Transcript for:
Top Tools for Online Information Gathering

ever wondered how you can find anyone on the internet welcome to the hackers world of ocean tools I'll share the top 5 tools that make it possible the following information is for educational purposes only at number 5 we have Recon NG Recon NG is amazing web reconsense framework it's designed to be similar to Metasploit making it familiar to those with pen testing experience Recon NG helps you gather information about your targets and identify potential vulnerabilities with Recon NG you can do Weber consents identify potential vulnerabilities and it has a similar interface to Metasploit at number 4 we have the Harvester the Harvester is a tool designed for Gathering email accounts usernames and host names from different public sources like search engines and pgp key servers it's a simple but effective way to gather valuable data the Harvester collects email addresses and usernames files host names from public sources and it's a simple but effective data Gathering tool number three Google Docs Google Docs are advanced search parameters that can find detailed and specific information that's publicly available on the internet this could be documents databases passwords or any information that has been made public Google Docs allow you to do advanced search queries discover publicly available data and find sensitive information accidentally exposed number two malteko maltego is an awesome tool that can visualize complex networks and find hidden connections this tool can be used for online investigations to identify threats from public information it's often used by Security Professionals to map out online networks and find relationships between entities like people companies domains and social media profiles maltego provides powerful data mining visual link analysis and integration with a vast array of data sources finally at number one shoden Sheldon is a search engine for Internet connected devices it's a great tool for security research asset and uncovered devices networks and services with poor security whether it's a traffic light a refrigerator or a web server if it's connected to the internet Sheldon can find it which showed me you can discover people's internet connected devices uncover weak security points and research cyber security threats if you want to learn exactly how to use shoden I have an entire video dedicated to this check it out here