Demystifying the Dark Web: Part 3
After looking at the structure of both the dark web and normal web, we can now start to see why so many people want the benefits Tor gives, especially the […]
Filtering Out Noise
When starting a project in OIMonitor, you are tempted to cast a wide net and grab from every source. This will bring in a lot of hits and you may […]
Demystifying the Dark Web: Part 2
This is Part 2 of our 3-part series on demystifying the dark web. In Part 1, we looked at how the regular internet works at a networking layer. Today, we […]
Password Maths
As a follow up to our last blog about password reuse and the recent data breach of Disney, I would like to talk about how to create strong passwords and […]
Unmasking a carder with OSINT
Today, we will be exploring the world of carding a bit and following the path of a kid on his way to becoming a full-fledged carder. I spent about an […]
Demystifying the Dark Web: Part 1
This post is part of a 3-part series that explains the difference between normal internet and the dark web, and how some actors use the dark web. Today we are […]
Iran and OSINT Hunting for Fun & Profit.
Today, I’m going to go on a very basic hunting adventure. Every so often, I do stuff like this for “fun”. There’s no deep takeaway here –– just some basic […]
What’s in an email address?
A few weeks ago we went over an interesting way to pivot from breached data passwords to a target by virtue of the lazy way many people reuse the same […]
Iranian Watering Holes. Target Centric Analysis IOCs
Additional information is always needed on initial indicators for a SOC analyst or incident handler. In this case, initial indicators point to [ clear. co. ir and 79.127.125.179 ] engaging […]
Illuminating Context with Timeline Analysis
In our training courses, we push ideas and investigative methodology more than we push our tools. Tools will change, but proper investigative methods will not change. Asking the right questions […]
It’s Hard Out There for a Pimp
Human trafficking, according to Wikipedia, is the trade of humans for forced labour. With the advent of the internet and high-speed communication, traffickers have found a new way to advertise […]
Forget About Deep and Dark Web Hype
Everyone has a different use case that needs to be monitored, and we enable a vast amount of use cases for tailored collection and monitoring with OIMonitor at a very […]
- « Previous
- 1
- 2
- 3
- Next »