Key Takeaways
- Everything is Public: OSINT (Open Source Intelligence) only uses public data. It is 100% legal.
- Username Reuse: If a target uses `CoolGuy99` on Reddit, search for `CoolGuy99` on Spotify, eBay, and Tinder.
- Images hold secrets: EXIF data can contain GPS coordinates, and reverse image search finds where else a photo was posted.
Investigators used to need warrants. Now, they just need Google. People voluntarily upload their entire lives to the internet, creating a digital map of their identity.
Technique 1: Google Dorking
Google has hidden search operators that normal people don't use. Hackers use these to find exposed files.
- `site:instagram.com "John Doe"`: Searches ONLY Instagram for that name.
- `filetype:pdf "confidential"`: Searches for PDF files containing the word "confidential".
- `intitle:"webcamXP part"`: Finds unsecured webcams.
Technique 2: Username Enumeration
People are creatures of habit. They reuse usernames.
Tools like Sherlock: You feed it a username, and it checks 500+ websites instantly to see if that user exists. If you find their Strava (fitness app), you can see exactly where they run every morning (and thus, where they live).
The Danger of Photos
Never post a photo of your keys (hackers can duplicate the key from the image). Never post a boarding pass (the barcode contains your full legal name and frequent flyer ID). Even the reflection in your sunglasses can reveal your location.
Technique 3: Reverse Image Search
Use Yandex Images or PimEyes. Yandex is incredibly good at facial recognition. Upload a photo of a stranger, and it might find their LinkedIn profile or an old forum post from 10 years ago.
Frequently Asked Questions (FAQ)
Clean up your footprint.
Read Data Removal Guide