People as the Payload: OSINT Tactics for Identity Tracing, Social Graphing, and Executive Recon
Recon Village @ DEF CON 33 • 8th, 9th and 10th August 2025
Abstract
In today’s threat landscape, people are often the weakest link-and attackers are aware of it. From phishing and impersonation to executive targeting and account compromise, adversaries increasingly use open-source intelligence (OSINT) to build detailed profiles of individuals long before launching an attack.
This session dives into the evolving art of people-focused reconnaissance, demonstrating how seemingly harmless public data can be weaponized into precise social engineering campaigns, identity spoofing, and credential pivoting.
We’ll cover:
Identity tracing techniques using breach data, professional directories, dark web leaks, and forgotten digital breadcrumbs
Building detailed social graphs across platforms like LinkedIn, GitHub, Twitter/X, Facebook, and academic/industry conference rosters
Tools and techniques to identify executive targets, their digital habits, exposed credentials, and behavioral patterns
Mapping corporate org structures and vendor relationships through public filings, social posts, and collaboration tools
How to uncover personal infrastructure (GitHub repos, sandbox environments, demo servers) tied to specific developers or architects
Cross-referencing usernames, email handles, avatars, and metadata to track digital identities across platforms
Using automation to generate identity maps and behavioral timelines using OSINT scripts and browser automation frameworks
You’ll also learn how attackers combine this recon with voice deepfakes, domain typosquatting, and AI-generated emails to execute convincing social engineering attacks-especially against high-value individuals.
While this session is grounded in offensive techniques, it’s highly actionable for blue teams, threat intel analysts, and enterprise security leaders. We’ll walk through real-world case studies where simple recon led to large-scale breaches, compromised business email accounts, and insider attacks.
Takeaways will include:
A checklist for assessing your organization’s exposed human attack surface
Tools and workflows to replicate attacker tactics in your threat modeling and phishing simulations
Guidance on proactive identity protection and executive exposure management
Strategies to anonymize or reduce OSINT footprint without undermining productivity
In an era where people are increasingly the payload-not just the target-understanding how digital identities are discovered, mapped, and exploited is critical to building a truly defensible organization.
Speakers
Exeter Finance LLC - Senior Security Engineer
Ankit Gupta is a cybersecurity expert with over 15 years of experience protecting organizations from digital threats. He specializes in cloud security, identity management, and advanced cybersecurity approaches integrating artificial intelligence and zero-trust principles. Ankit currently serves as a Senior Security Engineer, where he develops strategies to safeguard sensitive data, manage risks associated with emerging technologies, and ensure compliance with complex regulatory requirements. He regularly shares his knowledge with the cybersecurity community through speaking engagements and written contributions, providing practical guidance on securely adopting new technologies and effectively managing cyber risks.
View full speaker profile →Tyson Foods Inc.
Shilpi Mittal is a cybersecurity professional with deep expertise in protecting enterprise systems, cloud environments, and development pipelines. As a Lead IT Security Engineer, she designs and oversees security strategies that balance innovation with risk management across large-scale infrastructures. Her work focuses on identity and access management, secure development lifecycle practices, secrets governance, and vulnerability management. Shilpi is also committed to continuous learning and thought leadership, having contributed as a public speaker and an evaluator for global cybersecurity recognitions. She is known for her ability to translate complex security requirements into practical, scalable solutions that support both business and compliance goals.
View full speaker profile →
