.MKITOS

CTRL ALT ACT – Week 3: Targeting Shady Websites & Advanced OSINT

🔄 Quick Recap & Moving Forward

Hope you’ve been able to collect some basic intel on shady accounts and groups by now. If you’re still learning the ropes, that’s perfectly okay—there’s no rush. The goal here isn’t speed, it’s impact. Take your time, practice, build your skills, and revisit earlier exercises if needed.

In Week 2, we targeted miscreant accounts and groups.

Now, in Week 3, we’re stepping up. It’s time to target websites.

This is where things get interesting. If you’re into ethical hacking or digital investigations, this week will give you a bit more room to explore. 😉

🎯 Objective of the Week

Let’s be real: we all know there are websites out there hosting illegal, harmful, or non-consensual content. Whether it's leaks, manipulated NSFW content, or media meant to harass or exploit—this is your chance to contribute by collecting, reporting, and (where possible) helping to take them down or disrupt access.

Important: This task is not against NSFW content in general, but strictly against content that is illegal, non-consensual, or harmful. Also, while the focus examples may lean on NSFW sites, these methods apply to other shady or harmful websites too.

If these harmful websites can't be fully stopped, then we must at least make it harder to access them.

🛡️ Step 1: Stay Safe

🕵️‍♀️ Step 2: Discovering Harmful Sites

Find & Explore

  1. Think like a regular user — the way you’d search for content late at night 😉
  2. Use specific keywords or combinations you know are used in shady circles (e.g., “leak,” “private video,” “xxx group,” “illegal download” etc.)
  3. Explore connected or linked sites — many are part of larger networks

Example (Focus: NSFW Leak Website)

🚨 Step 3: Reporting

Basic reporting:

Advanced reporting:

🔍 Step 4: OSINT on Websites

Now the real work begins.

A. Using Google Dorking

  • Find websites matching your target keywords. Take notes and track patterns.
  • B. Collect Technical Evidence

    🧠 Step 5: Technical OSINT (Trace Website Ownership)

    1. WHOIS Lookup
    2. Pivot from Data
      • Found a phone number? Use reverse lookup tools
      • Found an email? Check for linked accounts, breaches, or social media
      • Found an IP? Use IP geolocation or hosting info tools
      • Use OSINT Framework
    3. Look for Similar Sites
      • Many illegal sites operate in networks
      • Use structural similarities or shared content to identify clones or backups
    4. Build a Map
      • Create a small diagram or document to track how sites are connected, who runs what, and where you can intervene
    5. Compile Your Report
      • Include screenshots, URLs, WHOIS data, and links to reports you filed
      • Share with trusted organizations, cybercrime units, or relevant NGOs

    📺 Beginner's intro to website OSINT

    ⚠️ Notes & Tips

    🔬 Step 6: Advanced Analysis – Tracing Content

    Sometimes you’ll come across identifiable people or places in the content. Here’s how to handle it:

    🔍 Every detail matters. A shadow, a poster, a light pole—don’t overlook anything.

    🧑‍💻 Bonus: What Can Ethical Hackers Do?

    Answer these questions to see how deep you can go:

    📺 Beginner's intro to website hacking:

    ⚠️ Reminder:
    This is for awareness and ethical research only. Any misuse is strictly discouraged.

    📚 Useful Tools & Resources

    ✍️ Final Words

    Remember, this work is challenging but essential. Targeting harmful websites isn’t just about investigation—it’s about making the internet safer for everyone. Stay safe, work smart, and report responsibly.

    Good luck, and if you need help, just ask!

    🎉 Achievement Unlocked: Week 3 Completed – Targeting Shady Websites & Advanced OSINT

    🚀 Ready for Week 4?

    In the next week, we’ll focus on how to properly compile your findings, structure professional OSINT reports, and learn where and how to submit them effectively for action. Whether it's law enforcement, NGOs, or platforms—get ready to turn research into impact.

    ← Previous: Week 2 – Dummy Accounts & Targeting Miscreant Profiles Next: Week 4 – Report Making & Submissions →