SeaSec East/SeaSec Meetup

Here are the links for the SeaSec Meetup presentation I gave in August 2020: https://osintcurio.us/http://osintframework.dehttps://www.apple.com/robots.txthttps://instagram.com/robots.txthttps://map.snapchat.com/@47.614976,-122.336000,10.27zhttps://whatsmyname.app/https://www.bellingcat.com/news/2020/05/18/military-and-intelligence-personnel-can-be-tracked-with-the-untappd-beer-app/https://untappd.com/https://untappd.osint.ninjahttps://haveibeenpwned.com/https://dehashed.comhttps://viewdns.info/Instant Data Scraper Google Chrome Extensionhttps://www.osintcombine.com/data-visualization-toolhttps://sans.org/sec487

2020-May SANS @MIC: “Moving Past Googling It” Companion Post

Just gave a SANS @MIC talk and wanted to share the links to the sites and tools I discussed. A video of the talk is below: https://www.youtube.com/watch?v=BVFhMqktkeE https://osintcurio.us/http://osintframework.dehttp://www.cnn.com/robots.txthttps://www.cisco.com/robots.txthttps://www.apple.com/robots.txthttps://map.snapchat.com/@30.943495,41.053944,3.75zhttps://whatsmyname.app/https://www.bellingcat.com/news/2020/05/18/military-and-intelligence-personnel-can-be-tracked-with-the-untappd-beer-app/https://untappd.com/NorthernMonkhttps://untappd.osint.ninjahttps://wifi.xfinity.com/https://viewdns.info/https://www.osintcombine.com/data-visualization-toolhttps://haveibeenpwned.com/https://dehashed.com/https://sans.org/sec487https://github.com/webbreacher/untappdscraperInstant Data Scraper Google Chrome Extension

Tips for first timers attending SANS events

This is a guest post by Ori. In the past 12 months I attended two SANS training events as a Work Study participant and decided to write this post based on my observations. SANS Institute is the biggest player in information security education field with the best and brightest instructors and unmatched content quality. This... Continue Reading →

OSINT Map: A MindMap for Your Investigations

This is a guest post by Steve Hall (https://twitter.com/shall_1). Thanks for writing it Steve! I recently attended SANS Denver (SEC487) because I wanted to round out my knowledge on some of the OSINT I had been doing. The class covered multiple tools to help accomplish the task of documenting your process, one of them being... Continue Reading →

OSINT Resource Classification System (ORCS)

The OSINT Resource Classification System (ORCS https://orcs.osint.ninja) has a huge goal: to provide a common categorization/classification system for OSINT resources. My hope is that our OSINT and ThreatIntel community can come together and agree on some sort of organization system for OSINT resources so that when you visit one site like http://osintframework.com and look for... Continue Reading →

Introducing OSINT YOGA

I absolutely love all of the public projects where people share their favorite OSINT bookmarks with others. You've most likely seen some of them. [UPDATE] Bruno Mortier (@digintelosint) created an excellent resource of resources page at https://start.me/p/ZME8nR/osint where a bunch of these sites are catalogued. Head over there and check them out! If you haven't... Continue Reading →

Mining for OSINT gold: RIR data via API

This is a guest post by David Mashburn (@d_mashburn, https://www.sans.org/instructors/david-mashburn), Certified SANS Instructor and cyber ninja! OSINT isn't just about doing pre-attack recon. It is often leveraged by defenders as part of the incident response and investigation process. One of the most common applications of OSINT for a defender is to perform lookups on available... Continue Reading →

Up ↑

%d bloggers like this: