This is a guest post by Steve Hall (https://twitter.com/shall_1). Thanks for writing it Steve! I recently attended SANS Denver (SEC487) because I wanted to round out my knowledge on some of the OSINT I had been doing. The class covered multiple tools to help accomplish the task of documenting your process, one of them being... Continue Reading →
The OSINT Resource Classification System (ORCS https://orcs.osint.ninja) has a huge goal: to provide a common categorization/classification system for OSINT resources. My hope is that our OSINT and ThreatIntel community can come together and agree on some sort of organization system for OSINT resources so that when you visit one site like http://osintframework.com and look for... Continue Reading →
I absolutely love all of the public projects where people share their favorite OSINT bookmarks with others. You've most likely seen some of them. [UPDATE] Bruno Mortier (@digintelosint) created an excellent resource of resources page at https://start.me/p/ZME8nR/osint where a bunch of these sites are catalogued. Head over there and check them out! If you haven't... Continue Reading →
This is a guest post by David Mashburn (@d_mashburn, https://www.sans.org/instructors/david-mashburn), Certified SANS Instructor and cyber ninja! OSINT isn't just about doing pre-attack recon. It is often leveraged by defenders as part of the incident response and investigation process. One of the most common applications of OSINT for a defender is to perform lookups on available... Continue Reading →
SEC487 SANS Institute OSINT course http://www.sans.org/sec487
In this post I use a python tool (EyeWitness), TOR, TorGhost, and the Dark Web Reports from Hunchly to automate viewing the Dark Web resources.
A good friend and colleague of mine and I had a conversation today about the video "InterView - Attitude is everything - Film By Nithesh". WARNING: There is NSFW (Not Safe For Work) language in the video. In the video, an interviewer is looking for a candidate to fill a role. The interesting bit is why... Continue Reading →
What is WannaCry? In March 2017, Microsoft issued the MS17-010 bulletin (https://technet.microsoft.com/en-us/library/security/ms17-010.aspx) patching (and warning) of a broad set of vulnerabilities in many of its operating systems from Windows XP to Windows 10 and 2016. This vulnerability could be exploited via the DOUBLEPULSAR attack released by ShadowBrokers and supposedly attributed to the NSA. For more... Continue Reading →