OSINT GLOSSARY
Technical Terms & Definitions
Comprehensive reference of OSINT terminology, tools, and methodologies used by intelligence professionals worldwide.
32 terms found
API
Application Programming Interface - A set of protocols and tools for building software applications. Often exposes data that can be used in OSINT.
Related: REST API, Data Source
CFAA
Computer Fraud and Abuse Act - A United States cybersecurity bill that was enacted in 1986 as an amendment to existing computer fraud law.
Related: Legal Framework, Unauthorized Access
CVE
Common Vulnerabilities and Exposures - A list of publicly disclosed cybersecurity vulnerabilities.
Related: Vulnerability, Security Research
Dark Web
The part of the World Wide Web that is only accessible through special software, configurations, or authorization.
Related: Tor, Deep Web
Deep Web
The part of the web not indexed by standard search engines. Includes databases, private networks, and password-protected sites.
Related: Dark Web, Search Engines
DNS
Domain Name System - A hierarchical decentralized naming system for computers, services, or other resources connected to the Internet.
Related: WHOIS, Subdomain Enumeration
Doxing
The practice of researching and broadcasting private or identifying information about an individual or organization.
Related: OSINT, Privacy
EXIF
Exchangeable Image File Format - A standard that specifies formats for images, sound, and tags used by digital cameras and other systems.
Related: Metadata, Geolocation
Fair Use
A legal doctrine that permits limited use of copyrighted material without acquiring permission from the rights holders.
Related: Copyright, Legal Framework
Footprinting
The technique of gathering information about computer systems and the entities they belong to.
Related: Reconnaissance, Passive Reconnaissance
GDPR
General Data Protection Regulation - A regulation in EU law on data protection and privacy in the European Union and the European Economic Area.
Related: Data Protection, Privacy
GEOINT
Geospatial Intelligence - Intelligence about human activity on Earth derived from imagery and geospatial information.
Related: OSINT, Geolocation
Google Dork
An advanced Google search query that uses special operators to find specific information that is not easily accessible through normal search.
Examples:
site:example.com filetype:pdf
intitle:"index of" password
Related: Search Operator, Reconnaissance
HUMINT
Human Intelligence - Intelligence gathered by means of interpersonal contact, as opposed to technical means.
Related: OSINT, Social Engineering
IOC
Indicator of Compromise - Pieces of forensic data that identify potentially malicious activity on a system or network.
Related: Threat Intelligence, Forensics
Maltego
An interactive data mining tool that renders directed graphs for link analysis. Used extensively in OSINT investigations.
Related: Link Analysis, Graph Database
Metadata
Data that provides information about other data. In OSINT, often refers to hidden information in files like EXIF data in images.
Related: EXIF, Data Leakage
OPSEC
Operations Security - A process that identifies critical information to determine if friendly actions can be observed by enemy intelligence.
Related: Anonymity, Privacy
OSINT
Open Source Intelligence - Intelligence collected from publicly available sources to be used in an intelligence context.
Related: Intelligence Cycle, Reconnaissance
PII
Personally Identifiable Information - Information that can be used to identify, contact, or locate a single person.
Related: Data Protection, Privacy
Reconnaissance
The act of gathering information about a target system, network, or organization before launching an attack or investigation.
Related: Enumeration, Footprinting
robots.txt
A text file webmasters create to instruct web robots how to crawl pages on their website. Often reveals hidden directories.
Related: Web Crawling, Directory Enumeration
Shodan
A search engine that lets users find specific types of computers (webcams, routers, servers, etc.) connected to the internet using a variety of filters.
Related: Censys, ZoomEye
SIGINT
Signals Intelligence - Intelligence-gathering by interception of signals, whether communications or electronic signals.
Related: OSINT, Technical Intelligence
Social Engineering
The psychological manipulation of people into performing actions or divulging confidential information.
Related: Phishing, Pretexting
Terms of Service
The legal agreements between a service provider and a person who wants to use that service, outlining rules and restrictions.
Related: EULA, Privacy Policy
theHarvester
An OSINT tool used to gather emails, names, subdomains, IPs, and URLs using multiple public data sources.
Related: Reconnaissance, Email Harvesting
Tor
The Onion Router - Free and open-source software for enabling anonymous communication using onion routing.
Related: Anonymity, Dark Web
VPN
Virtual Private Network - Extends a private network across a public network, enabling users to send and receive data securely.
Related: OPSEC, Anonymity
Wayback Machine
A digital archive of the World Wide Web maintained by the Internet Archive, allowing users to see archived versions of web pages.
Related: Archive.org, Historical Data
Web Scraping
The process of automatically collecting information from websites using software or scripts.
Related: Web Crawling, Data Mining
WHOIS
A query and response protocol used for querying databases that store registered users or assignees of an Internet resource.
Related: Domain Registration, DNS