Case StudiesOSINT

Practice your OSINT skills with real-world investigation scenarios. Learn by solving actual cases.

Content under development

OSINT case studies are currently under development and will be available soon.

Come back soon to discover exciting investigation scenarios!

Why case studies?

Learning by doing is the best way to master OSINT. These case studies allow you to apply your theoretical knowledge to real investigation situations.

Real Scenarios

Based on authentic investigation cases encountered by cybersecurity professionals.

Progressive Learning

Increasing difficulty to guide you from beginner level to advanced expertise.

Practical Skills

Develop skills directly applicable to your daily work.

Choose your investigation

Select a case study suited to your level and learning objectives. Each case includes tools, objectives, and detailed solutions.

Intermediate
2-3 hours

Phishing Attack Investigation

Trace the origin of a phishing campaign using advanced OSINT techniques

Objectives:

  • Identify attack infrastructure
  • Track malicious domains
  • Analyze techniques used
  • +1 more objectives

Tools used:

theHarvesterShodanVirusTotalWHOIS

Skills developed:

Domain analysisEmail investigationIoC correlation
Start this case
Beginner
1-2 hours

Target Company Reconnaissance

Gather information about an organization using only open-source information

Objectives:

  • Map the attack surface
  • Identify key employees
  • Discover technologies in use
  • +1 more objectives

Tools used:

Google DorkingLinkedInShodanMaltego

Skills developed:

Passive reconnaissanceSocial engineering prepAsset discovery
Start this case
Advanced
3-4 hours

Data Breach Analysis

Investigate a data breach to understand its origin and impact

Objectives:

  • Identify the source of the breach
  • Assess impact on victims
  • Track data distribution
  • +1 more objectives

Tools used:

HaveIBeenPwnedDehashedPiplIntelTechniques

Skills developed:

Data breach analysisVictim identificationImpact assessment
Start this case
Intermediate
2-3 hours

Digital Identity Investigation

Reconstruct a person's complete digital identity from minimal information

Objectives:

  • Identify associated accounts
  • Map social relationships
  • Discover digital history
  • +1 more objectives

Tools used:

SherlockPiplTruePeopleSearchSocial Media

Skills developed:

People searchSocial media analysisIdentity correlation
Start this case
Advanced
4-5 hours

Malicious Infrastructure Analysis

Dismantle a command & control infrastructure using OSINT

Objectives:

  • Identify C2 servers
  • Map complete infrastructure
  • Discover associated domains
  • +1 more objectives

Tools used:

PassiveTotalShodanURLVoidCensys

Skills developed:

Malware analysisInfrastructure mappingThreat attribution
Start this case
Intermediate
2-3 hours

Geospatial Investigation

Use geospatial analysis to solve a location mystery

Objectives:

  • Analyze visual clues
  • Use shadows and light
  • Identify landmarks
  • +1 more objectives

Tools used:

Google EarthYandexWikimapiaSunCalc

Skills developed:

Geospatial analysisVisual intelligenceLocation verification
Start this case

Tips for success

Document everything

Take detailed notes and screenshots of each step of your investigation.

Think methodology

Follow a structured and reproducible approach for your investigations.

Respect ethics

Stay within legal and ethical boundaries, even in a learning context.

Ready to become an OSINT investigator?

Start with a case suited to your level and progress towards more complex investigations.