githubEdit

window-restoreMitaka - In-Browser Tool

Introduction

Web browser extensionsarrow-up-right are one of the simplest ways to get starting using open-source intelligence tools because they're cross-platform. So anyone using Chrome on Linux, macOS, and Windows can use them all the same. The same goes for Firefox. One desktop browser add-on, in particular, makes OSINT as easy as right-clicking to search for hashes, email addresses, and URLs.

Mitaka, created by Manabu Nisekiarrow-up-right, works in Google Chrome and Mozilla Firefox. Once installed, it lets you select and inspect certain pieces of text and indicators of compromise (IoC), running them through a variety of different search engines, all with just a few clicks. The tool can help investigators identify malware, determine the credibility of an email address, and see if a URL is associated with anything sketchy, to name just a few things.

Installation

Inspecting Email Addresses

  • Select the Email Address

  • Right click

  • Choose Mitaka

  • Choose any option from the list to gather the information about the email

Perform Malware Analysis on the Files

  • Select the Hash

  • Right click

  • Choose Mitaka

  • Choose any option from the list to gather the information about the hash

Checking to See if a Site Is Sketchy

  • Select the domain name

  • Right click

  • Choose Mitaka

  • Choose any option from the list to gather the information about the domain


REFERENCES

Last updated