For OSINT and digital forensic practitioners, we can grab cell phone tower information from the mobile devices we image and cross-reference those towers with the tower’s physical location. When we combine this data with the date and time of the device owner’s activities, we can better understand where the device (and the owner) were at given times. Continue reading Making Sense of OSINT Cell Tower Data for DFIR
Using CyberChef web site to convert JSON, URL encoding, percent encoding, Base64 encoding, and UNIX time into other formats for OSINT. Continue reading JSON and Common Web Encodings Demystified
Using information disclosure vulnerabilities in Apache Web Server to unmask Tor onion services Continue reading Unhardened Web Servers in Tor Have No Anonymity
Using the wigle.net wireless networks in OSINT investigations. Understanding privacy implications for using wifi tethering. Continue reading Tracking All the WiFi Things
Hey everyone, my name is Micah but I go by “WebBreacher”. I’m an American, male and have been working in the infosec business for the last 17+ years. I’d like to tell you how I became OSINT curious. I’ve always been curious I cannot remember a time when I didn’t ask questions about how something worked or why something was the way it was. Like … Continue reading Thank you, copier
Welcome to OSINTCurious, a place for investigators and journalists, private investigators and intelligence officers, recruiters and everyone that is passionate (or at least curious about) Open Source Intelligence (OSINT) and investigations. While sitting around a table and chatting about what a great OSINT community is growing in pockets on the internet, some of us realized that there was a piece missing from our community. We … Continue reading Welcome to the Community!