Technical Tips & Training

Practical and How-to Guides

image 1

Social Networks: Friends of Friends

By Josh C / May 31, 2019

Today we are going to look at how we can build a network from a single starting entity and use that network to identify the actors in the network that […]

Lego Bricks Colorful

OSINT Challenges & Opportunities, Methodology on starting your Hunt.

By Daniel Clemens / April 3, 2019

Every investigation is different, but what never changes is how you have to treat an investigation much like the challenge of building something with a bucket of Legos. With each […]

Link Analysis Presentation No Nos and How Long Should I Deep Dive?

By Daniel Clemens / August 3, 2018

In “Understanding Link Analysis and Using it Investigations,” I detailed how to get started and some fundamentals on link analysis. What I didn’t cover was how long you should be involved […]

Charming Kitten Cyberespionage

Buckle up for Insight into Charming Kitten Cyberespionage Attacks

By Daniel Clemens / January 26, 2018

The horrors of cybercrime can make even the savviest tech person shudder. Much like an accident on the side of the road, however, we just can’t help rubbernecking. That’s why […]

Featured OSINT Process SocialNet and Breaking Bad Case Files v2

OSINT Process, SocialNet and Breaking Bad Case Files

By Daniel Clemens / May 2, 2016

Our first artifact, begins with the email address rumored to be used by Jesse Pinkman, pivoting on one to one correlations between his favorite social media provider and others, we […]

Featured Tracking GozNym Campaigns with MalNet

Tracking GozNym Campaigns with MalNet

By Daniel Clemens / April 22, 2016

In 2007, Don Jackson while at SecureWorks had written about the Gozi Trojan, sharing details on the modularization and monetization strategies utilized by this family of malware. More recently, (04/04/16) […]

Scroll to Top