SOCIAL MEDIA INVESTIGATION

Part2: Social Media Investigation — 28 Powerful Data Integrations for Maltego

Basic to Advance Social Media Investigation

XIT

--

Follow XIT on medium & UglyCompany on Telegram for more..

Hey there! Welcome back to the second part of our social media investigation series, where we dive into the world of digital detective work using Maltego. In the previous segment, we covered the initial steps of identifying a profile for investigation and walked through the installation of Maltego on a Windows machine. If you missed that, make sure to catch up on Part 1.

Today, in Part 2, we’re taking it up a notch by exploring a range of high-quality data providers that seamlessly integrate with Maltego. These options cater to various Points of Interest (POI) investigative scenarios and are popular among users with diverse budget sizes. Let’s check out the list:

[A] Main Data Integrations for Personal Identifiers and Social Media

[A.1] IP QualityScore

Verify and fraud-check email addresses and phone numbers while identifying suspicious IP addresses.

Installation Method: CLICK-AND-RUN

[A.2] Pipl

Access over 3 billion online identities cross-referenced and indexed for accuracy and speed.

Subscription: DATA SUBSCRIPTION

[A.3] ShadowDragon SocialNet

Map social media connections with data from 120+ networks for Open Source Intelligence (OSINT) investigations.

Installation Method: BRING YOUR OWN KEY

[A.4] News Transforms

Search for articles and find context relevant to persons, companies, locations, threats, and topics in an investigation.

Installation Method: CLICK-AND-RUN

[A.5] People Data Labs

Search and retrieve personal identity information like email addresses, physical addresses, and social media profiles.

Subscription: DATA SUBSCRIPTION

[A.6] Clearbit

Access enriched company and personal profiles, including job titles, company size, and social media links.

Installation Method: BRING YOUR OWN KEY

[A.7] Hunter.io

Gather email addresses associated with a domain, making it valuable for email verification and reconnaissance.

Installation Method: BRING YOUR OWN KEY

[A.8] ThreatCrowd

Investigate cyber threats by aggregating data from various sources, including passive DNS, WHOIS, and malware samples.

Installation Method: CLICK-AND-RUN

[A.9] IntelTechniques

Leverage various tools for online investigations, including username searches, geolocation, and data breaches.

Installation Method: CLICK-AND-RUN

[B] Main Data Integrations for Company

[B.1] Data OpenCorporates

Access company information to investigate beneficial ownership, money laundering, and financial crimes.

Installation Method: CLICK-AND-RUN

[B.2] Orbis — Bureau van Dijk

Quickly understand and visualize corporate structures and hierarchies.

Installation Method: BRING YOUR OWN KEY

[B.3] ZoomInfo

Obtain detailed company information, including industry, revenue, and employee count, for comprehensive corporate profiling.

Installation Method: BRING YOUR OWN KEY

[B.4] PitchBook

Explore private and public company data, including funding rounds, investors, and executive details.

Installation Method: BRING YOUR OWN KEY

[C] Supplementary Data Integrations

[C.1] Google Maps Geocoding

Normalize and enrich location data in your investigations.

Installation Method: CLICK-AND-RUN

[C.2] Google Programmable Search Engine Transforms

Search for people and aliases in major social media networks.

Installation Method: CLICK-AND-RUN

[C.3] Have I Been Pwned?

Check for password/domain breaches or if an alias or email has been listed in a Pastebin post.

Installation Method: CLICK-AND-RUN

[C.4] LittleSis

Explore influence and connections of politicians, CEOs, world leaders, and other high-profile figures.

Installation Method: CLICK-AND-RUN

[C.5] LoginsoftOSINT

Detect disposable phone numbers and obtain relevant metadata.

Installation Method: CLICK-AND-RUN

[C.6] TinEye

Conduct reverse image search for image verification, User Generated Content (UGC) moderation, copyright, and fraud detection.

Installation Method: CLICK-AND-RUN

[C.7] Wayback Machine

Browse archived content of billions of websites to uncover deleted pages, hidden files, and more.

Installation Method: CLICK-AND-RUN

[C.8] FullContact

Search names, postal addresses, raw and hashed email addresses, phone numbers, and Mobile Ad IDs.

Installation Method: BRING YOUR OWN KEY

[C.9] Shodan

Uncover details about connected devices, IoT devices, and vulnerabilities on the internet.

Installation Method: CLICK-AND-RUN

[C.10] Social-Searcher

Search across various social media platforms simultaneously to gather a comprehensive overview of a person’s online presence.

Installation Method: CLICK-AND-RUN

[C.11] Spokeo

Retrieve public information and social media profiles by searching for a person’s name, email, or phone number.

Installation Method: CLICK-AND-RUN

[C.12] ZoomEye

Focus on IoT and network device searches, providing insights into device vulnerabilities and exposure.

Installation Method: CLICK-AND-RUN

[C.13] TLOxp

Access a wide range of public and proprietary records, including legal, social, and financial data.

Installation Method: BRING YOUR OWN KEY

[C.14] DarkSearch

Specialized search engine for the dark web, allowing you to investigate and monitor potential illicit activities.

Installation Method: CLICK-AND-RUN

[C.15] Archive.org

Delve into historical snapshots of websites, enabling the retrieval of past information and content.

Installation Method: CLICK-AND-RUN

These integrations not only enhance the capabilities of Maltego but also provide a comprehensive toolkit for digital investigators. Stay tuned for more insights and practical tips in our upcoming segments on XIT’s medium!

If you learnt anything from this blog, we’d appreciate your engagement — give it a clap and consider sharing to help spread the knowledge. Also Follow XIT on medium & UglyCompany on Telegram. Your support means a lot to us!

A supporter is worth a thousand followers. 😊

--

--

XIT

SHHH! The voice of none is stronger than the voice of one.