Training, methodology, and not dying in a ball of twisted metal

Training, methodology, and not dying in a ball of twisted metal

By Elliott Anderson | Jun 3, 2020 12:00:00 AM

Here at ShadowDragon, since 2008 we have been building world class OSINT tools and cyber security products.  From SocialNet to OIMonitor to Malnet, we’ve put together solutions for solving...

Rate Limits in Data Visualization

Rate Limits in Data Visualization

By Josh C / May 13, 2020 12:00:00 AM

One of the most frustrating things to happen in any data visualization software is for you to run a query and get back the notification: “This result returns more nodes than you are allowed to...

Becoming Dark Web Rambo

Becoming Dark Web Rambo

By Elliott Anderson / May 6, 2020 12:00:00 AM

There’s a lot of mystery that surrounds the dark web–surprisingly, even in the information security space.  I’ve met a huge swath of capable engineers and developers who can explain the technical...

Data vs. Intelligence

Data vs. Intelligence

By Josh C / Apr 22, 2020 12:00:00 AM

It would take about 3 minutes to teach someone how to collect data on a single individual. That is easy to do. You poke around and find out all you can about the person. The difference between an...

Fishing with a Subaru

Fishing with a Subaru

By Elliott Anderson / Apr 15, 2020 12:00:00 AM

There comes a time in some OSINT investigations where we have accurately identified our target’s profiles, lifestyle, and communication platforms, but we still aren’t quite to the point of...

Filtering Out Noise

Filtering Out Noise

By Brooks M / Mar 25, 2020 12:00:00 AM

When starting a project in OIMonitor, you are tempted to cast a wide net and grab from every source. This will bring in a lot of hits and you may even think, “Wow, this is awesome! I am awesome!...

Heat Maps: Form Over Function

Heat Maps: Form Over Function

By Josh C / Mar 6, 2020 12:00:00 AM

Since movies took over displaying intelligence, we have seen crazy maps and charts attempt to display intelligence and seem “futuristic.” Here, we can see an example of a heat map:  It is...

Unmasking a carder with OSINT

Unmasking a carder with OSINT

By Elliott Anderson / Feb 19, 2020 12:00:00 AM

Today, we will be exploring the world of carding a bit and following the path of a kid on his way to becoming a full-fledged carder.  I spent about an hour on the basics of the investigation. The...

ShadowDragon Podcast #06 - COVID19 Conversation and Observations

ShadowDragon Podcast #06 - COVID19 Conversation and Observations

By Admin / Jan 21, 2020 10:20:04 AM

Video Player https://shadowdragon.io/wp-content/uploads/2020/04/videoblocks-coronavirus-covid-19-quarantine-on-empty-city-streets_swgcota8u__D4k.mp4 Media error: Format(s)...

ShadowDragon Podcast #07 - Matt Devost Interview | Disinformation Attacks Against Institutions of Trust, Turing Assessments for Datasets, Exploration of Red Teaming Innovation

ShadowDragon Podcast #07 - Matt Devost Interview | Disinformation Attacks Against Institutions of Trust, Turing Assessments for Datasets, Exploration of Red Teaming Innovation

By Admin / Jan 21, 2020 10:20:04 AM

Risk management strategies that work are hard to find in such a noisy infosec buzzword filled industry. Our guest Matt Devost, offers perspective on subjects which will be helpful for beginners,...

Scroll to Top