OsintMachineGuide

Welcome to the OsintMachineGuide

This project is part of the proposal for the OPSEC-for-OSINT(OFO) repository. OFO is a collaborative community dedicated to assisting OSINT investigators with advanced OPSEC processes. Together, we explore innovative strategies to ensure security and effectiveness in their investigations.

Hardened HOST Machine for OSINT

While it is impossible to make a machine 100% impenetrable, given the capabilities, time, and resources of powerful adversaries, no online system can be considered completely secure. However, by following the settings in this GUIDE, it becomes significantly more challenging for an attacker to carry out their actions. Additionally, this machine is resistant to persistent malware, incorporating more than 18 advanced protection settings that cover the main types of attacks. See the main ones below

Morphing Debian(Linux Hardening)

Transform Debian into Kicksecure, an operating system built with default hardening, covering key types of attacks.

Brute Force Defense

Kicksecure protects Linux user accounts against brute force attacks by using pam tally2.

Virus Protection

Kicksecure provides additional security hardening measures and user education for better protection from virus attacks.

Swap File Creator

Running low on RAM isn't a security problem with swap-file-creator. It will create an encrypted swap file.

Virtual Machine Installation

Secure download + Installation and PGP key verification, done correctly, ensuring your VMs stay secure.

Rotating Proxy Configuration

Rotating Proxy settings under the Tor service, ensuring your investigations remain private.

Protection from Targeted Malicious Updates

Kicksecure update servers know neither the identity nor IP address of the user because all upgrades are downloaded over Tor.

Kernel Self Protection Settings.

Kicksecure uses strong Kernel Hardening Settings as recommended by the Kernel Self Protection Project (KSPP).

Live Mode

Kicksecure offers a much requested Live Mode. After the session all data will be gone.

Risk Minimization

AppArmor profiles restrict the capabilities of commonly used, high-risk applications.

Strong Linux User Account Separation

Linux User Account Separation is not always a given on Linux systems. In Kicksecure it is.

Time Attack Protection

Kicksecure defeats time attacks on its users through Boot Clock Randomization and secure network time synchronization using sdwdate.

No Open Ports by Default

Kicksecure provides a much lower attack surface since there are no open server ports by default unlike in some other Linux distributions.

CPU Information Leak Protection (TCP ISN)

Without TCP ISN randomization, sensitive information about a system's CPU activity can be leaked through outgoing traffic, leaving it vulnerable to side-channel attacks. tirdad prevents that.

Entropy Enhancements

Strong entropy is required for computer security to ensure the unpredictability and randomness of cryptographic keys and other security-related processes. Kicksecure makes encryption more secure thanks to preinstalled random number generators.

Tor-Browser Verification

Processo para download e verificação de assinatura do Tor Browser e configurações iniciais de segurança.

Hard Firewall Install and Regras.

Instalação de Firewall + Configuração Hardening de Regas avançadas para garantir maior segurança!

Installation Privacy Applications

Instale aplicativos focados em privacidade e OPSEC, como Kleopatra, KeePassXC, Zulu Crypt, e outras.

Works with your technologies

Do you need help?

Access the frequently asked questions in the repository and get your doubts cleared right away!