Welcome to Maltego!

Let's get you setup!

Select your type of investigation

Cyber Crime Investigation

1 - Add an entity
2 - Run you Transform
3 - Get tags and Indicators

To run Get tags and indicators for Email Address [IPQS] Transform, repeat the steps below:

1.
Right-click on the entity.
2.
Find Get tags and indicators for Email Address [IPQS] in Standard Transforms OR type the name of the Transform in the Search Bar.
3.
Click "Run".

4 - Get Breaches of an Email

Breach Data allows us to obtain information on passwords, person's name, date of birth, phone numbers, or anything that our person of interest put in their profile on the website whose data has been leaked. Exploring breach data makes for a great pivot point later in our investigation to obtain information like social media, physical address, and more.

In order to find breach data, we rely on Maltego Data. While Maltego offers multiple options working with breach data, in this section we will use two of them that let us check whether an email has been leaked: Have I Been Pwned? and Darkside by District4 Labs (only available on Professional and Organization plans).

To use Have I been Pwned?, right-click on the Entity, find Have I been Pwned? in the list of Data Integrations, and select Get all breaches of an email address.

In this step we need to find out what information has been leaked. To do this, we need to click on the returned website Entity and run Enrich breached domain Transform.

5 - Install Darkside (D4) on TransformHub (Professional and Organization)
6 - Explore breaches with Maltego Data (Professional and Organization)

Darkside data integration (included on Maltego Data) can be helpful to extract specific information from the websites that experienced a data breach. Running Darkside Transforms is as easy as our previous examples. Try running D4 - Leaked Records Search (email) in your Maltego Client on your own first or jump straight into our guide below.

o use Darkside, right-click on the Entity, find Darkside in the list of Data Integrations, and select D4 - Leaked Records Search (email). Running this Transform will first return all websites and databases containing the compromised email address.

In this step we need to find out what information has been leaked. To do this, we need to select all compromised record Entities, right-click, and find D4 - Extract Personally Identifiable Information in the Transform Menu.

When you start an investigation of a person, your first instinct might be to type someone's name in a search engine. While a legitimate place to start, it often gives you irrelevant results to websites that might be only tangentially related to your person of interest.

So how to do it efficiently?

1 - Run Search Web Transform

The process of running the Transform is similar to using the Bing search engine directly but with an added convenience of result visualization in one interface that allows us to expand our investigation further all in one graph.


In this step we extract Email Addresses that appear on the websites we retrieved by dorking Jake Paul's name. An email address, unlike a person's name, is a unique identifier. While we might get two people with the same first and last name, we will never get the exact same email address twice.

Therefore, obtaining a person's email address can provide us with a pivot point to obtain relevant breach data and social media profiles.

3- Run To Phone numbers [Found on this webpage] Transform

Another valuable piece of information we can retrieve from a URL is a phone number that is often linked to a person's social media account and breach data.

To obtain a phone number from a URL, we need to repeat the same steps as with an email address: select all URL Entities and run To Phone numbers [Found on this webpage]

4 - Install ESPY and Darkside (D4) on TransformHub (Professional and Organization)
5 - Find the Person's name from the phone number with Maltego Data (Professional and Organization)

From the Phone Number Entity run Search Accounts [ESPY] Transform

This action leverages the ESPY data integration within Maltego (Available on Professional and Organization).
ESPY data integration is valuable because it incorporates data from well-known platforms like Whitepages, Spy Dialer, and Truecaller.

5 - Cross-reference with breached data using Maltego Data (Professional and Organization)

Next step is to verify our findings using a different data integration. To do this, we can turn to breached data such as Darkside by District4. From the same Phone Number Entity, find D4 – Leaked Records Search (phone) Transform and click Run.
By starting with the information obtained from ESPY, such as a person's name, we have a solid starting point for verifying the accuracy of the data found in Darkside.

6 - Enrich breached data with Maltego Data (Professional and Organization)

As a final step, to obtain the person's name from the compromised records, select all Compromised Record Entities by dragging your mouse over them, right-click and find D4 - Extract Personally Identifiable Information in the Transform Menu. Click Run.

Learn how to Investigate Emails, Names and Phones with just one click

Check our Maltego Search demo (previously called OSINT Profiler) and learn how to be 12x faster at OSINT investigations

If you already have access through Maltego Professional, Organization and is unsure about how to get started, follow the tutorial below:

Cyber Security

Investigate Phishing campaigns with ease on Maltego

Learn the foundational methodology of investigating phishing campaigns and how to speed up the process using Maltego, and how to advance your investigation with data available on Maltego Professional and Organization.

Network Footprint on Maltego

How to ensure your network footprint is comprehensive enough? Learn Maltego's network footprinting methodology and best practices of mapping an infrastructure.

Trace Cryptocurrency Transactions

Tracing cryptocurrency transactions to identify financial fraud and criminal activities like money laundering is not as complicated as one would think. Learn how to map the history of Bitcoin transactions and movements from one address to another using Maltego (further investigations require Maltego Data available on Professional and Organzation plans).

Learn how to Investigate Emails, Names and Phones with just one click

Check our Maltego Search demo (previously called OSINT Profiler) and learn how to be 12x faster at OSINT investigations

If you already have access through Maltego Professional, Organization and is unsure about how to get started, follow the tutorial below:

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.