Using a Google CSE (Custom Search Engine) to enhance OSINT investigations.
In this post I use a python tool (EyeWitness), TOR, TorGhost, and the Dark Web Reports from Hunchly to automate viewing the Dark Web resources.
A good friend and colleague of mine and I had a conversation today about the video "InterView - Attitude is everything - Film By Nithesh". WARNING: There is NSFW (Not Safe For Work) language in the video. In the video, an interviewer is looking for a candidate to fill a role. The interesting bit is why... Continue Reading →
What is WannaCry? In March 2017, Microsoft issued the MS17-010 bulletin (https://technet.microsoft.com/en-us/library/security/ms17-010.aspx) patching (and warning) of a broad set of vulnerabilities in many of its operating systems from Windows XP to Windows 10 and 2016. This vulnerability could be exploited via the DOUBLEPULSAR attack released by ShadowBrokers and supposedly attributed to the NSA. For more... Continue Reading →
Helpful guide that provides directions on how to remove private information from public web sites.
Sending financial, health and other sensitive information over the internet is like sending postcards in the snail mail. From the time you hit send to the time it is received in the other person's mailbox anyone can read your messages. Once in the email-provider mailbox (Gmail, Hotmail, Yahoo, Comcast...) they can read the email and... Continue Reading →
Since my Imposter Syndrome Feelings talk at BSidesNOVA (video here: https://www.youtube.com/watch?v=Ls-dnpeKRR0) was 25 minutes, I had to remove some content from what I needed to present. One thing I omitted was the Dunning-Kruger Effect. A Summary David Dunning and Justin Kruger conducted a study of college students in 1999. They found that people "tend to hold... Continue Reading →