## What is the DarkWeb The dark web sounds scary, but in reality, it is anything you cannot get to via Google, or that uses a masked IP address. The classification of the dark web is a subcategory...
Over the course of the last few months, we’ve blogged about finding bad guys by guessing emails, mapping friends, understanding emotional behavior, and leveraging laziness and poor password habits. ...
One of the most frustrating things to happen in any data visualization software is for you to run a query and get back the notification: “This result returns more nodes than you are allowed to...
There’s a lot of mystery that surrounds the dark web–surprisingly, even in the information security space. I’ve met a huge swath of capable engineers and developers who can explain the technical...
We’ve talked in recent weeks about the importance of training and the methodology behind it. Much of the OSINT work we do is focused on the social aspects and footprint of a target online. As most...
In the past, we have looked into a hacker who comes from Iran by the name of Mrb3hz4d. Now if we take some of the information we saw from his defacement, we can create an extremely simple OIMonitor...
Earlier this week FireEye/Mandiant had released a blog entitled “Insights into Iranian Cyber Espionage”detailing the targets within the Aerospace and Energy sectors being targeted. To compliment...
It would take about 3 minutes to teach someone how to collect data on a single individual. That is easy to do. You poke around and find out all you can about the person. The difference between an...
There comes a time in some OSINT investigations where we have accurately identified our target’s profiles, lifestyle, and communication platforms, but we still aren’t quite to the point of...
After looking at the structure of both the dark web and normal web, we can now start to see why so many people want the benefits Tor gives, especially the anonymity. With anonymity comes people who...