An Attacker's View of You
Every piece of information you leave online is a puzzle piece. Here is how an attacker assembles the picture — and how you can take pieces off the board.
All content is fictional. No real reconnaissance is performed.
Follow fictional target “Alex” as an attacker pieces together a profile using only publicly available information.
Starting Point
The attacker knows two things: Alex's name and employer. That is enough to start.
Email & Breach Discovery
With the email format confirmed, the attacker checks whether Alex's address appears in known data breaches.
Social Media OSINT
The attacker now searches for Alex across social platforms, piecing together personal context from public posts.
Domain & Infrastructure
The attacker shifts focus to Alex's employer, probing publicly available technical records.
Physical Exposure
Public records and event participation reveal Alex's physical world — home address, conference attendance, and travel habits.
The Attack Begins
With a complete profile, the attacker launches targeted attacks that feel personal and legitimate.
- Full name, role, department, and reporting chain
- Work email and potentially valid credentials
- Internal tools and project names
- Home neighbourhood and travel schedule
- Manager's name and communication style
What You Can Do
Every step in this chain had a point where Alex could have reduced or eliminated the exposure. The decision tree below walks you through each category with specific, actionable remediation.
▼ Reduce Your Footprint — Start the AssessmentReduce Your Footprint
Select the area you want to assess. Each path ends with specific remediation steps ranked by difficulty.