SOCIAL MEDIA INVESTIGATION
Part2: Social Media Investigation — 28 Powerful Data Integrations for Maltego
Follow XIT on medium & UglyCompany on Telegram for more..
Hey there! Welcome back to the second part of our social media investigation series, where we dive into the world of digital detective work using Maltego. In the previous segment, we covered the initial steps of identifying a profile for investigation and walked through the installation of Maltego on a Windows machine. If you missed that, make sure to catch up on Part 1.
Today, in Part 2, we’re taking it up a notch by exploring a range of high-quality data providers that seamlessly integrate with Maltego. These options cater to various Points of Interest (POI) investigative scenarios and are popular among users with diverse budget sizes. Let’s check out the list:
[A] Main Data Integrations for Personal Identifiers and Social Media
[A.1] IP QualityScore
Verify and fraud-check email addresses and phone numbers while identifying suspicious IP addresses.
Installation Method: CLICK-AND-RUN
[A.2] Pipl
Access over 3 billion online identities cross-referenced and indexed for accuracy and speed.
Subscription: DATA SUBSCRIPTION
[A.3] ShadowDragon SocialNet
Map social media connections with data from 120+ networks for Open Source Intelligence (OSINT) investigations.
Installation Method: BRING YOUR OWN KEY
[A.4] News Transforms
Search for articles and find context relevant to persons, companies, locations, threats, and topics in an investigation.
Installation Method: CLICK-AND-RUN
[A.5] People Data Labs
Search and retrieve personal identity information like email addresses, physical addresses, and social media profiles.
Subscription: DATA SUBSCRIPTION
[A.6] Clearbit
Access enriched company and personal profiles, including job titles, company size, and social media links.
Installation Method: BRING YOUR OWN KEY
[A.7] Hunter.io
Gather email addresses associated with a domain, making it valuable for email verification and reconnaissance.
Installation Method: BRING YOUR OWN KEY
[A.8] ThreatCrowd
Investigate cyber threats by aggregating data from various sources, including passive DNS, WHOIS, and malware samples.
Installation Method: CLICK-AND-RUN
[A.9] IntelTechniques
Leverage various tools for online investigations, including username searches, geolocation, and data breaches.
Installation Method: CLICK-AND-RUN
[B] Main Data Integrations for Company
[B.1] Data OpenCorporates
Access company information to investigate beneficial ownership, money laundering, and financial crimes.
Installation Method: CLICK-AND-RUN
[B.2] Orbis — Bureau van Dijk
Quickly understand and visualize corporate structures and hierarchies.
Installation Method: BRING YOUR OWN KEY
[B.3] ZoomInfo
Obtain detailed company information, including industry, revenue, and employee count, for comprehensive corporate profiling.
Installation Method: BRING YOUR OWN KEY
[B.4] PitchBook
Explore private and public company data, including funding rounds, investors, and executive details.
Installation Method: BRING YOUR OWN KEY
[C] Supplementary Data Integrations
[C.1] Google Maps Geocoding
Normalize and enrich location data in your investigations.
Installation Method: CLICK-AND-RUN
[C.2] Google Programmable Search Engine Transforms
Search for people and aliases in major social media networks.
Installation Method: CLICK-AND-RUN
[C.3] Have I Been Pwned?
Check for password/domain breaches or if an alias or email has been listed in a Pastebin post.
Installation Method: CLICK-AND-RUN
[C.4] LittleSis
Explore influence and connections of politicians, CEOs, world leaders, and other high-profile figures.
Installation Method: CLICK-AND-RUN
[C.5] LoginsoftOSINT
Detect disposable phone numbers and obtain relevant metadata.
Installation Method: CLICK-AND-RUN
[C.6] TinEye
Conduct reverse image search for image verification, User Generated Content (UGC) moderation, copyright, and fraud detection.
Installation Method: CLICK-AND-RUN
[C.7] Wayback Machine
Browse archived content of billions of websites to uncover deleted pages, hidden files, and more.
Installation Method: CLICK-AND-RUN
[C.8] FullContact
Search names, postal addresses, raw and hashed email addresses, phone numbers, and Mobile Ad IDs.
Installation Method: BRING YOUR OWN KEY
[C.9] Shodan
Uncover details about connected devices, IoT devices, and vulnerabilities on the internet.
Installation Method: CLICK-AND-RUN
[C.10] Social-Searcher
Search across various social media platforms simultaneously to gather a comprehensive overview of a person’s online presence.
Installation Method: CLICK-AND-RUN
[C.11] Spokeo
Retrieve public information and social media profiles by searching for a person’s name, email, or phone number.
Installation Method: CLICK-AND-RUN
[C.12] ZoomEye
Focus on IoT and network device searches, providing insights into device vulnerabilities and exposure.
Installation Method: CLICK-AND-RUN
[C.13] TLOxp
Access a wide range of public and proprietary records, including legal, social, and financial data.
Installation Method: BRING YOUR OWN KEY
[C.14] DarkSearch
Specialized search engine for the dark web, allowing you to investigate and monitor potential illicit activities.
Installation Method: CLICK-AND-RUN
[C.15] Archive.org
Delve into historical snapshots of websites, enabling the retrieval of past information and content.
Installation Method: CLICK-AND-RUN
These integrations not only enhance the capabilities of Maltego but also provide a comprehensive toolkit for digital investigators. Stay tuned for more insights and practical tips in our upcoming segments on XIT’s medium!
If you learnt anything from this blog, we’d appreciate your engagement — give it a clap and consider sharing to help spread the knowledge. Also Follow XIT on medium & UglyCompany on Telegram. Your support means a lot to us!