -an |find /i “3389”.
✨ You can use PULIST from the Windows Resource Kit to find which process is using a
specified port. For example, pulist |find /i “4125” may display
This command will let you know if your host is currently available.
This means that when the ping command is executed,
the host will send you a reply if it is connected.To use this command,
just enter the phrase ping with the IP or domain of the site or client. for
example:
2. nslookup
This command has various uses. One of them is finding IP from DNS.
Suppose you know the address of a site but are unaware of its IP.
You can use this command to find out the IP of any site. for example:
nslookup www.google.com
And
3. tracert
With this command, you can get good information about the path that a packet takes
in the network to reach its destination.
This command (trickster) is very useful for routing packets sent to the
destination. Example:
4. arp
This command displays the arp table for you. In this table, IPs and their MAC
equivalent addresses are stored.
If there is an illegal activity on your network and, for example, a network card
has been replaced without your permission,
you can easily find out through this table:
arp -a
And
5. route
This command gives you complete information about the list of network cards,
routing tables, and portals for each:
route print
6. ipconfig
This command provides useful information about your IP and Gateway, the DNS in use,
and the like:
ipconfig
Or
ipconfig / all
And
Also, if you use dynamic IP and want to change your IP, you can do this with the
following commands:
7. netstat
netstat
Displays all ports that are in the listening mode and connects with the DNS name:
netstat -a
netstat -n
netstat -an
The following command also displays all folders shared on the destination computer:
Or
net view computername
Instead of x.x.x.x and computername, you must enter the IP address or computer
name.
8. netuser
This command changes the Windows account password without knowing the previous
password:
Enter Windows username instead of Tarfandestan and enter the new password after
pressing Enter.
And
9. Other commands
After connecting to the destination, use this command if you want to browse the
entire C drive:
command / help
Or
command /?
https://play.google.com/store/apps/details?id=com.truecaller
https://mobilenumbertracker.com/
With this Free API you can detect and block, fraudulent IPs that connect to your
website from a Hosting, Proxy or VPN.
Stop losing money and time in worrying about users who connect to your website or
application fraudulently.
https://www.iphunter.info/
⭕Free IP Stressers⭕
https://www.stressthem.to/booter
https://www.freeboot.to/booter/stress.php
https://www.ipstresser.com/
https://freeddosbooter.com/
https://boot4free.co/
https://freeipstress.com/
https://freestresser.me/
https://topbooter.net/home
https://stressing.ninja/
https://instant-stresser.to/
https://muxbooter.com/
Click on “properties”
You should now be on a screen with something titled “Local Area Connection”, or
something close to that, and,
Double-click on the “Internet Protocol (TCP/IP)” from the list under the “General”
tab
Create an IP address
Press “Tab” and it should automatically fill in the “Subnet Mask” section with
default numbers.
Hit “Ok”
Using a VPN is a safer option where your device acts like it’s on the same network
locally as the VPN.
Thus, you can safely access the network even from another country or browse geo-
blocked sites. Example: NordVPN, Surfshark, Proton VPN, etc.
Using a proxy server provides an intermediary web server through which your traffic
gets routed.
It masks your original IP address and shows the proxy server’s IP address. Example:
Bright Data, Smartproxy, etc.
+---------------------------------------------------------------+
| 0x04 OSINT TOOLS |
+---------------------------------------------------------------+
1. OSINT FRAMEWORK
While OSINT FRAMEWORK isn't a tool to be run on your servers,
it's a very useful way to get valuable information by querying free search engines,
resources, and tools publicly available on the Internet.
They are focused on bringing the best links to valuable sources of OSINT data.
OSINT Framework
2. CheckUserNames
CheckUserNames is an online OSINT tool that can help you to find usernames across
over 170 social networks.
This is especially useful if you are running an investigation to determine the
usage of the same username on different social networks.
It can be also used to check for brand company names, not only individuals.
3. HaveIbeenPwned
HaveIbeenPwned can help you to check if your account has been compromised in the
past.
