CTRL ALT ACT – Week 3: Targeting Shady Websites & Advanced OSINT
🔄 Quick Recap & Moving Forward
Hope you’ve been able to collect some basic intel on shady accounts and groups by now. If you’re still learning the ropes, that’s perfectly okay—there’s no rush. The goal here isn’t speed, it’s impact. Take your time, practice, build your skills, and revisit earlier exercises if needed.
In Week 2, we targeted miscreant accounts and groups.
Now, in Week 3, we’re stepping up. It’s time to target websites.
This is where things get interesting. If you’re into ethical hacking or digital investigations, this week will give you a bit more room to explore. 😉
🎯 Objective of the Week
Let’s be real: we all know there are websites out there hosting illegal, harmful, or non-consensual content. Whether it's leaks, manipulated NSFW content, or media meant to harass or exploit—this is your chance to contribute by collecting, reporting, and (where possible) helping to take them down or disrupt access.
Important: This task is not against NSFW content in general, but strictly against content that is illegal, non-consensual, or harmful. Also, while the focus examples may lean on NSFW sites, these methods apply to other shady or harmful websites too.
If these harmful websites can't be fully stopped, then we must at least make it harder to access them.
🛡️ Step 1: Stay Safe
- Use TOR or a trusted VPN
- Avoid using your personal identity or accounts
- Work in Incognito/Private mode
- Clear your cache & history after each session
🕵️♀️ Step 2: Discovering Harmful Sites
Find & Explore
- Think like a regular user — the way you’d search for content late at night 😉
- Use specific keywords or combinations you know are used in shady circles (e.g., “leak,” “private video,” “xxx group,” “illegal download” etc.)
- Explore connected or linked sites — many are part of larger networks
Example (Focus: NSFW Leak Website)
- You find a website that hosts explicit content
- You scroll and come across content that looks non-consensual or manipulated
- Document it:
- Take a screenshot with URL visible (or just copy the URL if privacy is a concern)
- Look for usernames, timestamps, titles, or any hint of origin
🚨 Step 3: Reporting
Basic reporting:
- Look for report buttons or contact options on the website
- Submit URLs and explain briefly what you found
Advanced reporting:
- Use platforms like cybercrime.gov.in (India) or equivalents in your country
- Refer back to the reporting steps shared in Week 2
🔍 Step 4: OSINT on Websites
Now the real work begins.
A. Using Google Dorking
- Use focused search queries to find suspicious or harmful content:
site:.xyz inurl:leak– shady media hosting sitesintext:"private video" filetype:mp4– check for non-consensual mediainurl:"illegal streaming"– platforms hosting pirated contentintext:"free download" AND ("cracked software" OR "pirated movie")site:pastebin.com intext:"password"– to find credential dumps for awareness/reportinginurl:"forum" AND ("buy fake ID" OR "counterfeit")– for black market forumsintext:"telegram link" AND ("illegal" OR "deep web")
- ⚠️ Important: These searches are for documentation and reporting only.
Do not interact, download, or exploit anything you find. Your role is to observe, document, and contribute to ethical takedowns.
B. Collect Technical Evidence
- Screenshot key pages
- Note all URLs and domains
- Check the source of uploaded content (user, profile, timestamp, etc.)
- Visit linked domains or redirecting versions
🧠 Step 5: Technical OSINT (Trace Website Ownership)
- WHOIS Lookup
- Use tools like who.is or ICANN Lookup
- Look for: name, phone, email, hosting provider
- Pivot from Data
- Found a phone number? Use reverse lookup tools
- Found an email? Check for linked accounts, breaches, or social media
- Found an IP? Use IP geolocation or hosting info tools
- Use OSINT Framework
- Look for Similar Sites
- Many illegal sites operate in networks
- Use structural similarities or shared content to identify clones or backups
- Build a Map
- Create a small diagram or document to track how sites are connected, who runs what, and where you can intervene
- Compile Your Report
- Include screenshots, URLs, WHOIS data, and links to reports you filed
- Share with trusted organizations, cybercrime units, or relevant NGOs
📺 Beginner's intro to website OSINT
⚠️ Notes & Tips
- Do not engage with website operators directly
- Preserve your anonymity and data security
- Use burner accounts or anonymous email addresses when reporting
- Some sites may use CDN or cloud services to hide real IPs — use traceroute tools for deeper analysis
🔬 Step 6: Advanced Analysis – Tracing Content
Sometimes you’ll come across identifiable people or places in the content. Here’s how to handle it:
- Face is visible? Use reverse image search, face recognition tools, or people search engines
- Background visible?
🔍 Every detail matters. A shadow, a poster, a light pole—don’t overlook anything.
🧑💻 Bonus: What Can Ethical Hackers Do?
Answer these questions to see how deep you can go:
- What info can you extract from the site’s IP?
- Found an email? Can it be spoofed or monitored?
- What’s the tech stack? Use BuiltWith
- Scan it with Nmap, check for open ports
- Can you access the admin page or backend structure?
- Try intercepting traffic using Burp Suite
📺 Beginner's intro to website hacking:
⚠️ Reminder:
This is for awareness and ethical research only. Any misuse is strictly discouraged.
📚 Useful Tools & Resources
- TOR Browser
- Google Hacking Database (GHDB)
- Who.is (WHOIS Lookup)
- Have I Been Pwned (email breach check)
- Shodan (IoT & Website Scanner)
- Cybercrime Reporting Portal (India)
✍️ Final Words
Remember, this work is challenging but essential. Targeting harmful websites isn’t just about investigation—it’s about making the internet safer for everyone. Stay safe, work smart, and report responsibly.
Good luck, and if you need help, just ask!
🚀 Ready for Week 4?
In the next week, we’ll focus on how to properly compile your findings, structure professional OSINT reports, and learn where and how to submit them effectively for action. Whether it's law enforcement, NGOs, or platforms—get ready to turn research into impact.
← Previous: Week 2 – Dummy Accounts & Targeting Miscreant Profiles Next: Week 4 – Report Making & Submissions →