Back to Talks 2025
Talk

People as the Payload: OSINT Tactics for Identity Tracing, Social Graphing, and Executive Recon

Recon Village @ DEF CON 338th, 9th and 10th August 2025

Abstract

In today’s threat landscape, people are often the weakest link-and attackers are aware of it. From phishing and impersonation to executive targeting and account compromise, adversaries increasingly use open-source intelligence (OSINT) to build detailed profiles of individuals long before launching an attack.

This session dives into the evolving art of people-focused reconnaissance, demonstrating how seemingly harmless public data can be weaponized into precise social engineering campaigns, identity spoofing, and credential pivoting.

We’ll cover:

Identity tracing techniques using breach data, professional directories, dark web leaks, and forgotten digital breadcrumbs

Building detailed social graphs across platforms like LinkedIn, GitHub, Twitter/X, Facebook, and academic/industry conference rosters

Tools and techniques to identify executive targets, their digital habits, exposed credentials, and behavioral patterns

Mapping corporate org structures and vendor relationships through public filings, social posts, and collaboration tools

How to uncover personal infrastructure (GitHub repos, sandbox environments, demo servers) tied to specific developers or architects

Cross-referencing usernames, email handles, avatars, and metadata to track digital identities across platforms

Using automation to generate identity maps and behavioral timelines using OSINT scripts and browser automation frameworks

You’ll also learn how attackers combine this recon with voice deepfakes, domain typosquatting, and AI-generated emails to execute convincing social engineering attacks-especially against high-value individuals.

While this session is grounded in offensive techniques, it’s highly actionable for blue teams, threat intel analysts, and enterprise security leaders. We’ll walk through real-world case studies where simple recon led to large-scale breaches, compromised business email accounts, and insider attacks.

Takeaways will include:

A checklist for assessing your organization’s exposed human attack surface

Tools and workflows to replicate attacker tactics in your threat modeling and phishing simulations

Guidance on proactive identity protection and executive exposure management

Strategies to anonymize or reduce OSINT footprint without undermining productivity

In an era where people are increasingly the payload-not just the target-understanding how digital identities are discovered, mapped, and exploited is critical to building a truly defensible organization.

Speakers

Ankit Gupta
Ankit Gupta

Exeter Finance LLC - Senior Security Engineer

Ankit Gupta is a cybersecurity expert with over 15 years of experience protecting organizations from digital threats. He specializes in cloud security, identity management, and advanced cybersecurity approaches integrating artificial intelligence and zero-trust principles. Ankit currently serves as a Senior Security Engineer, where he develops strategies to safeguard sensitive data, manage risks associated with emerging technologies, and ensure compliance with complex regulatory requirements. He regularly shares his knowledge with the cybersecurity community through speaking engagements and written contributions, providing practical guidance on securely adopting new technologies and effectively managing cyber risks.

View full speaker profile →
Shilpi Mittal
Shilpi Mittal

Tyson Foods Inc.

Shilpi Mittal is a cybersecurity professional with deep expertise in protecting enterprise systems, cloud environments, and development pipelines. As a Lead IT Security Engineer, she designs and oversees security strategies that balance innovation with risk management across large-scale infrastructures. Her work focuses on identity and access management, secure development lifecycle practices, secrets governance, and vulnerability management. Shilpi is also committed to continuous learning and thought leadership, having contributed as a public speaker and an evaluator for global cybersecurity recognitions. She is known for her ability to translate complex security requirements into practical, scalable solutions that support both business and compliance goals.

View full speaker profile →