OSINT in the Browser with Mitaka Tool

Man

Professional
Messages
3,070
Reaction score
606
Points
113
In our opinion, this is the best free internet intelligence tool.

Salute to all, dear friends!

Mitaka is an open source tool developed by Niseki Manabu.

With this tool we can easily search and detect malicious web pages and other components, i.e. files, email addresses, domains, links and other characteristics used to distinguish between malicious and non-malicious components.

This tool works as an extension in both Chrome and Firefox web browsers.
In this article we will tell you how to install and use this tool.

Prerequisites​

Mitaka, as an extension, can work on any operating system, provided that the system has the Chrome or Firefox browser installed.

A short review of the Mitaka tool​

The tool discussed in this article has various features that make it the best open source intelligence tool because it has features that make it easily applicable for users regardless of their technical knowledge:
  • It is easy to install as it is designed as a browser extension.
  • Compared to other similar tools, it is completely free.
  • Supports multiple scanning and search engines for checking IoCs.
  • The tool supports searching for various indicators of compromise.

What exactly can you look for:
  • Search for cryptocurrency wallet addresses. (BTC, ETH wallets)
  • search by CVE numbers
  • domain name search
  • Search email addresses
  • Search by Google Adsense Publisher ID and Google Analytics Tracker ID
  • Search by IPv4 addresses
  • Search by URLs

Supported scanning engines:
  1. Browserling
  2. Hybrid Analysis
  3. io
  4. VirusTotal

Supported search engines:
  1. Shodan
  2. Sploitus
  3. Radar
  4. Scumware
  5. VirusTotal
  • An updated list of all available search and scanning engines can be found on the tool's official GitHub repository:

demo.gif


Well, now that you are convinced of the usefulness of this tool, it's time to install it...

Installing Mitaka​

Installing the Mitaka OSINT tool is as easy as installing any other extension to your browser.

First, you go to the Firefox Add-Ons section and click on the install button to install the extension, as shown in the screenshot below:

mitaka.png


When installing Mitaka, you may need a few additional permissions to ensure it runs efficiently, including:
  • Permission to display notifications.
  • Permission to change and read data visited by the user.
When performing OSINT, some search engines will require you to provide an API key (HybridAnalysis and [B']VirusTotal[/B]).

These sites will require you to create an account on their site so that you can get an API key.

Example of use: Let's perform malware analysis​

When downloading an application or file from a website, we typically compare the hash found on the site with the hash generated on the client side after downloading the file.

In some cases, the user relies on the results of the scan carried out by the antivirus programs installed on his computer.

Hackers use advanced malware that in some cases is not detected by the antivirus program installed on the computer.

Using Mitaka's tool, we can check the hash of the app's website against malware scanners found on the internet to confirm its legitimacy.

Once a hash is found to be malicious, a summary and details of the malware found will be displayed in a new search engine tab.

Use Case: Email Analysis​

Mitaka's tool can also be used to analyze suspicious emails.

Various IoCs are checked against various OSINT search engines to confirm the authenticity of the email.

One type of analysis is checking the reputation of a suspicious email in various Internet search engines.

We can also check the reputation of the domain associated with the email.

Mitaka takes an extra step to check if the suspected email has accounts on other reputable sites like LinkedIn, Facebook, Twitter, and many others.

Example of use: Email verification with emailrep.io​

To check a suspicious email address using Mitaka, we simply highlight the email address and then select it to scan using the various email search tools found in this tool.

Depending on the search engine you use to search for email, different information may be retrieved from the search.

The image below shows the result of searching for a suspicious email address using emailrep.io.

emailrep.png


Example of use: checking for a malicious crypto address​

We can also check for suspicious cryptocurrency addresses on the internet using Mitaka.

This tool will scan various websites that have databases of cryptocurrency wallet addresses used by scammers and people with malicious intentions around the world.

Example of use: Checking IP address​

Checking for a malicious IP address is similar to searching for malicious email, only in this case we use search engines used to collect and store IP addresses associated with malicious activity around the world.

That's all for today. Enjoy using it!
 
Top