This site was developed by Troy Hunt, one of the most respected IT security
professionals of this market,
and it's been serving accurate reports since years.
HaveIbeenPwned
4. BeenVerified
BeenVerified is another similar tool that is used when you need to search people on
public internet records.
It can be pretty useful to get more valuable information about any person in the
world when you are conducting an
IT security investigation and a target is an unknown person.
After done, the results page will be displayed with all the people that match the
person's name,
along with their details, geographic location, phone number, etc.
Once found, you can build your own reports.
The amazing thing about BeenVerified it's that it also includes information about
criminal records and official government information as well.
You will be able to find full geographic and technical details about 80 and 443
ports running on any server,
as well as HTTP/S body content & GET response of the target website, Chrome TLS
Handshake, full SSL Certificate Chain information, and WHOIS information.
6. BuiltWith
BuiltWith is a cool way to detect which technologies are used at any website on the
internet.
BuiltWith also lets you find which are the most popular technologies running right
now,
or which ones are becoming trending.
Without any doubt, it is a very good open source intelligence tool to gather all
the possible technical details about any website.
7. Google Dorks
While investigating people or companies, a lot of IT security newbies forget the
importance of using traditional search engines for recon and intel gathering.
In this case, GOOGLE DORKS can be your best friend. They have been there since
2002 and can help you a lot in your intel reconnaissance.
Google Dorks are simply ways to query Google against certain information that may
be useful for your security investigation.
Search engines index a lot of information about almost anything on the internet,
including individual, companies, and their data.
Filetype: you can use this dork to find any kind of filetypes.
Ext: can help you to find files with specific extensions (eg. .txt, .log, etc).
Intext: can perform queries helps to search for specific text inside any page.
Intitle: it will search for any specific words inside the page title.
Inurl: will look out for mentioned words inside the URL of any website.
Log files aren't supposed to be indexed by search engines, however, they do, and
you can get valuable information from these Google Dorks, as you see below:
Google Dorks
Now let's focus on other more practical tools used by the most respected InfoSec
professionals:
8. Maltego
Is an amazing tool to track down footprints of any target you need to match. This
piece of software has been developed by Paterva,
and it's part of the Kali Linux distribution.
Using Maltego will allow you to launch reconnaissance testes against specific
targets.
One of the best things this software includes is what they call 'transforms'.
Transforms are available for free in some cases, and on others, you will find
commercial versions only.
They will help you to run a different kind of tests and data integration with
external applications.
In order to use Maltego you need to open a free account on their website, after
that,
you can launch a new machine or run transforms on the target from an existing one.
Once you have chosen your transforms, Maltego app will start running all the
transforms from Maltego servers.
Finally, Maltego will show you the results for the specified target, like IP,
domains, AS numbers, and much more.
9. Recon-Ng
Recon-ng comes already built in the Kali Linux distribution and is another great
tool used to perform quickly and thoroughly reconnaissance on remote targets.
This web reconnaissance framework was written in Python and includes many modules,
convenience functions and interactive help to guide you on how to use it properly.
The simple command-based interface allows you to run common operations like
interacting with a database,
run web requests, manage API keys or standardizing output content.
Fetching information about any target is pretty easy and can be done within seconds
after installing.
It includes interesting modules like google_site_web and bing_domain_web that can
be used to find valuable information about the target domains.
While some recon-ng modules are pretty passive as they never hit the target
network, others can launch interesting stuff right against the remote host.
Recon-Ng
10. theHarvester
theHarvester is another great alternative to fetch valuable information about any
subdomain names,
virtual hosts, open ports and email address of any company/website.
This is especially useful when you are in the first steps of a penetration test
against your own local network,
or against 3rd party authorized networks. Same as previous tools, theHarvester is
included inside Kali Linux distro.
theHarvester uses many resources to fetch the data like PGP key servers, Bing,
Baidu, Yahoo and Google search engine,
and also social networks like Linkedin, Twitter and Google Plus.
