Skip to main content

OSINT GLOSSARY

Technical Terms & Definitions

Comprehensive reference of OSINT terminology, tools, and methodologies used by intelligence professionals worldwide.

32 terms found

API

technical

Application Programming Interface - A set of protocols and tools for building software applications. Often exposes data that can be used in OSINT.

#programming#data access#integration

Related: REST API, Data Source

CFAA

legal

Computer Fraud and Abuse Act - A United States cybersecurity bill that was enacted in 1986 as an amendment to existing computer fraud law.

#law#united states#cybercrime

Related: Legal Framework, Unauthorized Access

CVE

acronyms

Common Vulnerabilities and Exposures - A list of publicly disclosed cybersecurity vulnerabilities.

#vulnerability#security#database

Related: Vulnerability, Security Research

Dark Web

technical

The part of the World Wide Web that is only accessible through special software, configurations, or authorization.

#anonymity#hidden#tor

Related: Tor, Deep Web

Deep Web

technical

The part of the web not indexed by standard search engines. Includes databases, private networks, and password-protected sites.

#hidden#unindexed#private

Related: Dark Web, Search Engines

DNS

technical

Domain Name System - A hierarchical decentralized naming system for computers, services, or other resources connected to the Internet.

#networking#domain#infrastructure

Related: WHOIS, Subdomain Enumeration

Doxing

techniques

The practice of researching and broadcasting private or identifying information about an individual or organization.

#privacy#information disclosure#harassment

Related: OSINT, Privacy

EXIF

technical

Exchangeable Image File Format - A standard that specifies formats for images, sound, and tags used by digital cameras and other systems.

#metadata#images#geolocation

Related: Metadata, Geolocation

Fair Use

legal

A legal doctrine that permits limited use of copyrighted material without acquiring permission from the rights holders.

#copyright#legal doctrine#research

Related: Copyright, Legal Framework

Footprinting

techniques

The technique of gathering information about computer systems and the entities they belong to.

#reconnaissance#passive#information gathering

Related: Reconnaissance, Passive Reconnaissance

GDPR

legal

General Data Protection Regulation - A regulation in EU law on data protection and privacy in the European Union and the European Economic Area.

#privacy#european union#compliance

Related: Data Protection, Privacy

GEOINT

acronyms

Geospatial Intelligence - Intelligence about human activity on Earth derived from imagery and geospatial information.

#intelligence#location#imagery

Related: OSINT, Geolocation

Google Dork

tools

An advanced Google search query that uses special operators to find specific information that is not easily accessible through normal search.

Examples:

site:example.com filetype:pdf

intitle:"index of" password

#search#reconnaissance#dorking

Related: Search Operator, Reconnaissance

HUMINT

acronyms

Human Intelligence - Intelligence gathered by means of interpersonal contact, as opposed to technical means.

#intelligence#human sources#social

Related: OSINT, Social Engineering

IOC

acronyms

Indicator of Compromise - Pieces of forensic data that identify potentially malicious activity on a system or network.

#security#forensics#threat intelligence

Related: Threat Intelligence, Forensics

Maltego

tools

An interactive data mining tool that renders directed graphs for link analysis. Used extensively in OSINT investigations.

#data mining#visualization#link analysis

Related: Link Analysis, Graph Database

Metadata

technical

Data that provides information about other data. In OSINT, often refers to hidden information in files like EXIF data in images.

#data#exif#hidden information

Related: EXIF, Data Leakage

OPSEC

acronyms

Operations Security - A process that identifies critical information to determine if friendly actions can be observed by enemy intelligence.

#security#operational#privacy

Related: Anonymity, Privacy

OSINT

acronyms

Open Source Intelligence - Intelligence collected from publicly available sources to be used in an intelligence context.

#intelligence#methodology#fundamental

Related: Intelligence Cycle, Reconnaissance

PII

acronyms

Personally Identifiable Information - Information that can be used to identify, contact, or locate a single person.

#privacy#personal data#sensitive

Related: Data Protection, Privacy

Reconnaissance

techniques

The act of gathering information about a target system, network, or organization before launching an attack or investigation.

#information gathering#pre-attack#enumeration

Related: Enumeration, Footprinting

robots.txt

technical

A text file webmasters create to instruct web robots how to crawl pages on their website. Often reveals hidden directories.

#web#crawling#seo

Related: Web Crawling, Directory Enumeration

Shodan

tools

A search engine that lets users find specific types of computers (webcams, routers, servers, etc.) connected to the internet using a variety of filters.

#search engine#iot#reconnaissance

Related: Censys, ZoomEye

SIGINT

acronyms

Signals Intelligence - Intelligence-gathering by interception of signals, whether communications or electronic signals.

#intelligence#signals#interception

Related: OSINT, Technical Intelligence

Social Engineering

techniques

The psychological manipulation of people into performing actions or divulging confidential information.

#manipulation#human factor#phishing

Related: Phishing, Pretexting

Terms of Service

legal

The legal agreements between a service provider and a person who wants to use that service, outlining rules and restrictions.

#agreement#compliance#usage policy

Related: EULA, Privacy Policy

theHarvester

tools

An OSINT tool used to gather emails, names, subdomains, IPs, and URLs using multiple public data sources.

#reconnaissance#email enumeration#subdomain discovery

Related: Reconnaissance, Email Harvesting

Tor

tools

The Onion Router - Free and open-source software for enabling anonymous communication using onion routing.

#anonymity#privacy#dark web

Related: Anonymity, Dark Web

VPN

acronyms

Virtual Private Network - Extends a private network across a public network, enabling users to send and receive data securely.

#privacy#security#networking

Related: OPSEC, Anonymity

Wayback Machine

tools

A digital archive of the World Wide Web maintained by the Internet Archive, allowing users to see archived versions of web pages.

#archive#historical#web

Related: Archive.org, Historical Data

Web Scraping

techniques

The process of automatically collecting information from websites using software or scripts.

#automation#data collection#extraction

Related: Web Crawling, Data Mining

WHOIS

technical

A query and response protocol used for querying databases that store registered users or assignees of an Internet resource.

#domain#registration#lookup

Related: Domain Registration, DNS