This is the first of many OSINT Toolbox Talks by OS2INT; for our first, we will be taking a close look at three effective tools. The first is an effective extension-based media extractor called DownThemAll; which I have personally put to use during several Digital Investigations concerning illegal and CSE material. The second tool we will look at is tinfoleak, a very comprehensive Twitter analysis tools that enables investigators to scrape content from individual accounts, hashtags or geolocations; then output a detailed report based on collected data. Lastly, we will talk about Protosint, an easy-to-use Python-based script that allows investigators to test the validity of a ProtonMail account, obtain account creation dates and indicate whether an IP address is associated with ProtonVPN.
ProtOSINT is a nice and easy-to-use Python tool that provides investigators with three important capabilities. The first capability allows the investigator to test the validity of a single ProtonMail account, providing a clear true or false response. The second capability requires the investigator to input the first and last name of a target in addition to a series of Pseudos; the tool then returns a series of possible accounts which match the inputted details and indicates whether the accounts are active and when they were created. The final capability that this tool provides is the ability for the investigator to identify whether an IP address is currently affiliated with a ProtonVPN.
The one downside to this tool is that it does not always give you the creation time of the ProtonMail account itself. The timestamp returned by ProtonMail API is the time and date when the primary PGP key for the email was created. That said, it is very easy to install and deploy – more importantly, it does not require much user input.
Tinfoleak is a very impressive tool used to automate the extraction of information from Twitter and enable OSINT practitioners to conduct essential analysis against extracted data in addition to Twitter accounts. The tool is well equipped to scrape user accounts and Tweets within a set geolocation. The tool outputs a comprehensive report which includes the following key information:
- Account info / User Activity / Protected Accounts / User Relations
- Source Applications / User Devices / Use Frequency
- Hashtags / Mentions / Likes
- Text Analysis / Words Frequency / Media / Metadata
- User Visited Places / User Routes / User Top Locations
- Social Networks / Digital Identities
- Geolocated Users / Tagged Users
- Followers / Friends
- Lists / Collections
- Conversations
Installation of the tool is very straightforward on Python, the only time consuming and frustrating process is opening a Twitter Developer Account and obtaining API keys. Once the keys are assigned to the tinfoleak config file, the program is very straightforward to execute and deploy. The results of which are very impressive.
DownThemAll is a browser Add-On that I have put to good use during several Digital Investigations. Initially, the Add-On was exclusive for Mozilla Firefox, but is now available for Google Chrome and Opera, which is good (depending on your browser of choice of course!). I personally prefer using Mozilla Firefox due to the range of effective Add-Ons that can be used for OSINT purposes. DownThemAll is a bulk media downloader that lets you download all content from a website in a few clicks. Unlike other bulk media downloaders, it is configured so that it can parse through images which are contained within linked pages. For example, not too long ago, I led with an investigation of several old Geocities (yes, Geocities!) webpages that had been archived on the WayBackMachine. HTML markups which were dreadfully common in the late 1990s and early 2000’s included embedding single images on a separate HTML page – adding to the complexity, the images were also wrapped within an tag which redirected on itself. Using DownThemAll – especially on archived Geocities pages – was very effective and enabled me to extract batches of images from target pages.
When using DownThemAll on a target webpage, the Add-On will also provide some meta data including ‘Title’ and ‘Description’ assigned to the image. The tool also has a simplified and advanced filtering capability, allowing the investigator to select Images, Videos or other media through the use of Regular Expressions.
DownThemAll is particularly effective for Digital Investigations that requires bulk media to be collected – this is especially the case when dealing with cases concerning offensive or illegal material. However, the main drawback to this tool is that it is not effective on popular social media platforms including Facebook, Instagram and VKontakte. However, in upcoming reviews, we will look at media collection tools that can be easily deployed on target social media profiles.
Author
Joseph Jones | Founder of OS2INT and Director of Capability Development at Paliscope
Joseph Jones is a former British military intelligence operator and former National Crime Agency intelligence officer with more than 16 years of intelligence-gathering and investigative experience. He holds a BSc (Hons) Intelligence and Cyber Security from Staffordshire University and is also an external expert for the European Union Agency for Law Enforcement Training (CEPOL), the European Border and Coast Guard Agency (FRONTEX), the European Union Agency for Cybersecurity (ENISA) and Expertise France.