It can also be used to launch active penetration test like DNS brute force based on
dictionary attack,
rDNS lookups and DNS TLD expansion using dictionary brute force enumeration.
11. Shodan
Shodan is a network security monitor and search engine focused on the deep web &
the internet of things.
It was created by John Matherly in 2009 to keep track of publicly accessible
computers inside any network.
Shodan is pretty much like Google, but instead of showing you fancy images and rich
content / informative websites,
it will show you things that are more related to the interest of IT security
researchers like
SSH, FTP, SNMP, Telnet, RTSP, IMAP and HTTP server banners and public information.
Results will be shown ordered by country, operating system, network, and ports.
Shodan users are not only able to reach servers, webcams, and routers.
It can be used to scan almost anything that is connected to the internet,
including but not limited to traffic lights systems, home heating systems,
water park control panels, water plants, nuclear power plants, and much more.
12. Jigsaw
Jigsaw is used to gather information about any company employees.
This tool works perfectly for companies like Google, Linkedin, or Microsoft,
where we can just pick up one of their domain names (like google.com),
and then gather all their employee's emails on the different company departments.
The only drawback is that these queries are launched against Jigsaw database
located at jigsaw.com,
so, we depend entirely on what information they allow us to explore inside their
database.
You will be able to find information about big companies, but if you are exploring
a not so famous startup then you may be out of luck.
13. SpiderFoot
SpiderFoot is one of the best reconnaissance tools out there if you want to
automate OSINT and have fast results for reconnaissance,
threat intelligence, and perimeter monitoring.
This recon tool can help you to launch queries over 100 public data sources to
gather intelligence on generic names,
domain names, email addresses, and IP addresses.
14. Creepy
Creepy is a geo-location OSINT tool for infosec professionals.
It offers the ability to get full geolocation data from any individuals by querying
social networking platforms like Twitter, Flickr, Facebook, etc.
If anyone uploads an image to any of these social networks with geolocation feature
activated,
then you will be able to see a full active mal where this person has been.
Creepy
15. Nmap
Nmap is one of the most popular and widely used security auditing tools, its name
means "Network Mapper".
Is a free and open source utility utilized for security auditing and network
exploration across local and remote hosts.
Host detection: Nmap has the ability to identify hosts inside any network that have
certain ports open, or that can send a response to ICMP and TCP packets.
IP and DNS information detection: including device type, Mac addresses and even
reverse DNS names.
Port detection: Nmap can detect any port open on the target network, and let you
know the possible running services on it.
OS detection: get full OS version detection and hardware specifications of any host
connected.
Version detection: Nmap is also able to get application name and version number.
16. WebShag
WebShag is a great server auditing tool used to scan HTTP and HTTPS protocols. Same
as other tools,
it's part of Kali Linux and can help you a lot in your IT security research &
penetration testing.
You will be able to launch a simple scan, or use advanced methods like through a
proxy, or over HTTP authentication.
Written in Python, it can be one of your best allies while auditing systems.
PORT scan
URL scanning
File fuzzing
Website crawling
In order to avoid getting blocked by remote server security systems,
it uses an intelligent IDS evasion system by launching random requests per HTTP
proxy server,
so you can keep auditing the server without being banned.
17. OpenVAS
OpenVAS (Open Vulnerability Assessment System) is a security framework that
includes particular services and tools for infosec professionals.
This is an open source vulnerability scanner & security manager that was built
after the famous Nessus switched from open source to private source.
Then, the original developers of the Nessus vulnerability scanner decided to fork
the original project and create OpenVAS.
While it is a little bit more difficult to setup than the old Nessus,
it's quite effective while working with it to analyze the security of remote hosts.
18. Fierce
Fierce is an IP and DNS recon tool written in PERL, famous for helping IT sec
professionals to find target IPs associated with domain names.
It was written originally by RSnake along with other members of the old
http://ha.ckers.org/.
