Analytical Methodology (Live Stream Companion)

This short, resource-filled blog post is a companion to a SANS Institute live stream from 2 June 2021. About the speakers: Micah Hoffman (@WebBreacher) is the author of the SANS SEC487 OSINT (Open-Source Intelligence) course: https://sans.org/sec487Chris Crowley (@CCrowMontance) is the author of the SOC (Security Operations Center) Class: https://soc-class.com/ Abstract Whether you are an analyst... Continue Reading →

Private Presentation Links

Here are the links to the sites and tools I spoke about in a private presentation on 4 Feb 2021: General Resourceshttp://osintframework.deLive demohttps://twitter.com/exploregeocode:lat,lon,#mi (example: geocode:37.190,-26.234,2mi)https://untappd.osint.ninjaInstant Data Scraper Chrome extensionhttps://osintcombine.toolshttps://whatsmyname.appClosing Resourceshttps://osintcurio.ushttps://www.sans.org/event/osint-summit-2021https://sans.org/sec487 If you enjoyed the presentation, please let me know micah@spotlight-infosec.com or on Twitter at WebBreacher

SeaSec East/SeaSec Meetup

Here are the links for the SeaSec Meetup presentation I gave in August 2020: https://osintcurio.us/http://osintframework.dehttps://www.apple.com/robots.txthttps://instagram.com/robots.txthttps://map.snapchat.com/@47.614976,-122.336000,10.27zhttps://whatsmyname.app/https://www.bellingcat.com/news/2020/05/18/military-and-intelligence-personnel-can-be-tracked-with-the-untappd-beer-app/https://untappd.com/https://untappd.osint.ninjahttps://haveibeenpwned.com/https://dehashed.comhttps://viewdns.info/Instant Data Scraper Google Chrome Extensionhttps://www.osintcombine.com/data-visualization-toolhttps://sans.org/sec487

2020-May SANS @MIC: “Moving Past Googling It” Companion Post

Just gave a SANS @MIC talk and wanted to share the links to the sites and tools I discussed. A video of the talk is below: https://www.youtube.com/watch?v=BVFhMqktkeE https://osintcurio.us/http://osintframework.dehttp://www.cnn.com/robots.txthttps://www.cisco.com/robots.txthttps://www.apple.com/robots.txthttps://map.snapchat.com/@30.943495,41.053944,3.75zhttps://whatsmyname.app/https://www.bellingcat.com/news/2020/05/18/military-and-intelligence-personnel-can-be-tracked-with-the-untappd-beer-app/https://untappd.com/NorthernMonkhttps://untappd.osint.ninjahttps://wifi.xfinity.com/https://viewdns.info/https://www.osintcombine.com/data-visualization-toolhttps://haveibeenpwned.com/https://dehashed.com/https://sans.org/sec487https://github.com/webbreacher/untappdscraperInstant Data Scraper Google Chrome Extension

We are OSINTCurious!

I've been working with some of the amazing people in the OSINT world for a while. Most are amazing and so willing to share ideas. So we decided to create a trusted, online resource at https://OSINTCurio.us Definitions OSINT - "a method of using open source tools to collect information from publicly available sources and then... Continue Reading →

DEX Talk Notes

A couple weeks ago, I had the pleasure of speaking at the Dutch DEX-XL conference in The Netherlands. I'm trying to lower the barrier to doing talks and workshops by not making presentation "decks of slides" (for PowerPoint, etc.). I'm finding that, as we go through the talk, people have questions and instead of showing... Continue Reading →

Tips for first timers attending SANS events

This is a guest post by Ori. In the past 12 months I attended two SANS training events as a Work Study participant and decided to write this post based on my observations. SANS Institute is the biggest player in information security education field with the best and brightest instructors and unmatched content quality. This... Continue Reading →

Adafruit + iWALK 2.0 = Blinky, Mechanized Micah

The Background In March 2018, I was playing volleyball and broken my 5th metatarsal, a small, weight-bearing bone in my foot. When I went into for an X-ray, the doctor told me that it was the most frequestly broken bone in the foot and that "95% of people heal up just fine in about 3... Continue Reading →

Up ↑

%d bloggers like this: