OSINT and Open Source Reconnaissance

Understand what an attacker could find about your organisation before they find it. Our OSINT assessments identify publicly available information across your infrastructure, personnel, and online footprint. All without touching your systems.
CREST Pathway Accreditation Logo for Exploitr Limited
UK Cyber Security Council membership logo
Cyber Essentials Certification Logo for Exploitr Limited
Open Source Intelligence Gathering

What is OSINT?

Open Source Intelligence (OSINT) gathering is the practice of collecting and analysing information from publicly available sources. It requires no access to your systems, no credentials, and no direct interaction with your infrastructure. Everything identified during an OSINT assessment is information that is already accessible to anyone who knows where to look.

For organisations, the volume of information that accumulates in public sources over time through employee activity, domain registrations, code repositories, data breaches, social media, and document metadata, is often significantly greater than security teams expect. An attacker conducting reconnaissance before a targeted engagement will spend time doing exactly this, building a picture of your organisation’s people, systems, and potential weaknesses before making a single direct request.

An OSINT assessment gives you that same picture first. It identifies what’s exposed, contextualises the risk, and where possible, provides guidance on reducing your exposure before it’s used against you.

Reasons For Testing

When to commission an OSINT assessment

OSINT assessments are relevant across a range of scenarios. The common thread is a need to understand exposure before someone else exploits it.

01

Before a penetration test or red team engagement:

Understanding your baseline exposure before active testing begins gives both you and your testing team a clearer picture of what an attacker’s starting position would realistically look like. Credential leaks, exposed infrastructure, and accessible documents can all inform and strengthen a subsequent engagement.

02

Before or during a merger or acquisition:

A target organisation’s online footprint reveals information that may not appear in formal due diligence. This could be exposed credentials belonging to key staff, public code repositories containing sensitive configuration, or infrastructure that suggests undisclosed systems or services. OSINT as part of an M&A process is an increasingly common requirement.

03

Following a security incident:

Understanding what an attacker may have known about your organisation before gaining access helps contextualise how an incident occurred and what reconnaissance preceded it. It also helps identify whether further exposure remains that could be leveraged in subsequent activity.

04

As a standalone assessment of your online footprint:

Organisations that handle sensitive data, operate in regulated sectors, or have a high public profile benefit from periodic reviews of their publicly accessible information. What was true of your exposure two years ago may not reflect your current position.

05

For executive and key individual assessment:

High-profile individuals, such as executives, board members, or high net-worth individuals present a specific exposure profile. Personally identifiable information, family connections, location indicators, and personal credentials in data breaches can all be identified through publicly available sources and represent a meaningful personal and organisational risk.

What We Can Do

How we perform OSINT assessments

Our assessments cover a full range of publicly accessible sources that are relevant to your organisation and its people. Assessments are conducted entirely through passive means, where we identify information without making direct requests to your systems or infrastructure.

Infrastructure and domain intelligence

Registered domains, subdomains identified through certificate transparency logs and passive DNS, historical DNS records, exposed services, and hosting infrastructure. This establishes the technical perimeter of what is publicly attributable to your organisation.

Employee and personnel exposure

Staff that are identifiable through LinkedIn, corporate directories, conference appearances, and public profiles. Email address formats, organisational structure, and role details are all information that an attacker could use to construct a targeted phishing campaign.

Credential and breach data

Email addresses and credentials appearing in publicly available breach databases and paste sites. This includes historical dumps as well as more recent exposure. Credentials from a breach may still be in use, or may reveal password patterns that inform further attacks.

Document and metadata exposure

Publicly indexed documents, such as PDFs, spreadsheets, and presentations often contain metadata that reveals internal usernames, software versions, internal hostnames, or authorship information. The documents themselves may also contain sensitive internal content that was never intended for public access.

Code repository exposure

Public repositories on GitHub, GitLab, and other platforms associated with the organisation or its employees are a common source of accidentally exposed credentials, API keys, internal hostnames, and proprietary configuration. Whilst these sorts of risks are usually covered as part of a white-box code review, what we do is to attempt to identify areas where this data has leaked out from trusted sources.

Social media and personal information

Publicly accessible social media activity from the organisation and key individuals are relevant for understanding what operational information is inadvertently disclosed, and for executive and individual assessments where personal exposure is the primary concern.

Physical and location indicators

Image metadata, publicly posted photographs, and location-tagged content that may reveal physical patterns, office locations, or personally identifying information. Primarily relevant for executive and individual assessments.

Supplier and third-party exposure

Information attributable to key suppliers or partners that may indirectly expose your organisation. This includes shared infrastructure, co-referenced credentials, or publicly disclosed relationships that could inform an attacker’s understanding of your supply chain.

Deliverables

What your report includes

Every OSINT assessment is delivered as a written report structured for two audiences: technical teams that need to understand any relevant findings in detail, and senior stakeholders who need to understand the overall exposure and the associated risk with the information that could be gathered.

Executive summary

Covering the overall exposure level, the most significant findings, and the key actions arising from the assessment.

Risk-rated findings

For each item identified, with source attribution, detail on where and how the information was found, and an assessment of the risk it presents.

Attack path narrative

Demonstrating how identified information could be combined by a real attacker. A credential in a breach database, combined with an identified email format and a named individual in a privileged role, tells a different story than any of those findings in isolation.

Remediation and mitigation guidance

Where relevant exposures can be reduced. Not all findings are remediable, and information that is already public cannot always be removed. But where action is possible, specific guidance is provided. Where remediation is not possible, risk acceptance and monitoring recommendations are included.

Methodology and evidence

Documenting the sources consulted, the techniques used, and the evidence that supports each finding. This supports internal review and provides an audit trail for compliance purposes.

Pricing factors

How it works

Penetration test pricing varies significantly based on scope and complexity. Understanding these variables helps you get a more accurate quote and ensures your testing budget is spent where it matters most.

01

Scoping call

A short call to define the target, confirm the objectives and boundaries of the assessment, and agree the source categories to be included. Typically 15 to 30 minutes.
02

Fixed-price proposal

A written proposal confirming scope, deliverables, and cost. Delivered within 24 hours of the scoping call.
03

OSINT Assessment

Passive reconnaissance conducted across the agreed source categories. No direct interaction with your target systems or infrastructure at any point during the engagement.
04

Report delivery

Findings delivered as a written report within the agreed timeframe, with a debrief call to walk through the results with your team.

Don’t wait to see what is out there

Our team are on hand to discuss your security requirements and provide an OSINT assessment scope that meets your needs.