OSINT

Intelligence Lifecycle

  1. Planning and Direction
  2. Collection
  3. Processing and Exploitation
  4. Analysis and Production
  5. Dissemination and Integration

You might need to go back and forth between the steps as you learn more about the data.

Planning and Direction

Identifying the Requirements The first step in the OSINT cycle involves planning the priorities and requirements for the mission. Prior to collecting OSINT, operators should have a clear understanding of the types of information they need, how to find those sources, and what they hope to accomplish with the acquired information. These precautionary logistics will guarantee the productivity and efficiency of the operation during the next phases of the OSINT cycle.  

Who is the target? What is the target? Why are they the target? When are they the target? For each target you have to collect every type and bit of information and connect all the dots, and discover where to go next with that information until you have a complete map.

Collection

Gathering of Intelligence Data After proper planning has occurred, the collection of OSINT can begin. OSINT resources include any materials that are freely available online, such as news articles, social media posts, and blogs. Teams can utilize their preferred collection tools and resources to obtain this data. If your operations could benefit from OSINT training, check out our remote sessions on OSINT, which are held semimonthly by our expert cyber analysts at Ntrepid Academy.

Processing and Exploitation

Federation of Data into Usable Format Once you’ve acquired your data, you can start processing the information. Then, you’ll want to compile it into a common evidence repository, timeline, or report. In this stage, you’re simplifying the content you’ve found and making it legible for the recipients of the data. Processing the data will help analysts utilize the information more efficiently in the following steps of the OSINT cycle.

Analysis and Production

Conversion of information into Intelligence After the initial processing of the collected data, your teams will then need to perform an in-depth analysis of the information. This is a crucial step in the OSINT cycle. as it will allow your teams to use the data they’ve acquired to interpret and anticipate events. Operators can organize their analyzed information into a detailed document or presentation, which will be read by a designated audience.

Dissemination and Integration

Distribution of Intelligence to Relevant Parties The final step in the OSINT cycle entails delivering the collected and analyzed intelligence to the proper stakeholders. Analysts then receive feedback, which dictates whether the OSINT cycle should begin again.

OSINT Tools

List of OSINT Exercises
gralhix.com/list-of-osint-exercises

osintframework.com
github.com/lockfale/osint-framework
OSINT framework focused on gathering information from free tools or resources. The intention is to help people find free OSINT resources. Some of the sites included might require registration or offer more data for $$$, but you should be able to get at least a portion of the available information for no cost.

cylect.io
The ultimate AI OSINT tool that integrates multiple databases and simplifies their search capability into an easily navigable interface, providing a comprehensive solution to help with your specific data needs.

Note: There are a lot more tools listed throughout each section so not all of them are found in these links. For a specific type of OSINT tool or method, check the menu on the left.

From “Hacker News” on ycombinator - Mastering Osint: How to Find Information on Anyone
news.ycombinator.com/item?id=41231145

-> Social media tools
-> Websites tools
-> Other website tools
-> Command line tools

github.com/smicallef/spiderfoot - SpiderFoot can be used offensively (e.g. in a red team exercise or penetration test) for reconnaissance of your target or defensively to gather information about what you or your organization might have exposed over the Internet.

github.com/Moham3dRiahi/Th3inspector - All in one tool for Information Gathering.

github.com/shellfarmer/WeakestLink - Browser extension for extracting data (be careful with it).

github.com/OhShINT/ohshint.gitbook.io/Lists_of_OSINT_Web_Resources - Complete List of OSINT Web Resources

github.com/jivoi/awesome-osint - A curated list of amazingly awesome open source intelligence tools and resources. Open-source intelligence (OSINT) is intelligence collected from publicly available sources. In the intelligence community (IC), the term “open” refers to overt, publicly available sources (as opposed to covert or clandestine sources)

github.com/topics/osint-tools - 130 osint-tools

github.com/cipher387/osint_stuff_tool_collection - 1000+ services for a wide variety of purposes. Don’t forget that OSINT’s main strength is in automation. Read the Netlas Cookbook for details and examples.