In this tutorial, we will explore the art of Open Source Intelligence (OSINT) and how it can be employed to collect personal information about a target, all without requiring any programming skills. We will outline simple steps and provide links to tools that can aid in the process.
Step 1: Gathering Basic Information
Begin by obtaining the target's full name. To delve deeper, you can use Google Dorks to unearth additional details. Follow these steps:
- Search the target's full name using double inverted commas on Google, like this: "Target Full Name."
OR
- Access https://www.idcrawl.com/target-full-name to compile basic information about the target.
OR
- If you have an image of the target person then you should try Pimeyes (Paid) or Faceidcheck (Free)
Step 2: Obtaining Usernames, Email Addresses, and Phone Numbers
Once you have collected the target's basic information, you can further investigate by retrieving their username, email address, and phone number. Follow these steps for each:
X - For usernames, refer to Holehe
Y - For email addresses, utilize GHunt
Z - To obtain phone numbers, explore Moriarty-Project
Step 3: Advanced Information Gathering
For more complex data collection tasks involving IP addresses, web URLs, and breached email accounts, consider using the versatile tool, [SpiderFoot](https://github.com/smicallef/spiderfoot).
Step 3: Find places using reverse image search through Google, Yandex (Best) and Bing.
Step 1: Gathering Basic Information
Begin by obtaining the target's full name. To delve deeper, you can use Google Dorks to unearth additional details. Follow these steps:
- Search the target's full name using double inverted commas on Google, like this: "Target Full Name."
OR
- Access https://www.idcrawl.com/target-full-name to compile basic information about the target.
OR
- If you have an image of the target person then you should try Pimeyes (Paid) or Faceidcheck (Free)
Step 2: Obtaining Usernames, Email Addresses, and Phone Numbers
Once you have collected the target's basic information, you can further investigate by retrieving their username, email address, and phone number. Follow these steps for each:
X - For usernames, refer to Holehe
Y - For email addresses, utilize GHunt
Z - To obtain phone numbers, explore Moriarty-Project
Step 3: Advanced Information Gathering
For more complex data collection tasks involving IP addresses, web URLs, and breached email accounts, consider using the versatile tool, [SpiderFoot](https://github.com/smicallef/spiderfoot).
Step 3: Find places using reverse image search through Google, Yandex (Best) and Bing.