4 training fundamentals2

Training, methodology, and not dying in a ball of twisted metal

By Elliott Anderson / June 3, 2020

Here at ShadowDragon, since 2008 we have been building world class OSINT tools and cyber security products.  From SocialNet to OIMonitor to Malnet, we’ve put together solutions for solving problems,…

where does operational security

Where does operational security begin?

By Elliott Anderson / May 20, 2020

Over the course of the last few months, we’ve blogged about finding bad guys by guessing emails, mapping friends, understanding emotional behavior, and leveraging laziness and poor password habits.  All…

darkweb rambo6

Becoming Dark Web Rambo

By Elliott Anderson / May 6, 2020

There’s a lot of mystery that surrounds the dark web–surprisingly, even in the information security space.  I’ve met a huge swath of capable engineers and developers who can explain the…

shadowdragon share

Cutting your teeth on ShadowDragon’s advanced CTF

By Elliott Anderson / April 29, 2020

We’ve talked in recent weeks about the importance of training and the methodology behind it.  Much of the OSINT work we do is focused on the social aspects and footprint…

Fishing with a Subaru

Fishing with a Subaru

By Elliott Anderson / April 15, 2020

There comes a time in some OSINT investigations where we have accurately identified our target’s profiles, lifestyle, and communication platforms, but we still aren’t quite to the point of pinpointing…

background checks

Background Checks & Due Diligence

By Elliott Anderson / March 11, 2020

Many years ago, when I was in college, I had a job at a large retailer.  It involved all of the normal retail-y things: stocking, checking, unloading trucks, helping customers,…

unmasking carder07

Unmasking a carder with OSINT

By Elliott Anderson / February 19, 2020

Today, we will be exploring the world of carding a bit and following the path of a kid on his way to becoming a full-fledged carder.  I spent about an…

Cult of Elon Musk Tesla

The Cult of Musk – The OSINT Edition

By Elliott Anderson / January 22, 2020

I have always been a bit of a gear head.  From when I was kid in a room plastered with posters of the Dodge Viper, Porsche 911, or a Lamborghini…

OSINT for Fun and Profit02

Iran and OSINT Hunting for Fun & Profit.

By Elliott Anderson / January 15, 2020

Today, I’m going to go on a very basic hunting adventure. Every so often, I do stuff like this for “fun”.  There’s no deep takeaway here –– just some basic…

WhatsInAnEmail3

What’s in an email address?

By Elliott Anderson / December 17, 2019

A few weeks ago we went over an interesting way to pivot from breached data passwords to a target by virtue of the lazy way many people reuse the same…

into the breach 03

Into the Breach

By Elliott Anderson / October 16, 2019

We’ve all heard the advice a million times, “Don’t use the same password on different websites.” Unfortunately, (or fortunately, depending on our motivations) many users make this exact mistake. In…

bad yelp review copy

Bad moods = Bad decisions

By Elliott Anderson / August 25, 2019

As a developer and OSINT investigator, I often come across other investigators that are researching a target online and have “hit a wall,” so to speak.  “I’ve hit a dead-end,…

Scroll to Top