Abertay Ethical Hacking Society
  • Home
  • Information
    • Constitution
    • Change Logs
      • Website
      • Discord
      • Github
      • Server
    • Meetings
      • 2021-2022
    • Honourary Members
  • Contributing
    • Contributions
      • Using Git
      • Formatting and Best Practise
  • Society Events
    • Securi-Tay
      • History
  • Help Guides
    • Programming / Scripting
      • AWK
      • Bash Scripting
      • C Coding
      • Java Coding
      • LaTeX
      • Markdown
      • Project Ideas
      • Python Scripting
      • Tools
    • Software
      • Operating Systems
        • Installing Arch
        • Installing Kali
        • Linux Commands for Beginners
        • MacOS
      • Tools
        • PGP
          • A guide to using PGP on Android
          • A guide to using PGP on macOS
          • PGP
        • Radare2
        • Nmap
        • Regular Expressions
        • The Browser Exploitation Framework (BeEF)
        • Vim
        • Vimium
        • Zsh
    • Networking
      • Domain Name System (DNS)
      • Remote access to your Abertay network drive
      • Secure Shell (SSH)
      • TLS 1.3
      • Wireshark
      • Subnetting
    • Techniques
      • A guide to creating malicious macro-enabled Excel worksheets
      • Open Source Intelligence (OSINT)
      • Google-Fu
    • Jobs
      • Common Interview Questions
    • Home Lab
      • PiHole
  • Glossary
    • Infosec Terms
    • Computing Terms
    • Hardware Terms
    • General Terms
    • Development Terms
    • Networking Terms
  • Members
    • Profiles
      • AG
      • Isaac
      • Sam
  • Other
    • Other
      • Data Dumps
      • Meetups
      • Meltdown & Spectre
      • Movies
      • Project topic suggestions
      • Recommended Reading
Powered by GitBook
On this page
  • Tools
  • Facebook
  • Twitter
  • Techniques
  • Twitter
  • Facebook

Was this helpful?

  1. Help Guides
  2. Techniques

Open Source Intelligence (OSINT)

PreviousA guide to creating malicious macro-enabled Excel worksheetsNextGoogle-Fu

Last updated 3 years ago

Was this helpful?

TARGET is used to represent the username of the person/ account that you're actually targeting.

Tools

Facebook

  • - “All 'public' info Facebook doesn't let you see”

Twitter

  • (Requires sign in)

  • See devices used to tweet (Requires API keys)

Techniques

Twitter

Birthday

Find Tweets that mention TARGET and contain the words Happy, Birthday, or bday.

https://twitter.com/search?l=&q=Happy%20OR%20Birthday%20OR%20bday%20%40TARGET

Family

Scroll to bottom of:

  • https://twitter.com/TARGET/following

  • https://twitter.com/TARGET/followers

CTRL + F, search for TARGET's last name.

Facebook

Family

https://www.facebook.com/TARGET/friends

If TARGET's friends list is public, search for TARGET's last name via search box.

You probably want to this for accounts with a large number of / .

Stalkscan
Twitter Advanced Search
Social Bearing
Sleeping Time
tweet-device.py
script
followers
following