## 9. Appendices ### Appendix A – Screenshots | # | Description | File | |---|-------------|------| | 1 | Unauthenticated admin panel login page | `admin_panel.png` | | 2 | Exposed `.env` file (redacted) | `env_file.png` | | 3 | EXIF GPS coordinates from Instagram photo | `photo_exif.png` |
## 7. Recommendations (Prioritized) 1. **Immediate Actions (0‑7 days)** - Rotate all exposed secrets (API keys, tokens). - Secure admin interfaces (auth, MFA, IP restrictions). - Reset passwords for compromised accounts; enforce 2FA. 2. **Short‑Term (7‑30 days)** - Implement a **DMARC** policy and monitor email spoofing. - Conduct a **code‑review audit** for all public repositories. - Deploy a **web‑application firewall (WAF)** for public services. 3. **Mid‑Term (30‑90 days)** - Harden DNS (DNSSEC, registrar lock‑up). - Establish a continuous **OSINT monitoring** pipeline (e.g., SpiderFoot automation). - Provide security awareness training focused on phishing. 4. **Long‑Term (90 + days)** - Adopt a formal **vulnerability management** program. - Periodic **penetration testing** and **red‑team** exercises. - Review and update **incident response** playbooks. OSINT Report.zip
### 5.2 Notable Indicators of Compromise / Risks | Indicator | Description | Evidence | Risk Level | |-----------|-------------|----------|------------| | **Hard‑coded API key** | `X-API-KEY: abc123…` found in public repo `config.js` | `https://github.com/example/example‑app/blob/main/config.js` | High | | **Exposed Admin Panel** | `https://admin.example.com` reachable without auth | Screenshot (see Appendix A) | Medium | | **Credential Leak** | Email‑password pairs from `data_leak_2024.txt` on Pastebin | `https://pastebin.com/abcd1234` | High | | **Phishing Campaign** | Same domain used in recent phishing emails targeting customers | Header analysis – `Received: from mail.example.com` | Medium | | **Geo‑Tagged Photos** | Instagram posts reveal office interior layout | EXIF GPS coordinates `40.7128, -74.0060` | Low‑Medium | **Immediate Actions (0‑7 days)** - Rotate all exposed
---
### Appendix C – Reference List 1. **OSINT Framework** – https://osintframework.com/ 2. **MITRE ATT&CK** – https://attack.mitre.org/ 3. **NIST SP 800‑115** – Technical Guide to Information Security Testing and Assessment. tokens). - Secure admin interfaces (auth
---
### Appendix B – Raw Data Samples - `whois_example.txt` – WHOIS dump for `example.com`. - `shodan_api_example.json` – Shodan JSON output for `api.example.com`. - `tweets_@example_2024.csv` – Exported tweet list (date, text, retweets).