Blog Categories
Training, methodology, and not dying in a ball of twisted metal
Here at ShadowDragon, since 2008 we have been building world class OSINT tools and cyber security products. From SocialNet to OIMonitor to Malnet, we’ve put together solutions for solving problems,…
Where does operational security begin?
Over the course of the last few months, we’ve blogged about finding bad guys by guessing emails, mapping friends, understanding emotional behavior, and leveraging laziness and poor password habits. All…
Becoming Dark Web Rambo
There’s a lot of mystery that surrounds the dark web–surprisingly, even in the information security space. I’ve met a huge swath of capable engineers and developers who can explain the…
Cutting your teeth on ShadowDragon’s advanced CTF
We’ve talked in recent weeks about the importance of training and the methodology behind it. Much of the OSINT work we do is focused on the social aspects and footprint…
Fishing with a Subaru
There comes a time in some OSINT investigations where we have accurately identified our target’s profiles, lifestyle, and communication platforms, but we still aren’t quite to the point of pinpointing…
The Cult of Musk – The OSINT Edition
I have always been a bit of a gear head. From when I was kid in a room plastered with posters of the Dodge Viper, Porsche 911, or a Lamborghini…
Into the Breach
We’ve all heard the advice a million times, “Don’t use the same password on different websites.” Unfortunately, (or fortunately, depending on our motivations) many users make this exact mistake. In…