Maltego — OSINT Network Analysis Guide

BLUF

Maltego (Paterva, Cape Town, South Africa; acquired by Exiger 2022) is the industry-standard OSINT entity expansion and network visualization tool, used by intelligence analysts, threat intelligence teams, law enforcement, and penetration testers to map relationships between entities — individuals, organizations, domains, IP addresses, email addresses, phone numbers, social media accounts, and cryptocurrency wallets — using automated data collection “Transforms.” Its core value is the automation of the entity-link register construction process: where a manual OSINT analyst builds an entity relationship map through sequential lookups, Maltego executes the same lookups automatically across dozens of data sources simultaneously, then visualizes the result as a network graph. The Community Edition (free, registration required) provides access to a limited Transform set with 12 entities per graph; Maltego One (commercial) provides unlimited entities and the full Transform Hub. The Maltego Framework is the standard for CTI network analysis and is the recommended tool for systematic entity-expansion OSINT investigations.


Installation and Configuration

Installation

Maltego is a cross-platform Java application. Download from maltego.com.

  • Windows/Mac: standard installer
  • Linux (Debian/Ubuntu/Parrot): install Java 11+ first; download .deb package or use the .tar.gz archive
  • Parrot OS (T420 specific): Maltego is available in Parrot’s repo: sudo apt install maltego

Account Setup

  1. Register at maltego.com (Community Edition — free)
  2. Launch Maltego → select “Maltego CE (Free)” on first launch
  3. Enter API key when prompted (generated at maltego.com after registration)
  4. Transform Hub → install required data source transforms

Transform Hub — Essential Transforms for OSINT

Transform packData sourceKey capabilitiesCost
ShodanShodan.ioIP → open ports, banners, hostnames, ASNShodan API key required (free tier)
VirusTotalVirusTotalDomain/IP/hash → threat intelligenceVT API key required (free tier)
Have I Been PwnedHIBPEmail → breach exposureFree
CensysCensys.ioDomain/IP → certificate, infrastructureCensys API key (free tier)
PassiveTotal/RiskIQRiskIQDomain → passive DNS, WHOIS, SSLRiskIQ API key
FullContactFullContactEmail/phone → social profilesAPI key required
Social LinksSocial media APIsUsername → cross-platform social graphCommercial (subscription)
BitcoinBlockchain.infoBTC address → transaction graphFree

Core Workflow

Entity Types

Maltego’s entity model defines the information types that can be investigated:

Entity typeExamplesExpands to
PersonName, aliasSocial profiles, email, phone, associated orgs
OrganizationCompany nameDomains, employees, locations, filings
Domainexample.comIP addresses, MX records, subdomains, WHOIS, SSL certs
IP Address192.0.2.1ASN, hosting provider, domains, open ports (Shodan)
Email Addressuser@example.comBreach exposure (HIBP), social profiles, person
Phone Number+1-555-…Carrier, owner, social profiles
WebsiteURLTechnologies (Wappalyzer), links, metadata
Social mediaTwitter handle, FB profileFriends, followers, posts, associated emails
CryptocurrencyBTC/ETH addressTransaction graph, connected addresses, exchange identification

The Transform Workflow

  1. Create a new graph (File → New Graph)
  2. Drop a seed entity onto the canvas (drag from palette or double-click)
  3. Name the entity (right-click → Properties → set the entity value)
  4. Run a Transform: right-click entity → Run Transform → select from context menu
  5. Review results: new entities appear on canvas connected by edges
  6. Investigate depth: right-click new entities → Run Transform → expand further
  7. Filter: right-click → Filter → limit by type, time, or attribute to reduce noise
  8. Apply layout: View → Layout → choose Force-Directed or Hierarchical

Practical Investigation Example — Domain Network

Seed: a suspicious domain (e.g., example-news.ru)

Step 1: Domain → DNS Name [Transforms → DNS from Domain] → reveals subdomains and A records

Step 2: Domain → IP Address [Transforms → To IP Address] → reveals hosting IP

Step 3: IP Address → Domains on this IP [Transforms → To Domains] → reveals other domains hosted on same IP (co-hosted domains — potential infrastructure cluster)

Step 4: Domain → WHOIS [Transforms → To Person/WHOIS] → reveals registrant email (if not privacy-protected)

Step 5: Registrant email → Other domains registered by this email → pivot to additional infrastructure

Step 6: Domain → SSL Certificate → Other domains on same cert → Censys pivot: SSL certificate Subject Alternative Names reveal additional domains

Result: a network graph mapping the full domain infrastructure of the target, with all co-hosted domains, WHOIS registrant pivots, and SSL certificate clusters visible simultaneously.


Advanced Techniques

Custom Transforms

Maltego supports custom Transform development via the Transform Development Kit (TDK) and Local Transforms. Custom transforms query any API or data source and return results in Maltego’s entity format. Use cases:

  • Query a custom OSINT database
  • Integrate a proprietary threat intelligence feed
  • Automate queries to a target-specific API

Machine Learning Transform — Combine

Maltego Combine (commercial feature) uses machine learning to suggest entity relationships based on existing graph topology — useful for identifying probable connections where direct evidence is absent. Flag all machine-generated edges as Unconfirmed in the analytical product.

Graph Export

  • Export as PDF: visual documentation
  • Export as CSV: entity-link register for import into other tools (Neo4j, Gephi)
  • Export as XLSX: for analytical review and gap identification

Key Connections

Link Analysis — Maltego is the primary tool for LAC construction Network Analysis Methodology — Maltego automates entity expansion in the collection phase Shodan-Censys Guide — Shodan and Censys are critical Maltego Transform data sources Attribution — Maltego domain/infrastructure pivoting for attribution Cyber Threat Intelligence — Maltego as primary CTI infrastructure mapping tool