TTPwire Vol. 1 · MITRE ATT&CK·Tagged

← All stories

ESET WeLiveSecurity

The OSINT advantage: Find your weak spots before attackers do

2025-11-20 · Read original ↗

ATT&CK techniques detected

2 predictions
T1589.002Email Addresses
43%
"check breach databases such as have i been pwned to see if company emails appear in known leaks. - they also use google dorks to search for publicly exposed documents ( e. g., “ filetype : xls ceo email " ) - they scan for unprotected servers using shodan or censys. - using malte…"
T1592Gather Victim Host Information
31%
"a plethora of open - source and proprietary tools that automate data collection and analysis. some of the most common ones are : - shodan and censys : these are staples among search engines for internet - connected devices, such as routers and ip cameras. they help you see what ’…"

Summary

Here’s how open-source intelligence helps trace your digital footprint and uncover your weak points, plus a few essential tools to connect the dots