It's used mostly targetting local and remote corporate networks.
The results will be ready within a few minutes, a little bit more than when you
perform any other scan with similar tools like Nessus,
Nikto, Unicornscan, etc.
Fierce
19. Unicornscan
Unicornscan is one of the top intel gathering tools for security research.
It has also a built-in correlation engine that aims to be efficient, flexible and
scalable at the same time.
Foca has the ability to analyze and collect valuable data from MS Office suite,
OpenOffice, PDF,
as well as Adobe InDesign and SVG and GIF files. This security tool also works
actively with Google,
Bing and DuckDuckGo search engines to collect additional data from those files.
Once you have the full file list,
it starts extracting information to attempt to identify more valuable data from the
files.
21. ZoomEye
In the cybersecurity world, we researchers are used to popular IoT search engines
such as Shodan or Censys.
For a while, however, a powerful new IoT search engine has been rapidly gaining
followers. We're talking about ZoomEye.
ZoomEye is a Chinese IoT OSINT search engine that allows users to grab public data
from exposed devices and web services.
In order to build its database it uses Wmap and Xmap, and then runs extensive
fingerprinting against all the information found,
ultimately presenting it to users in a filtered and curated way for easy
visualization.
22. Spyse
Spyse is another OSINT search engine that lets anyone grab critical information
about any website in the world.
Quite simply, Spyse is an infosec crawler that gets useful information for red and
blue teams during the reconnaissance process.
Its database is one of the biggest around. Spyse users can access a diverse range
of data including:
23. IVRE
This infosec tool is frequently overlooked, but it has great potential in boosting
your infosec discovery and analysis processes.
IVRE is an open source tool that's built on a base of popular projects like Nmap,
Masscan, ZDNS, and ZGrab2.
Its framework uses these popular tools to gather network intelligence on any host,
then uses a MongoDB database to store the data.
Its web-based interface makes it easy for both beginning and advanced infosec users
to perform the following actions:
24. Metagoofil
Metagoofil is another great intel-reconnaissance tool that aims to help infosec
researchers,
IT managers, and red teams to extract metadata from different types of files, such
as:
doc
docx
pdf
xls
xlsx
ppt
pptx
How does it work? This app performs a deep search on search engines like Google,
focusing on these types of files.
Once it detects such a file, it will download it to your local storage, then
proceed to extract all of its valuable data.
Once the extraction is complete, you'll see a full report with usernames, software
banners, app versions, hostnames and more,
a valuable resource for your recon phase.
Metagoofil also includes a number of options to help you filter the types of files
to search for, refine the results and tweak the output,
among many other useful features.
25. Exiftool
While a lot of OSINT tools focus on data found on public files such as PDF, .DOC,
HTML, .SQL, etc.,
there are other tools that are specifically designed to extract critical Open
Source Intelligence data from image, video and audio files.
Exiftool reads, writes and extracts metadata from the following types of files:
EXIF
IPTC
GPS
XMP
JFIF
And many others
It also supports native files from a wide range of cameras, such as: Canon, Casio,
FujiFilm, Kodak,
Sony, and many others. It's also conveniently available on multiple platforms
including Linux, Windows and MacOS.
+---------------------------------------------------------------+
| 0x05 GOOGLE DORKING |
+---------------------------------------------------------------+
inurl:”.php?cat=”+intext:”Paypal”
This is a basic Google dork code to get info about Paypal credit card.
Simply “inurl:” will filter the Google search results with websites having ” .php?
cat “.
Whereas the intext will filter the search results containing the text”Paypal“.
After searching for the above Google Dork you will get a ton of websites containing
various details about the Paypal payments.
The above Google dork is not only the single and most relevant Google Dork, there
are a lot of others.
inurl:”.php?id=” intext:”Chekout”
inurl:”.php?id=” intext:”/Buy now/”
inurl:”.php?id=” intext:”/store/”
When entering these Google Dorks for credit card details you can get a warning from
Google like below:
Don’t worry, fill the Captcha and you are good to go again.
jection to Login after getting the Google Dorks for credit card detail:
SQL is the common hacking technique used in cracking the logging insecurities.
