Osint Report.zip May 2026

## 5. Findings ### 5.1 Digital Footprint Overview | Asset Type | Identifier | Owner/Contact (if known) | Public Exposure | Comments | |------------|------------|--------------------------|-----------------|----------| | Domain | `example.com` | Registrant: John Doe (privacy‑protected) | Public website, SSL, subdomains | … | | Sub‑domain | `api.example.com` | Same as above | Exposes REST API (no auth) | Potential data leak | | IP Range | `192.0.2.0/24` | ISP: ExampleNet | Visible on Shodan (open ports 22, 80, 443) | … | | Social Account | `@example` (Twitter) | Owner: Jane Smith | 12k followers, 300 tweets | Recent tweet mentions partnership with X | | GitHub Repo | `example/example‑app` | Owner: example | 5 public repos, 1 contains `.env` file | **Sensitive** – contains API keys | | Document | `annual_report_2023.pdf` (found via Google) | Public | Contains executive emails | **PII** exposure |

## 1. Executive Summary - **Purpose:** Brief description of why the assessment was performed. - **Key Findings:** 3‑5 bullet points summarising the most critical insights. - **Overall Risk Rating:** <Low / Medium / High / Critical>. OSINT Report.zip

*Tools commonly used:* Maltego, SpiderFoot, Recon‑NG, theHarvester, FOCA, Shodan CLI, Sublist3r, Amass, OSINT Framework, OSINT Combine, Metagoofil, ExifTool, Wayback Machine, Google Advanced Search Operators. - **Key Findings:** 3‑5 bullet points summarising the

---