#persint

5 posts tagged
You don't need a zero-day. You need a name and forty bucks. That's the unglamorous truth about PERSINT.PEOPLESEARCH — the layer of people OSINT that runs entirely on aggregators, data brokers, and the receipts of every "I agree" button a target has clicked since 2008. This isn't hacking. It's reading the file the bro…
A phone number is not eleven digits. It's a key. It opens messengers, banking sessions, two-factor codes, abandoned dating profiles, decade-old forum signups, and — if you know how to ask — the carrier's own routing database. PERSINT.PHONE is the discipline of turning that key into a person. This is the sub-directi…
An email address looks like a single string. To a working OSINT operator, it's a key that unlocks a phone number's last two digits, a Google review trail, three breached passwords, a GitHub commit signed with a real name, and a Skype handle the target forgot they ever had. PERSINT email investigation is the discipline …
People rotate phones. They scrub their Facebook. They burn email addresses every six months. The one thing they almost never change is the handle they picked at 14. That handle is still on their Steam profile, their abandoned LiveJournal, the GitHub repo they started in college, and the forum where they argued about Wa…
LinkedIn is the most cooperative target in SOCMINT. Users hand over their employer, education, certifications, project history, even who they report to — voluntarily, in indexed text, with photos. No other platform tells you in a single page who someone reports to, what stack they ship on, and where they were three j…