Here at ShadowDragon, since 2008 we have been building world class OSINT tools and cyber security products. From SocialNet to OIMonitor to Malnet, we’ve put together solutions for solving...
Over the course of the last few months, we’ve blogged about finding bad guys by guessing emails, mapping friends, understanding emotional behavior, and leveraging laziness and poor password...
There’s a lot of mystery that surrounds the dark web–surprisingly, even in the information security space. I’ve met a huge swath of capable engineers and developers who can explain the technical...
We’ve talked in recent weeks about the importance of training and the methodology behind it. Much of the OSINT work we do is focused on the social aspects and footprint of a target online. As most...
There comes a time in some OSINT investigations where we have accurately identified our target’s profiles, lifestyle, and communication platforms, but we still aren’t quite to the point of...
Many years ago, when I was in college, I had a job at a large retailer. It involved all of the normal retail-y things: stocking, checking, unloading trucks, helping customers, etc. After...
Today, we will be exploring the world of carding a bit and following the path of a kid on his way to becoming a full-fledged carder. I spent about an hour on the basics of the investigation. The...
I have always been a bit of a gear head. From when I was kid in a room plastered with posters of the Dodge Viper, Porsche 911, or a Lamborghini Diablo to becoming a freshly hired teen with the...
Today, I’m going to go on a very basic hunting adventure. Every so often, I do stuff like this for “fun”. There’s no deep takeaway here –– just some basic searching and the techniques involved. ...
A few weeks ago we went over an interesting way to pivot from breached data passwords to a target by virtue of the lazy way many people reuse the same passwords for multiple emails. In a very...