Injecting a SQL code can bypass the username and password verification by sending a
specific code instead of the real username and password.
Suppose you have got a list of websites using Google dorks which you are gonna use
to get credit card details of people.
Go to the login page of a particular website and instead of entering the Email Id
and password fill both fields with
” or “”=”
After entering the above code press the login button.
If your luck is with you have chances of getting logged in into someone’s account.
Either read my sql article given in telegram channel @its_me_kali_moments
NOTE: Above topic is only for educational purpose and we don’t appreciate any kind
of illegal activities using Google Dorks.
lets break it :
here ==>@its_me_kali
Some of the popular examples for finding websites that are vulnerable to SQL
injection, XSS, API keys etc. are
3. Dork for API keys - intitle:”index of” api_key OR “api key” OR apiKey
Above are the most common examples of finding some common vulnerabilities on the
websites, but this aren’t the limited one.
Still there are many websites that are passing sensitive information using GET
method,
to make it secure you can use the blocking rules. Commonly,
the blocking rules could be setup easily by write some “Disallow” rules at
robots.txt file.
Blocking Rules
While hunting on a private program I found a request where they were using GET
parameter which contained email,
some key, ID, my country name etc. So I tried finding email’s of other users on the
same site and I got some yahoo email ID’s
Dork Used for yahoo : site:target.com inurl:’@yahoo.co’ (which will give me .com
and .co.in) emails of yahoo
Yahoo
I got an excel sheet containing yahoo emails and phone numbers of the users of that
site.
Now I wanted to find some more emails so I enumerated further and got emails of
outlook.live and gmail.com
Outlook
3. Dork Used for gmail : site:target.com inurl:’@gmail.com’
Gmail
Some more useful dorks :
Example :
i) site:target.com inurl:api_key
3. site:”target.com” database.yml
5. inurl:/wwwboard/passwd.txt
This are some of the not so common but useful Google Dorks to find sensitive
information of the website.
You can also modify this dorks and you can also use more dorks with this dorks.
NOTE : You can prevent a page from appearing in Google Search by including a
“noindex” meta tag in the page's HTML code,
or by returning a 'noindex' header in the HTTP request.
site:"anonfile.com" "<giftcards>"
????Images :
????Music :
????Books :
Let’s look at the most popular Google Dorks and what they do.
cache: this dork will show you the cached version of any website, e.g. cache:
itsmekali.com
allintext: searches for specific text contained on any web page, e.g. allintext:
hacking tools
allintitle: exactly the same as allintext, but will show pages that contain titles
with X characters, e.g. allintitle:"Security Companies"
allinurl: it can be used to fetch results whose URL contains all the specified
characters, e.g: allinurl client area
filetype: used to search for any kind of file extensions, for example, if you want
to search for jpg files you can use: filetype: jpg
inurl: this is exactly the same as allinurl, but it is only useful for one single
keyword, e.g. inurl: admin
intitle: used to search for various keywords inside the title, for example,
intitle:security tools will search for titles beginning with “security”
but “tools” can be somewhere else in the page.
inanchor: this is useful when you need to search for an exact anchor text used on
any links, e.g. inanchor:"cyber security"
intext: useful to locate pages that contain certain characters or strings inside
their text, e.g. intext:"safe internet"
link: will show the list of web pages that have links to the specified URL, e.g.
link: microsoft.com
site: will show you the full list of all indexed URLs for the specified domain and
subdomain, e.g. site:securitytrails.com
*: wildcard used to search pages that contain “anything” before your word, e.g. how
to * a website, will return “how to…” design/create/hack, etc… “a website”.
|: this is a logical operator, e.g. "security" "tips" will show all the sites which
contain “security” or “tips,” or both words.
