Technical Tips & Training

Practical and How-to Guides

demystifying the darkweb3 1

Demystifying the Dark Web: Part 3

By Josh C / April 1, 2020

After looking at the structure of both the dark web and normal web, we can now start to see why so many people want the benefits Tor gives, especially the […]

AD8756B4D0DF3EADE00473C8CAD9A1E0

Filtering Out Noise

By Brooks M / March 25, 2020

When starting a project in OIMonitor, you are tempted to cast a wide net and grab from every source. This will bring in a lot of hits and you may […]

dark web 1

Demystifying the Dark Web: Part 2

By Josh C / March 4, 2020

This is Part 2 of our 3-part series on demystifying the dark web. In Part 1, we looked at how the regular internet works at a networking layer. Today, we […]

password maths

Password Maths

By Brooks M / February 26, 2020

As a follow up to our last blog about password reuse and the recent data breach of Disney, I would like to talk about how to create strong passwords and […]

unmasking carder07

Unmasking a carder with OSINT

By Elliott Anderson / February 19, 2020

Today, we will be exploring the world of carding a bit and following the path of a kid on his way to becoming a full-fledged carder.  I spent about an […]

Demystifying the Dark Web: Part 1

By Josh C / February 12, 2020

This post is part of a 3-part series that explains the difference between normal internet and the dark web, and how some actors use the dark web. Today we are […]

OSINT for Fun and Profit02

Iran and OSINT Hunting for Fun & Profit.

By Elliott Anderson / January 15, 2020

Today, I’m going to go on a very basic hunting adventure. Every so often, I do stuff like this for “fun”.  There’s no deep takeaway here –– just some basic […]

WhatsInAnEmail3

What’s in an email address?

By Elliott Anderson / December 17, 2019

A few weeks ago we went over an interesting way to pivot from breached data passwords to a target by virtue of the lazy way many people reuse the same […]

Iranian Watering Holes. Target Centric Analysis IOCs

By Daniel Clemens / December 1, 2019

Additional information is always needed on initial indicators for a SOC analyst or incident handler. In this case, initial indicators point to [ clear. co. ir and 79.127.125.179 ] engaging […]

Illuminating Context with Timeline Analysis

By Daniel Clemens / July 29, 2019

In our training courses, we push ideas and investigative methodology more than we push our tools. Tools will change, but proper investigative methods will not change. Asking the right questions […]

phone numbers search scrubbed

It’s Hard Out There for a Pimp

By Brooks M / June 24, 2019

Human trafficking, according to Wikipedia, is the trade of humans for forced labour. With the advent of the internet and high-speed communication, traffickers have found a new way to advertise […]

Forget About Deep and Dark Web Hype

By Elliott Anderson / June 12, 2019

Everyone has a different use case that needs to be monitored, and we enable a vast amount of use cases for tailored collection and monitoring with OIMonitor at a very […]

Scroll to Top