Warning! The information and tools listed on this site are for educational purposes only.
You should not use this information to harass people, or for unethical reasons.

This site aims to make you an online superhero. It will teach you how to get the IP address from email headers, search images on the web, trace IP address, and much more. After exploring ways to gather intelligence on a target, we'll explore security fundamentals.

Note: This site is still young. Please come back soon for more content! Join our mailing list.

Using Google

Learn how to use Google to it's full potential with these quick tips.

Search Operators:

Search operators allow you to specify certain things when looking something up, and have the syntax: operator:term, where operator is the specific operator(more down below), and term specifies what you're looking for.

  • site:[url] Search using only one url.
  • filetype:[pdf] Find file types that end with .pdf.
  • phonebook:[name] Find phonebook listings of [name].
  • allintitle:[term] Searches webpages with a specific title.
  • allinurl:[term] Searches URLs for [term].
  • Equipped with a few simple operators, you can learn more down below.

  • Google Advanced Search
  • Moz.com Google Search Operators
  • Gathering Information: Images

    How to extract data from images; how to find images on other areas of the web, and more.

    Reverse Image Searching

    Need help finding an image? Try reverse image searching.

  • Tineye
  • Google Reverse Image Search
  • Reverse Image Search (Searches Google, Bing, and Yandax)
  • Image Manipulation

    Explore and manipulate data found in images

    • Forensically
      • image forensic analysis
      • clone detection analysis
      • metadata extraction, and more.
    • ExifTool
      • Read, write, and edit meta-information.
    • JPEGsnoop
      • Analyzes the source of the image to test its authenticity.
    • GeoSetter
      • Manipulate/view geodata - and other metadata information.

    Optical Character Recognition Tools

  • FreeOCR
  • Free Online OCR
  • NewOCR
  • IP Addresses

    "An Internet Protocol address (IP address) is a numerical label assigned to each device connected to a computer network that uses the Internet Protocol for communication. An IP address serves two principal functions: host or network interface identification and location addressing." -Wikipedia

    Obtaining a person's IP adress is as simple as creating a website for people to visit, or by using an online service, to name a few. When someone connects, you'll be able to see an HTTP GET request from the IP address.

    WHOIS Lookup

    With a WHOIS lookup, you're able to see various things related to an IP address, such as who it is registered to, the location, etc.

    whois lookup

    Example of a WHOIS lookup using the terminal.


    Visit the ICANN WHOIS Lookup Website.

    Additional IP Address Tracking Tools

  • IPverse
  • IP2Location
  • IPfingerPrints
  • Public Records

    Public records include things such as: ownership of properties, birth records, death records, criminal records, and much more. Below are some useful links to aide you in your intelligence gathering.

    General Information

    • Whitepages
      • Find people, contact info, & background checks.
    • Lullar
      • People search by email or name.
    • Family Tree Now
      • Research and build a family tree for free.
    • Radaris
      • Learn about people - background check, phone, address, email, reverse phone, etc.
    • Webmii
      • Another people search engine.
    • Linkedin
      • Get people's work history, current job, education, location, etc.

    Social Security Numbers

    • SSN Check
      • Reverse Search a social security number.
    • SSN Verify
      • Verify social security numbers.

    Usernames

    Email Investigation

    Phone Numbers

    Social Media

    Social media accounts are treasure chests for the intelligence seeker. Locations, favorite bars, movies, books, pet names, family, you name it, and you'll probably find it within a social media account. If you're reading this, it'd probably be a good idea to run these tests on your own accounts, and remove any revealing information, such as pet's names, which are usually used as "security questions". If your Mom is on your friends list, and she includes her maiden name, like so many do, well, that's 2/2 questions into your account!

    It is usually recommended to set up fake accounts for each of these services. Keep in mind that this may violate the terms of service on such platforms.

    Facebook

    Specifying information with the URL:

  • Places Visited: facebook.com/search/[user_id]/places-visited
  • Places Checked-in: facebook.com/search/[user_id]/places-checked-in
  • See posts from a specific location. Search: Posts written in Orlando, FL
  • Search for a person within a location. Search: [person] in Orlando, FL

  • Twitter

    Instagram

    Section coming soon...

    Psychological Analysis

    Get a glimpse into the common emotions expressed by a target.

    GPS Intelligence

    Section coming soon...

    "Computer security, cybersecurity or information technology security (IT security) is the protection of computer systems from theft or damage to their hardware, software or electronic data, as well as from disruption or misdirection of the services they provide." - Wikipedia

    As you can see from the different sections below, security is a large field. Below I've equipped you with enough information to acquire a decent understanding. We'll start with the bare minimum, and arguably one of the most important: physical security.

    Physical Security

    Do you leave your passwords and emails in a tablet next to your computer? Is your computer easily accessible(e.g. can anyone start it up, and view your file system)? You might want to consider your physical security if you answered "yes" to these questions.

    Big companies are notably weary of physical security. Shredding passwords, and other documents, before being thrown in a dumpster outside of their facility(See: dumpster-diving). Server rooms are locked with the newest technology, such as hand scanners, and anyone without a security badge will be unable to access them. Even getting into a building will be complicated, if physical security is being considered, though people have been able to get into buildings, and retrieve data, by social engineering.

    Thus is physical security: being mindful of your device(s) and data. Don't throw your old hard-drive in the trash, and surely don't sell it, before properly wiping the data, or destroying it.

    Further Reading:

  • Physical Security
  • Physical Security (Wikipedia)
  • Encryption

    Section coming soon...

    Cross-Site Scripting (XSS)

    Section coming soon...

    Phishing

    Section coming soon...

    Networks

    Section coming soon...

    Packet Sniffing

    Section coming soon...

    Browser Extensions

    Section coming soon...

    OS Command Injections

    Section coming soon...

    Social Engineering

    Section coming soon...

    Section coming soon...

    The Recommended Reading below is anything to do with computers. From programming, hacking, compilers, and beyond. Reading just one of the books below will improve you.

  • Open Source Intelligence Methods and Tools: A Practical Guide to Online Intelligence
    • This book partially inspired this website, I highly recommended it.
  • The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws
    • Recommended by companies such as bugcrowd, this book is the holy grail of web application security.
  • The Browser Hacker's Handbook
    • Masterfully explains the web browser, the most used software on the planet. You will learn how the browser works, it's flaws, etc.
  • Rtfm: Red Team Field Manual
    • Very useful. This little handbook equips you with quick commands, from covering your tracks(clearing log files), to basic commands in different operating systems, and much more.
  • The Tangled Web: A Guide to Securing Modern Web Applications
    • An entertaining, easy-to-read book on web application security.
  • You Don't Know JavaScript Series
    • Free to read online. Theoretical approach to learning JavaScript. What is scope? Closure? The this keyword? Find out in this series.
  • Eloquent JavaScript
    • Free to read online. Brilliant introduction to JavaScript.
  • C Programming Language, 2nd Edition
    • The C Programming Language is a computer programming book written by Brian Kernighan and Dennis Ritchie, the latter of whom originally designed and implemented the language, as well as co-designed the Unix operating system with which development of the language was closely intertwined.
  • Hacking Point of Sale: Payment Application Secrets, Threats, and Solutions
    • Must-have guide for professionals responsible for securing credit and debit card transactions. As recent breaches like Target and Neiman Marcus show, payment card information is involved in more security breaches than any other data type.