I. OSINT TOOLS COMPARISON
Depending on the user needs (see TABLE 10), some tools
will be more suitable than others for a given task.
Thus, if we intend to extract hidden information from
files, FOCA and Metagoofil are specific tools designed for
this purpose. In particular, the first product seems to be more
complete, mature and powerful than the second one. FOCA
presents additional functionalities, apart from the metadata
analysis of files, to complement the hidden information. As a
result, it is able to infer more knowledge about the target.
Yet, if we are looking for network information, Shodan,
Spiderfoot
and The Harvester are recommended options for
this certain task. On the one hand, we would suggest
Spiderfoot
to analyze the topology of the target and retrieve
internal (but public) information about the target organiza-
tion. On the other hand, we would complete the results with
Shodan
to include specific information about IoT devices,
surveillance cameras, webcams, VoIP systems, or smart ser-
vices in general.
Last but not least, if the aim of the search is to gather
as much information as possible for a given input, the
resources Recon-NG and Maltego are the more complete ones
and will return diverse data and relationships. The first one
contains lots of modules and interacts with a local database
that scales during the investigation, being an ideal framework
to carry out pentestings, phishing and social engineering
attacks prevention, or even the profiling of a person. On
13
https://inteltechniques.com
14
VOLUME 4, 2016
This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/ACCESS.2020.2965257, IEEE Access
J. Pastor-Galindo et al.: The not yet exploited goldmine of OSINT: Opportunities, open challenges and future trends
the contrary, if we want to avoid the command line and
opt for a more user-friendly interface, Maltego is a good
alternative for OSINT activities. It implements automated
inference processes with transforms that raise the scope of
the original search. Moreover, it is extensible with custom
discovery procedures.
Despite the fact that the above described comparison has
been made according to the desired output, in practice the
user will be restricted by the available input and the data
type accepted by the chosen OSINT tools. Finally, note that
these tools are complementary and mutually non-exclusive,
meaning that a deep and thorough OSINT investigation could
profit from several of them at the same time. Although some
of them may produce similar results for a given search, there
can always be details found by a particular tool that are not
obtained by others.
Do'stlaringiz bilan baham: |