Texas A&M Cybersecurity Center
Lab Author: Judson Salinas, CSCE '26
Deliverables: The Lab Authors Texas A&M Email
If you found it, congrats! You are already able to apply and use basic OSINT techniques for finding information online.
Using tools such as the Texas A&M Student Directory, or searching on an email service are all ways of using technology to gather and analyze information available to you. By querying these sources with information you do have (Name, Major, Class Year) you are able to extract information that may not be readily apparent online.
Google Dorking is a technique that uses advanced search queries to find specific information on the internet. This technique can reveal exposed databases, login portals, web cameras, and more. All of which are publicly available, but not easily discoverable.
Some basic Google Dorking operators are,
These help narrow down search results making it easier to find information on a specific subject.
A search like,
site:tamu.edu filetype:pdf "Cybersecurity"
could help find specific pdf documents A&M has published on cybersecurity.
Another example is,
inurl:"ViewerFrame?Mode="
which can be used to find publicly available web cameras, using a common phrase in Panasonic camera’s web portal URL.
Reverse Image Searching is a technique that allows you to trace the origin of an image using tools which crawl the internet to find identical or similar images. This can be useful for verifying the originality of an image, finding the original source, or where else the image was used online.
Some tools that can be used for Reverse image searching are
As our lives become more digital, Social Media accounts can often reveal answers to security questions or expose other sensitive details. The information we share, can be pieced together to reveal a detailed profile of a person that could be exploited by attackers.
Online Accounts often use security questions for account recovery. These questions often use personal information such as your mothers maiden name, pet names, birth place, or favorite activities.
In this task, you will analyze your own social media presence to identify any personal information that could be exploited and learn how to better protect your information online.
I’ve hidden a secret flag on my website. The flag follows the format ‘tamuCYBR{flag_here}’.
Your task is to apply the techniques you’ve learned so far to find the secret flag hidden on judz.net, perhaps theres more than one…