Blog Posts Tagged with "OSINT"

7fef78c47060974e0b8392e305f0daf0

On Project Viglio

August 21, 2012 Added by:Infosec Island Admin

A group such as this, extra-legal as they seem to be and rather deliberately evasive using the rubric of “secrecy” as their cloak should set all of your spidey senses off. At best they are a group of people seeking to do good, but in fact may be doing ill by carrying out poor OSINT...

Comments  (30)

03b2ceb73723f8b53cd533e4fba898ee

Facebook, the Poisoned Network: 83 Million Questionable Profiles

August 03, 2012 Added by:Pierluigi Paganini

There are bots creating a significant number of fake profiles, which are managed by machines capable of interacting with each other and with real users, thus changing the "sentiment" and "conversation" on a large-scale, as well as altering the social graph to preclude meaningful correlations of data...

Comments  (2)

Bd623fa766512fdf6b57db66f522b741

Who Fights for the Users? Part II: FBI's AntiSec

March 15, 2012 Added by:Ali-Reza Anghaie

News is rampant with speculation that the FBI created AntiSec as a sting operation. I'm going to a further extreme to explore this - yes, conspiratorial. Cans of conspiracy worms get opened and they can't ever be closed. Something Government should strive to avoid...

Comments  (2)

0ff0a77035f9569943049ed3e980bb0d

Cyber Shafarat 2012: Cyber Warfare, OpSec and Intelligence

January 30, 2012 Added by:

Cyber criminals, nation-states, hacktivists and other adversaries have different approaches to circumventing cyber defenses. They execute sometimes sophisticated, sometimes simple-minded attacks designed to use and exploit threat vectors as required to accomplish the task...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Why I Won’t Teach You To Track Terrorists Online

January 17, 2012 Added by:Infosec Island Admin

This is an organic process. I learned by just doing it and in the process of “doing it” I had to learn A LOT of other things apart from technology issues like hacking/security/coding etc. Remember you are dealing with PEOPLE and you have to be adept and reading them...

Comments  (1)

03b2ceb73723f8b53cd533e4fba898ee

The Next Generation Search Engine Hacking Arsenal

January 14, 2012 Added by:Pierluigi Paganini

LulzSec and Anonymous use Google Hacking as a means of identifying vulnerable targets, as it provides a complete and regularly updated source of sensitive info. Developers and sysadmins who want to deploy applications on cloud infrastructures should be aware...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

The Subtle Art of OSINT: Open-Source Intelligence

January 11, 2012 Added by:Infosec Island Admin

The use of OSINT has grown. Earlier on, these sources of information that were being culled and combed through by the likes of Langley, now can be easily done by the likes of you and I with a few tools on the web or applications that you can install on your machines at home...

Comments  (1)

7fef78c47060974e0b8392e305f0daf0

The RQ170 Affair: Spoofing, Jamming, and The GBAS

December 18, 2011 Added by:Infosec Island Admin

The documents show a program to “augment” the GPS environment in Iran by placing base stations with the Fajr GPS (GBAS) network/hardware in specific sites throughout the country to ostensibly help with aircraft navigation. In their presentation, they mention the possibility of spoofing...

Comments  (2)

7fef78c47060974e0b8392e305f0daf0

Anonymous: OSINT and Leaking of Corporate Corruption

September 28, 2011 Added by:Infosec Island Admin

Anonymous came up with a new splinter organization that claims to be looking into corporate wrongdoing. This group is called Anonymous Analytics and claims that they are using open source information as well as soliciting leaks/whistleblowers to reveal corporate malfeasance...

Comments  (0)

E973b16363b3de77b360563237df7e32

Digging for Information with Open Source Intelligence

August 22, 2011 Added by:Bozidar Spirovski

Identify your point of interest - who/what is your target of investigation. Start broad, and then narrow down to the interesting elements, then you can start drilling for material left on the Internet by them for further useful clues...

Comments  (0)

E973b16363b3de77b360563237df7e32

Information Gathering - Lessons from The Big Short

August 11, 2011 Added by:Bozidar Spirovski

Regardless of whether you need to collect information on a potential competitor, the target of a penetration test, for financial spread betting and derivatives trading, or even for financial research of a company there are several lessons that the "The Big Short" teaches us...

Comments  (0)