+: used to concatenate words, useful to detect pages that use more than one
specific key, e.g. it itsme+ kali
–: minus operator is used to avoiding showing results that contain certain words,
e.g. its_me_kali will show pages that use “its_me_kali” in their text, but not
those that have the word “Kali”
Google Dork examples
Let’s take a look at some practical examples. You’ll be surprised how easy is to
extract private information from any source just by using Google hacking
techniques.
????Log files????
Log files are the perfect example of how sensitive information can be found within
any website.
Error logs, access logs and other types of application logs are often discovered
inside the public HTTP space of websites.
This can help attackers find the PHP version you’re running, as well as the
critical system path of your CMS or frameworks.
For this kind of dork we can combine two Google operators, allintext and filetype,
for example:
allintext:username filetype:log
This will show a lot of results that include username inside all *.log files.
In the results we discovered one particular website showing an SQL error log from a
database server that included critical information:
inurl:/proc/self/cwd
As you can see in the following screenshot, vulnerable server results will appear,
along with their exposed directories that can be surfed from your own browser.
With the following dork, you’ll be able to explore public FTP servers, which can
often reveal interesting things.
In this example, we found an important government server with their FTP space open.
Chances are that this was on purpose — but it could also be a security issue.
One of the recommended practices is to move these .env files to somewhere that
isn’t publicly accessible. However,
as you will see, there are a lot of devs who don’t care about this and insert their
.env file in the main public website directory.
As this is a critical dork we will not show you how do it; instead, we will only
show you the critical results:
ENV files
You’ll notice that unencrypted usernames, passwords and IPs are directly exposed in
the search results.
You don’t even need to click the links to get the database login details.
With the following dork, you’ll be able to find SSH private keys that were indexed
by uncle Google.
If this isn’t your lucky day, and you’re using a Windows operating system with
PUTTY SSH client,
remember that this program always logs the usernames of your SSH connections.
In this case, we can use a simple dork to fetch SSH usernames from PUTTY logs:
SSH usernames
Email lists
It’s pretty easy to find email lists using Google Dorks. In the following example,
we are going to fetch excel files which may contain a lot of email addresses.
filetype:xls inurl:"email.xls"
Email lists
We filtered to check out only the .edu domain names and found a popular university
with around 1800 emails from students and teachers.
Remember that the real power of Google Dorks comes from the unlimited combinations
you can use.
Spammers know this trick too, and use it on a daily basis to build and grow their
spamming email lists.
Live cameras
Have you ever wondered if your private live camera could be watched not only by you
but also by anyone on the Internet?
The following Google hacking techniques can help you fetch live camera web pages
that are not restricted by IP.
inurl:top.htm inurl:currenttime
intitle:"webcamXP 5"
inurl:"lvappl.htm"
There are a lot of live camera dorks that can let you watch any part of the world,
live.
You can find education, government, and even military cameras without IP
restrictions.
If you get creative you can even do some white hat penetration testing on these
cameras;
you’ll be surprised at how you’re able to take control of the full admin panel
remotely, and even re-configure the cameras as you like.
Live cameras
MP3, Movie, and PDF files
Nowadays almost no one downloads music after Spotify and Apple Music appeared on
the market. However,
if you’re one of those classic individuals who still download legal music, you can
use this dork to find mp3 files:
The same applies to legal free media files or PDF documents you may need:
Weather
Google hacking techniques can be used to fetch any kind of information,
and that includes many different types of electronic devices connected to the
Internet.
In this case, we ran a dork that lets you fetch Weather Wing device transmissions.
If you’re involved in meteorology stuff or merely curious, check this out:
The output will show you several devices connected around the world,
which share weather details such as wind direction, temperature, humidity and more.
weather-wing-device-transmissions
Preventing Google Dorks
There are a lot of ways to avoid falling into the hands of a Google Dork.
These measures are suggested to prevent your sensitive information from being
indexed by search engines.
