“all i did was google their username and now i know their blood type, favorite anime, and who they kissed in 2008”
— some cursed OSINT gremlin probably
okay kids. gather 'round the glow of your dusty monitor.
today we're gonna talk about OSINT which is short for Open Source Intelligence, long for holy shit i didn’t realize people leaked this much info just by existing on the internet.
this is a full guide. not one of those "just use Maltego" copouts. we're gonna get weird. you're gonna learn too much. let’s go.
osint is the hacker’s version of digital stalking, except you do it with style and sometimes a warrant. it’s about taking publicly available info — google results, social media, public records, metadata, whatever — and using it to piece together someone’s life, infrastructure, or shady little secrets.
you’re not breaking in. you’re just... looking. and noticing what no one else bothered to hide.
here’s your standard issue OSINT starter pack:
| Tool | Use |
|---|---|
Google | lol yeah. seriously. search dorks go brr |
whois | domain info. sometimes emails, names, addresses. ancient magic. |
hunter.io | emails tied to domains. great for corp recon. |
Shodan | search engines for exposed devices. routers, cameras, fridges. it’s haunted. |
Censys | like Shodan but more academic. SSL certs, banners, etc. |
archive.org | wayback machine. the internet never forgets your 2013 tumblr. |
haveibeenpwned.com | check if someone’s email got leaked in a breach. password reuse party. |
ExifTool | metadata stripper. sometimes people upload GPS-tagged images. like clowns. |
GHunt | for stalking google accounts. email, photos, calendars, chrome sync data. |
Sherlock | find username across 500+ sites. username == fingerprint. |
Spiderfoot | all-in-one OSINT platform. if you’re lazy but still want results. |
most people fail at OSINT because they treat it like a checklist. it’s not. it’s a game of inference.
you want to know what school someone goes to? don’t google “john smith college”. look at:
you gotta be curious and stubborn and just a little nosy.
let me tell you about a guy named tim. not real name, but whatever.
tim ran a scammy dropshipping store and thought he was anonymous.
but tim:
five steps later, i had his real name, address, and his dog’s name.
tim is not very smart. don’t be tim.
ok let’s say someone gives you just a username: cryptodaddy420
here’s how to unravel that mess:
run it through:
sherlockwhatsmyname.applook for:
once you get an email, check:
haveibeenpwnedfind their profile pic. reverse image search it on:
if they ever uploaded it as an original photo, run it through:
exiftool cryptodaddy420.jpglook for GPSLatitude, Camera Model, or even software used to edit it.
some filters leave signatures (e.g., VSCO, Snapseed, etc.)
track their friends. search their usernames. who follows who. who comments. this is called pivoting, and it’s the heart of OSINT.
people don’t exist alone. stalk the friends, the exes, the burner accounts.
whois the domainsecuritytrailsnmapcrt.sh and amasswhatweb or wappalyzer to fingerprint tech stackview-source: and see if they hardcoded an email or tracking IDyou’re gonna want to be sneaky, especially if you’re poking around shady people or forums.
remember: the watcher can be watched back.
site:linkedin.com "cryptodaddy420"
intitle:"index of" "bitcoin wallet"
filetype:pdf resume "john smith"
transliterate their name. look in VK, Weibo, whatever fits.
don’t be a creep. don’t harass people.
do this for learning, for CTFs, for OSINT challenges, or as part of legit infosec work.
if you’re doing it to feel powerful, you're just a nerd with too much time.
if you're doing it to help protect people or understand your own footprint, that's ✨chef's kiss✨.
if you read this and thought oh god this could be done to me, yep.
go:
exiftool -all= img.jpg)go forth and stalk responsibly.
— Dasho
“i know what brand of cereal you eat. fix your opsec.”