SEC504: Hacker Tools, Techniques, and Incident Handling

Experience SANS training through course previews.
Learn MoreLet us help.
Contact usConnect, learn, and share with other cybersecurity professionals
Engage, challenge, and network with fellow CISOs in this exclusive community of security leaders
Become a member for instant access to our free resources.
Sign UpMission-focused cybersecurity training for government, defense, and education
Explore industry-specific programming and customized training solutions
Sponsor a SANS event or research paper
We're here to help.
Contact UsLearn about Sock Puppets, the benefits of using them, and best practices for setting them up.
Sock puppets, also known as research accounts, are online fictitious identities used to conceal the true identity of the OSINT investigator and to gain access to information that requires an account to access.
Remember, you are responsible for reading and understanding the Terms of Service for the websites you use because creating fake accounts goes against some platforms' Terms of Service; however, this is not usually illegal. It's equally important to check with your organization's policies to ensure you have permission to create and use sock puppets.
OSINT investigators create sock puppets so they can access content on various sites, such as social media platforms, where content is only available with an account.
Sock puppets are also created to isolate OSINT research, ensuring a separation between the personal and work lives of OSINT investigators. It is essential to emphasize the importance of separating an OSINT investigator's real identity from their research accounts, otherwise known as practicing good Operational Security (OPSEC).
Some platforms, such as Facebook, may tell a target they are being investigated through friend recommendations. Further, suppose you use your personal accounts to conduct OSINT research; you may accidentally "like" a post on your target's profile or accidentally send a friend request.
Posing the following question may help you further understand why it matters that you create sock puppets before researching targets. If you were a police officer, would you conduct surveillance using your personal vehicle? Most of you would hopefully answer "no"; you would not do that. The question to ask yourself is why you would use a personal Facebook account to research your subject. It's similar because your vehicle links to your real identity, just as your social media accounts link back to your real identity.
It is recommended that OSINT investigators avoid using their personal social media accounts for research purposes to uphold their privacy and security and ensure the investigation's integrity. Keeping personal and work accounts separate when conducting research is crucial for gathering information discretely and anonymously for good OPSEC.
Most OSINT investigators will conduct passive research. That being said, it's important to understand the difference between passive versus active open-source research and collection because how sock accounts are set up will differ depending on the research type.
Passive means you do not engage with a target. However, your profile might still end up in these results of such things as "suggested friends" or "people to follow," so you may want to blend in a little. Choosing a name that blends into your target group is a good idea.
Active research means engaging with a target in some fashion, i.e., adding the target as a Facebook friend. Blending in with the target group is even more imperative for active research. If you are engaging with a target, you may want to create a couple of accounts on different platforms to make it look like you're a real person.
Creating research accounts is not easy, and often, trial and error wins the day.
There is no step-by-step process when setting up accounts, but these are some considerations before creating a research account; some points may seem basic but are equally important.
The best advice is to appear as any regular user who wants to create an account. There are several things to think about. For instance, a typical user would not hesitate when entering their email address and password.
Learn more about OSITN by taking SEC497 Practical Open-Source Intelligence (OSINT)
Ritu Gill is an Intelligence Analyst with 15 years of experience working with Canadian law enforcement, 12 of those years were with the Royal Canadian Mounted Police (RCMP). Her specialties include investigations and open-source intelligence (OSINT).
Read more about Ritu Gill