Protect private areas with a user and password authentication and also by using IP-
based restrictions.
Encrypt your sensitive information (user, passwords, credit cards, emails,
addresses, IP addresses, phone numbers, etc).
Run regular vulnerability scans against your site, these usually already use
popular
Google Dorks queries and can be pretty effective in detecting the most common ones.
Run regular dork queries against your own website to see if you can find any
important information before the bad guys do.
You can find a great list of popular dorks at the Exploit DB Dorks database.
If you find sensitive content exposed, request its removal by using Google Search
Console.
Block sensitive content by using a robots.txt file located in your root-level
website directory.
Using robots.txt configurations to prevent Google Dorking
One of the best ways to prevent Google dorks is by using a robots.txt file. Let’s
see some practical examples.
The following configuration will deny all crawling from any directory within your
website,
which is pretty useful for private access websites that don’t rely on publicly-
indexable Internet content.
User-agent: *
Disallow: /
You can also block specific directories to be excepted from web crawling.
If you have an /admin area and you need to protect it, just place this code inside:
User-agent: *
Disallow: /admin/
This will also protect all the subdirectories inside.
User-agent: *
Disallow: /privatearea/file.htm
Restrict access to dynamic URLs that contain ‘?’ symbol
User-agent: *
Disallow: /*?
To restrict access to specific file extensions you can use:
User-agent: *
Disallow: /*.php$/
In this case, all access to .php files will be denied.
- - - > SITES
World records:
https://phonebookoftheworld.com/
http://www.whitepages.com
http://www.411.com
http://www.zabasearch.com
http://www.intelius.com
http://www.yellowpages.com
http://publicrecords.directory/
http://www.411locate.com
http://www.addresses.com
http://www.spokeo.com
http://www.anywho.com
http://www.peoplefinders.com
http://www.skipease.com
https://www.vetfriends.com/
http://radaris.com
http://www.superpages.com
http://www.advancedbackgroundchecks.com/
https://nuwber.com/
https://www.angloinfo.com/how-to/belgium...irectories
https://europetelephones.com/white_pages
http://1414.be/index.php
https://phonebookoftheworld.com/
https://www.whitepages.be/
http://www.1307.be/
https://www.infobel.com/fr/belgium/
https://www.goldenpages.be/
https://osintframework.com/
https://hunter.io/
UK People Search
https://www.gov.uk/electoral-register/overview
http://www.searchelectoralroll.co.uk/Ele...Search.asp
http://www.192.com
http://webmii.com
http://www.kgbpeople.com
http://www.yasni.com
http://www.peekyou.com/united_kingdom
https://t2a.co/products/people/see_who_l...an_address
http://britishphonebook.com/
http://www.canada411.ca
http://www.freeality.com/whitepages_ca.htm
https://www.canadapost.ca/cpo/mc/persona...de/fpc.jsf
http://world.192.com/north-america/canada
Phone Search
http://www.spydialer.com/
http://www.phonevalidator.com
http://www.fonefinder.net
http://canada.numbers.tel
http://www.infobel.com/en/world
http://www.spokeo.com/reverse-phone-lookup
https://www.phone.instantcheckmate.com/
http://www.freecellphonedirectorylookup.com
http://www.numberway.com/
Username Search
https://www.google.com/advanced_search
https://pipl.com
http://checkusernames.com
http://knowem.com
Picture Search
http://www.tineye.com
https://images.google.com/
http://exifdata.com/
http://geoimgr.com/
Email Search
http://com.lullar.com
http://www.emailfinder.com
http://www.spokeo.com/email-search
http://ctrlq.org/google/images/
http://emailchange.com/
