️‍Training Sample

️‍♂️ Training Sample: Tracking Online Identities (Using Free Tools Only!)

Objective:

By the end of this training, you’ll be able to identify, research, and connect online identity breadcrumbs without spending a penny—just using open-source techniques and free tools.


Step 1: Start with Search Engines

Tools Used: Google, DuckDuckGo

Goal: Locate names, usernames, emails, and online activity using search syntax.

✅ Try These in Google:

TechniqueSyntax Example
Exact phrase search"Samantha Reed" London
Search within a websitesite:linkedin.com "Samantha Reed"
Exclude words"Samantha Reed" -twitter

Trainer Tip: Google hides gems if you don’t know how to ask! Try combining site searches with quotation marks for laser-targeted results.

Try This Now:

Search for:
site:instagram.com “@sammie_reed”
What did you find? Is it a personal or business account?


Step 2: Dive Into Social Media

Tools Used: Facebook, LinkedIn, Twitter, Social Searcher, Twint

Check:

  • Profile photos – are they reused?

  • Comments & likes – who are they interacting with?

  • Locations tagged – any patterns?

Free Tools:

Investigator Insight: Even deleted Twitter accounts can leave echoes—check replies and mentions via Twint!


Step 3: Reverse Image Search

Tools Used: Google Images, Yandex, TinEye, ExifTool

Upload or paste the image URL into:

Metadata Clues:

Use ExifTool on original photos to uncover:

  • GPS location

  • Date/Time

  • Camera device

Test It! Drop a profile image into Google Images. Any LinkedIn matches?


Step 4: Investigate Email Addresses

Tools Used: Have I Been Pwned, Hunter.io, EmailHippo

✅ Checklist:

Hot Tip: A breached email often reveals usernames, passwords, or associated sites—a goldmine for pivoting!


Step 5: Domain and Website Lookup

Tools Used: WHOIS, Wayback Machine

️‍♀️ Find Out:

  • Who registered the domain?

  • Where are they hosted?

  • What did the website look like 3 years ago?

✅ Try:

Activity: Look up the domain from an email (e.g. @bobsbarber.biz). Is the registrant name public? Any old versions of the site?


Step 6: Cross-Reference and Connect the Dots

Tools Used: Namechk, Sherlock (optional), Your spreadsheet

People often reuse usernames and emails. Link them together!

Try:

  • namechk.com: See where a username is registered

  • Manually compare usernames, handles, avatars, and bios

️ Connect:

ClueFound On
@sammie_reedTwitter, Instagram, Pinterest
samantha.r@edu.comEmail, LinkedIn
Profile image matchFacebook + TikTok

Note: Always record connections. Visual tools like Maltego (community edition) or even a mind map help build a solid case.


⚖️ Step 7: Keep It Legal & Ethical

Do:

  • Stick to publicly available information

  • Use VPN or anonymised browsers when needed

  • Document your methodology

Don’t:

  • Attempt to hack, phish, or access private databases

  • Impersonate others to gain access

  • Post findings without considering data protection laws

Pro Tip: Ethical OSINT = sustainable OSINT. Respect privacy, even when investigating it.


Wrap-Up Quiz: Test Your Skills!

✅ Match the tool to its use:

ToolUse
Hunter.ioa. Check data breaches
Twintb. Find professional emails
ExifToolc. Scan tweets & mentions
Have I Been Pwnedd. Read image metadata

Answers at the bottom of the page


Share Your Toolkit!

What’s YOUR favourite free OSINT tool or trick?
Drop it below and let’s learn from each other.


Answers to Quiz:

  • Hunter.io → b

  • Twint → c

  • ExifTool → d

  • Have I Been Pwned → a