National Cyber Warfare Foundation (NCWF)


Warning: Undefined array key "PeopleID" in /var/www/html/includes/libUser.php on line 492

Open Source Intelligence (OSINT): Extracting Information from TikTok


0 user ratings
2026-03-12 21:20:26
milo
Red Team (CNA)
In this article, we'll explore how to leverage TikTok for OSINT by uncovering hidden metadata and account insights with online tools

Welcome back, aspiring cyberwarriors!





Today, we’re diving deeper into the world of social media OSINT, focusing specifically on TikTok. What started as a simple short-video app has rapidly transformed into a major global player, boasting over one billion active users who are constantly creating, sharing, and engaging with content at an unprecedented rate. While many view TikTok purely as a source of entertainment, this article will uncover how we can leverage various tools to gather valuable insights, including location data, network connections, and metadata. So, let’s get rolling!





Step #1: Decoding TikTok URL Metadata





Let’s dive into our first tool, Unfurl. This forensics tool is designed to extract the metadata hidden within URLs from various platforms, including TikTok. Its name perfectly describes its purpose: it unfurls or unravels URL structures to uncover the valuable information embedded within them.





When you share a TikTok video, the URL carries much more than just a simple link to the content. TikTok encodes identifiers, timestamps, and metadata right into the URL, often in formats that aren’t easily decipherable at first glance. Unfurl takes these URLs and translates the embedded data into clear, visual formats, making analysis much more straightforward.





To get started, simply open dfir.blog/unfurl in your browser.










The interface is simple. Paste any TikTok video link into this field and click the Unfurl button. The tool processes the URL and generates a tree diagram showing all extracted metadata.









The screenshot above shows that we have extracted the video ID, a unique identifier assigned to each video on the platform. Additionally, the author’s username and timestamps embedded in TikTok URLs indicate when the content was published. Unfurl processes these timestamps from their encoded formats and translates them into easily readable dates and times.





Step #2: Gathering TikTok Account Intelligence





Let’s shift our focus to account-level insights rather than just individual video metadata. To facilitate this, there’s a website called omar-thing.site that can help.










To begin, simply enter the username of the account you wish to explore and submit your query.









The results begin with the avatar, along with the option to download it for further analysis. Next, we can see that the account name and display name are extracted separately. The location of the account is also indicated, showing the country where the account was registered or where TikTok believes the user is based, which in this instance is Belarus. Additionally, the language used by the account owner is noted. Below that, we have the bio; however, I’ve blurred it in this case due to advertisements. Following that, we can find various account stats and details, such as the user ID, which is permanent. We can also see the creation date, the dates of any username changes, and whether the account is private or public.





At the bottom of those details, we can find lists of followers and of those being followed. We can click to explore them further or download the information for analysis later.









Summary





By using a few simple tools, you can uncover a wealth of valuable information from TikTok. This article serves as a starting point for exploring this social media platform not just as a source of entertainment, but also as a treasure trove of insights.





If you’re looking to enhance your OSINT skills beyond just using these tools, consider exploring OSINT training. If you need assistance in uncovering the truth, don’t hesitate to reach out to us at [email protected], and we’ll conduct a comprehensive OSINT investigation for you.







Source: HackersArise
Source Link: https://hackers-arise.com/open-source-intelligence-osint-extracting-information-from-tiktok/


Comments
new comment
Nobody has commented yet. Will you be the first?
 
Forum
Red Team (CNA)



Copyright 2012 through 2026 - National Cyber Warfare Foundation - All rights reserved worldwide.