MISC Search
http://www.criminalsearches.com
http://www.advancedbackgroundchecks.com
http://www.usatrace.com
http://www.criminalsearches.com
http://www.abika.com
http://publicrecords.onlinesearches.com
http://www.jailbase.com/en/sources/fl-lcso
http://www.gps-coordinates.net/
http://www.speedguide.net/ip/
http://db-ip.com/
http://www.ipgeek.org/
http://www.onewildworld.co.uk/number.php
https://www.facebook.com/family/LASTNAME...ght=100%25
https://www.cable.co.uk/tools/broadband-speed-test/
https://www.iplocation.net/
http://whatismyipaddress.com/geolocation-accuracy
http://www.proxyornot.com
http://www.infosniper.net
https://www.whois.net
http://www.ip-tracker.org
http://skypegrab.net
http://mostwantedhf.info
http://iphostinfo.com/cloudflare/
http://topsy.com/
http://monitter.com/
http://socialmention.com/
http://knowem.com/
http://twoogel.com/
http://www.yacktrack.com
http://www.samepoint.com/
http://www.whostalkin.com/
Passwords
https://haveibeenpwned.com/
https://www.hacked-db.com/
https://www.leakedsource.com
http://www.hashkiller.co.uk/md5-decrypter.aspx
https://hacked-emails.com
https://breachalarm.com/
https://lastpass.com/adobe/
https://www.peoplesmart.com/
http://www.spokeo.com
http://www.pipl.com
http://www.peekyou.com/
http://www.ipeople.com
http://www.yasni.com
http://www.skipease.com
http://www.peekyou.com
http://www.soople.com
http://Abika.com
http://freeality.com
http://radaris.com
http://www.isearch.com/
http://www.keotag.com/
http://yahoo.intelius.com/
http://www.findermind.com/free-people-search-engines/
http://www.192.com/ (UK)
http://www.phoneebook.co.uk/ (UK)
http://britishphonebook.com (UK)
http://www.searchelectoralroll.co.uk/ (UK)
http://verify-email.org/
http://118.dk (Denmark)
http://www.411.com
http://10digits.us
https://www.dobsearch.com
http://www.birthdatabase.com
http://www.rootsuk.com (UK)
WhitePages Search:
http://www.whitepages.com
http://www.zabasearch.com/
Archives Search:
http://aad.archives.gov/aad/series-list.jsp?cat=GS29
http://www.archive.org/web/web.php
http://www.facebook.com/directory/people/
http://topsy.com/
http://www.twitteraccountsdetails.com
http://socialmention.com/
http://knowem.com/
http://twoogel.com/
http://www.yacktrack.com
http://www.samepoint.com/
http://www.whostalkin.com/
Passwords!:
https://haveibeenpwned.com/
https://www.hacked-db.com/
http://www.hashkiller.co.uk/md5-decrypter.aspx
http://www.freecellphonedirectorylookup.com
http://www.numberway.com
http://www.fonefinder.net
http://www.infobel.com
https://www.number-data.org
http://this-phone-number.com
Public & Criminal Records Search:
http://publicrecords.onlinesearches.com
http://www.jailbase.com/
IP Address:
http://whatstheirip.com
Website:
http://who.is
-----------------------------------------------------------------------------------
-----------
Free booters:
http://www.netbreak.ec
https://www.vbooter.org
Free boxes:
https://store.usps.com/store/browse/subc...g-supplies
Christian spam:
Free bible/Koran:
http://www.islamtomorrow.com/freequran.asp
http://learnaboutislam.org/
http://www.allahsquran.com/free/
http://www.whyislam.org/services/order-literature/
http://www.samplebuddy.com/
http://samples.biofreeze.com/
Ordering food:
https://order.pizzahut.com/home
http://www.dominos.com/
http://www.papajohns.com/
http://www.chick-fil-a.com/
https://www.grubhub.com/
http://eat24hours.com/
Missionary appointment:
http://www.mormon.org.uk/missionaries
Calls:
http://www.prankdial.com/
http://www.hoaxcall.com/
http://www.spoofcard.com/
https://call2friends.com/
Wake up call:
https://wakerupper.com/
http://www.wakeupdialer.com/
Mail spam:
http://www.mailbait.info
http://anonymousemail.me/