Making Sense of OSINT Cell Tower Data for DFIR

For OSINT and digital forensic practitioners, we can grab cell phone tower information from the mobile devices we image and cross-reference those towers with the tower’s physical location. When we combine this data with the date and time of the device owner’s activities, we can better understand where the device (and the owner) were at given times. Continue reading Making Sense of OSINT Cell Tower Data for DFIR

twitter searching

Muting the Twitter algorithm and using basic search operators for better OSINT research

In July 2019 Twitter had some updates to their interface, search-URLs and overall user-experience. They changed a lot of things in the background which made the user-experience for researchers less useful. Actually a tweet thread started by @thegrugq inspired me to write this blog. With this blog you can take a few basic steps to bring back the user experience of “the old” Twitter like … Continue reading Muting the Twitter algorithm and using basic search operators for better OSINT research

Dial cURL for Content

The tool cURL is already over twenty years old, but it remains one of the most used tools by people, especially the ones working in the IT Security branch. It is used directly on the command line and can send or receive data from a website or IP address. Whether you need to retrieve information over HTTP, HTTPS, FTP, SMTP or any other kind of … Continue reading Dial cURL for Content

Basics of Breach Data

Guest blog by Rob Volkert In 2018 there were reportedly 1,244 data breaches totaling over 446 million exposed records, primarily targeting the business sector and health care fields. Cyber security systems may be growing more sophisticated, but so too are attacks designed to collect personal data. There may be a silver lining to breach data for those of us who conduct open source intelligence (OSINT) … Continue reading Basics of Breach Data

Basic OPSEC Tips & Tricks for OSINT researchers

Often i get asked if i’ve got some pointers and tools for OPSEC during online investigations. My primary answer would be first: I can’t give any tips or tradecraft pointers until I know what research questions you are trying to answer. In short, what is your threat model? First of all, one should know where the term OPSEC originates from. OPSEC stands for Operational Security … Continue reading Basic OPSEC Tips & Tricks for OSINT researchers