Becoming Dark Web Rambo

Becoming Dark Web Rambo

By Elliott Anderson | May 6, 2020 12:00:00 AM

There’s a lot of mystery that surrounds the dark web–surprisingly, even in the information security space.  I’ve met a huge swath of capable engineers and developers who can explain the technical...

Cutting your teeth on ShadowDragon’s advanced CTF

Cutting your teeth on ShadowDragon’s advanced CTF

By Elliott Anderson / Apr 29, 2020 12:00:00 AM

We’ve talked in recent weeks about the importance of training and the methodology behind it.  Much of the OSINT work we do is focused on the social aspects and footprint of a target online.  As most...

Hacking in the Middle East

Hacking in the Middle East

By Josh C / Apr 24, 2020 12:00:00 AM

In the past, we have looked into a hacker who comes from Iran by the name of Mrb3hz4d. Now if we take some of the information we saw from his defacement, we can create an extremely simple OIMonitor...

Additional Insights into Iranian Cyber Espionage | APT33

Additional Insights into Iranian Cyber Espionage | APT33

By Daniel Clemens / Apr 24, 2020 12:00:00 AM

Earlier this week FireEye/Mandiant had released a blog entitled “Insights into Iranian Cyber Espionage”detailing the targets within the Aerospace and Energy sectors being targeted. To compliment...

Data vs. Intelligence

Data vs. Intelligence

By Josh C / Apr 22, 2020 12:00:00 AM

It would take about 3 minutes to teach someone how to collect data on a single individual. That is easy to do. You poke around and find out all you can about the person. The difference between an...

Fishing with a Subaru

Fishing with a Subaru

By Elliott Anderson / Apr 15, 2020 12:00:00 AM

There comes a time in some OSINT investigations where we have accurately identified our target’s profiles, lifestyle, and communication platforms, but we still aren’t quite to the point of...

Demystifying the Dark Web: Part 3

Demystifying the Dark Web: Part 3

By Josh C / Apr 1, 2020 12:00:00 AM

After looking at the structure of both the dark web and normal web, we can now start to see why so many people want the benefits Tor gives, especially the anonymity. With anonymity comes people who...

Filtering Out Noise

Filtering Out Noise

By Brooks M / Mar 25, 2020 12:00:00 AM

When starting a project in OIMonitor, you are tempted to cast a wide net and grab from every source. This will bring in a lot of hits and you may even think, “Wow, this is awesome! I am awesome! My...

Background Checks & Due Diligence

Background Checks & Due Diligence

By Elliott Anderson / Mar 11, 2020 12:00:00 AM

Many years ago, when I was in college, I had a job at a large retailer.  It involved all of the normal retail-y things: stocking, checking, unloading trucks, helping customers, etc.  After working...

Heat Maps: Form Over Function

Heat Maps: Form Over Function

By Josh C / Mar 6, 2020 12:00:00 AM

Since movies took over displaying intelligence, we have seen crazy maps and charts attempt to display intelligence and seem “futuristic.” Here, we can see an example of a heat map:  It is great....

Scroll to Top