Peoplexploit Dev

Download as pdf or txt
Download as pdf or txt
You are on page 1of 29

PeopleXploit

A hybrid tool to collect public data

Presented By:
Devamruth A.G
IES18CS014

07-12-2021 Department of Computer Science & Engineering , IESCE S7 CSE


1
OBJECTIVE

Primary focus is on introduces the concept of

Open-Source Intelligence(OSINT)

as an important application in intelligent profiling of individuals

07-12-2021 Department of Computer Science & Engineering , IESCE


2
01 Peoplexploit & OSINT
INTRODUCTION

07-12-2021 Department of Computer Science & Engineering , IESCE


3
What is this PeopleXploit ?

PeopleXploit is a hybrid tool which helps in collecting the publicly available


information that is reliable and relevant to the given input by using OSINT
framework

07-12-2021 Department of Computer Science & Engineering , IESCE


4
What is this PeopleXploit ?
This tool is used to track and trace the given target with their digital footprints
like:

● Name
● Email
● Phone Number
● User IDs etc.

07-12-2021 Department of Computer Science & Engineering , IESCE


5
What is this PeopleXploit ?
The tool will scan & search other associated data from public available records
from the internet and create a summary report against the target through OSINT
framework

07-12-2021 Department of Computer Science & Engineering , IESCE


6
What is this PeopleXploit ?
● PeopleXploit profiles, a person using authorship analysis and finds the best
matching guess
● the type of analysis performed (professional/matrimonial/criminal entity)
varies with the requirement of the user.

07-12-2021 Department of Computer Science & Engineering , IESCE


7
What is this OSINT?

Open source intelligence (OSINT) is information collected from public sources


such as those available on the Internet, (all publicly available sources)

OSINT framework provides a collection of tools to gather and parse public data

07-12-2021 Department of Computer Science & Engineering , IESCE


8
categories of the OSINT framework
● Training ● Forums / Blogs / IRC
● Documentation ● Search Engines
● OpSec ● Maps
● Threat Intelligence ● Transportation
● Exploits & Advisories ● Business Records
● Malicious File Analysis ● Public Records
● Tools ● Telephone Numbers
● Encoding / Decoding ● Dating
● Classifieds ● People Search Engines
● Digital Currency ● Instant Messaging
● Dark Web ● Social Networks
● Terrorism ● Images / Videos / Docs
● Mobile Emulation ● IP Address
● Metadata ● Domain Name
● Language Translation ● Email Address
● Archives ● Username
07-12-2021
Department of Computer Science & Engineering , IESCE 9
10
11
12
Usage and audience

OSINT Framework is commonly used for

● OSINT research
● Footprinting
● intelligence gathering / reconnaissance

07-12-2021
13
Types of OSINT used in PeopleXploit

MEDIA
consisting of television, radio, news,
magazines
01 INTERNET
A widely utilized resource composed of

ACADEMIC PUBLICATION
02 social media such as Instagram, LinkedIn,
Facebook, blogs, online publications, dark
web resources, etc.
& SCIENTIFIC JOURNALS
acquired through articles, theses,
dissertations, and others
03
BUSINESS DATA
GEOSPATIAL 04 collected through tax information, business
profile, board meetings, and such
INFORMATION
which includes handy maps and transport
tracking applications (for busses, trains, 05
planes, etc

07-12-2021 Department of Computer Science & Engineering , IESCE 14


METHODOLOGY
02 OSINT FRAMEWORK

07-12-2021 Department of Computer Science & Engineering , IESCE


15
● The proposed tool works for any input given in the form of image or text
● An OSINT search can be performed on a particular individual and a report can
be generated by tracking their digital presence
● Using this process, we will be able to construct a digital profile for the target
individual

For example,

If an input, like the email-ID of the wrongdoer is given, it can be reverse


searched all over the internet to check for associated accounts on social
media, blogs, etc. and for any openly available, relevant information

07-12-2021 Department of Computer Science & Engineering , IESCE


16
OSINT tool to Find Information from a Phone Number

17
OSINT MINDMAP

18
The tools used for the investigations are open source and
most of them are web based

The relevance of the data generated through these tools is


not 100% accurate

The data generated by these tools is derived from region


specific databases

Information returned need not be relevant to the scope of


the target

07-12-2021 Department of Computer Science & Engineering , IESCE


19
To tackle this problem of accuracy and relevance, a hybrid
system that aggregates the functionalities of a static set of
OSINT tools is necessary

PEOPLEXPLOIT

This master tool can interact, feed data provided by the user
and retrieve the output dataset from each tool

It can also aggregate this output dataset, Filter relevant


information and provides a readable/downloadable report
to the user

07-12-2021 Department of Computer Science & Engineering , IESCE 20


Architecture of PeopleXploit

21
INPUT DATA FORMAT

NAME EMAIL PHONE NUMBER IMAGE


● Person ● Gmail ● Airtel ● JPEG
● Product ● Yahoo ● BSNL ● PNG
● Institution,etc ● Outlook ● Jio ● GIF
● iCloud ● Vodafone ● TIFF, etc.
● Protonmail,etc. ● Idea,etc

07-12-2021 Department of Computer Science & Engineering , IESCE


22
Some tools used in the Tool Stack

WebMii Social Searcher Rapportive


● It is a people search ● It is a Social Media ● See data from
engine Search Engine. It LinkedIn profiles of
● It centralizes public ● provides a real-time his/her Gmail
information from other search from 11 contacts and allow
websites sources them to be used
when they require.
07-12-2021 Department of Computer Science & Engineering , IESCE
23
Conclusion
03
PeopleXploit

07-12-2021 Department of Computer Science & Engineering , IESCE


24
● PeopleXploit aims to act as a search-engine that only needs a name/
email address/ phone number as input that triggers a hunt for
relevant information that reaches up to the deepest corners of the
internet

● Searching for information about a person or a company can be a time


consuming activity PeopleXploit aims to collect information about
the target in a minimal time period

● It is possible to gather target’s information such as phone numbers,


social media handles from inputs such as email addresses and vice
versa

07-12-2021 Department of Computer Science & Engineering , IESCE


25
● One of the disadvantages of PeopleXploit is that the filtration of
noise can be difficult when the input is generalized.

● When a name is given as an input, the task becomes tedious as


there would be a number of online profiles found with the same
name.

● Hence, it requires a large amount of analytical work to


distinguish the valid information.

07-12-2021 Department of Computer Science & Engineering , IESCE


26
Reference
04

07-12-2021 Department of Computer Science & Engineering , IESCE


27
[1] Corera, Gordon. “The spies of tomorrow will need to love data.” WIRED Magazine, May 2016.

[2] Dover, Robert, Michael S. Goodman, and Claudia Hillebrand, eds. Routledge companion to
intelligence studies. Routledge, 2013.

[3] Bartlett, Jamie, and Louis Reynolds. The State of the Art 2015: a literature review of social media.
Intelligence capabilities for counter-terrorism.London: Demos, 2015

[4] Geetha, R., PasupuletiRekha, and S. Karthika. "Twitter Opinion Mining and Boosting Using Sentiment
Analysis." In 2018 International Conference on Computer, Communication, and Signal Processing
(ICCCSP), pp. 1-4. IEEE, 2018.

[5] https://twitter.com/henkvaness/status/1107591900842868736

[6] www.bellingcat.com

[7] starsunfolded.com

[8] mash.acalltoduty.com
07-12-2021 Department of Computer Science & Engineering , IESCE
28
THANK YOU

Department of Computer Science & Engineering , IESCE


29

You might also like