DNS Records, QAnon, and How To Handle Uncertainty In OSINT.
Twitter would not be Twitter without a daily dose of QAnon drama. Recently there were claims that since Q-drop archive…
OSINT, Linux, Digital Forensics, and InfoSec
Twitter would not be Twitter without a daily dose of QAnon drama. Recently there were claims that since Q-drop archive…
The term “OSINT” sometimes gets thrown around a little too loosely. The “open source” part of OSINT is straightfoward enough:…
WordPress is the base that 35% of the world’s websites are built on. If you’re ever going to investigate a…
Automation or Augmentation? Automation is an increasingly important part of OSINT. Even the simplest of investigations can require large…
In my last Spiderfoot tutorial I wrote about how Spiderfoot HX could be used to gather information about a suspicious…
Using OSINT to identify and investigate sources of malicious internet activity is a key part of cyber security. There’s a…
The WhoIs system used to be a goldmine for OSINT investigators. It was usually possible to find out the address,…
Most OSINT investigations involve an e-mail address at some point. Some start with an e-mail and nothing else. E-mail addresses…