OSINT Technique - Reverse Image Search

OSINT stands for Open Source Intelligence which is used for getting information available in the public domain related to the target. The reverse image search is one technique that helps you to get the information of the target if images are available. This blog lists different methods and search engines available used for getting information about the target. We have used our website logo as a test image. You can Save As below image to download it and test what information you will get from different sources.

You can start with Googe Image Search. Google is the source of goldmine if used correctly. Most of the time you get enough information about the target just by using Google. Just Click Here to launch Google's image search.

Upload the test image or target image or drag it from the folder. Here, you can also provide the URL of that image. Below, I just upload the image (logo of AAT) on Google Image Search.

You can scroll through other results to check what information you got from the image.

Step 2: By using Yandex Search Engine

Click Here to start an image search on Yandex. You can also use Yandex Image Search to get more information about the target. Below, I have just uploaded a test image on the Yandex search engine.

Step 3: By using TinEye

Click Here to launch the TinEye search engine. Below, I have just uploaded a test image on the TinEye search engine.

Click Here to launch the Bing image search engine. Below, I have just uploaded a test image on the Bing image search engine.

Conclusion

Reverse image search is one technique that helps you to get information about the target. This type of technique extracts information from the publically available information that may be available on social media accounts, job portals, educational institutes, etc. This blog lists basically four search engines namely Google, Yandex, TinEye, and Bing for reverse image search and also suggested that most of the information will get it from Google only.

Subscribe us to receive more such articles updates in your email.

If you have any questions, feel free to ask in the comments section below. Nothing gives me greater joy than helping my readers!

Disclaimer: This tutorial is for educational purpose only. Individual is solely responsible for any illegal act.

You may also like...

Leave a Reply

Your email address will not be published. Required fields are marked *

10 Blockchain Security Vulnerabilities OWASP API Top 10 - 2023 7 Facts You Should Know About WormGPT OWASP Top 10 for Large Language Models (LLMs) Applications Top 10 Blockchain Security Issues