4 training fundamentals2

Training, methodology, and not dying in a ball of twisted metal

By Elliott Anderson / June 3, 2020

Here at ShadowDragon, since 2008 we have been building world class OSINT tools and cyber security products.  From SocialNet to OIMonitor to Malnet, we’ve put together solutions for solving problems,…

too many nodes1

Rate Limits in Data Visualization

By Josh C / May 13, 2020

One of the most frustrating things to happen in any data visualization software is for you to run a query and get back the notification: “This result returns more nodes…

darkweb rambo6

Becoming Dark Web Rambo

By Elliott Anderson / May 6, 2020

There’s a lot of mystery that surrounds the dark web–surprisingly, even in the information security space.  I’ve met a huge swath of capable engineers and developers who can explain the…

data vs intelligence1

Data vs. Intelligence

By Josh C / April 22, 2020

It would take about 3 minutes to teach someone how to collect data on a single individual. That is easy to do. You poke around and find out all you…

Fishing with a Subaru

Fishing with a Subaru

By Elliott Anderson / April 15, 2020

There comes a time in some OSINT investigations where we have accurately identified our target’s profiles, lifestyle, and communication platforms, but we still aren’t quite to the point of pinpointing…

AD8756B4D0DF3EADE00473C8CAD9A1E0

Filtering Out Noise

By Brooks M / March 25, 2020

When starting a project in OIMonitor, you are tempted to cast a wide net and grab from every source. This will bring in a lot of hits and you may…

heatmaps

Heat Maps: Form Over Function

By Josh C / March 6, 2020

Since movies took over displaying intelligence, we have seen crazy maps and charts attempt to display intelligence and seem “futuristic.” Here, we can see an example of a heat map: …

unmasking carder07

Unmasking a carder with OSINT

By Elliott Anderson / February 19, 2020

Today, we will be exploring the world of carding a bit and following the path of a kid on his way to becoming a full-fledged carder.  I spent about an…

OSINT for Fun and Profit02

Iran and OSINT Hunting for Fun & Profit.

By Elliott Anderson / January 15, 2020

Today, I’m going to go on a very basic hunting adventure. Every so often, I do stuff like this for “fun”.  There’s no deep takeaway here –– just some basic…

OSINT PAI 2020

What Will OSINT/PAI and Collection at Scale Look like for 2020?

By Daniel Clemens / January 11, 2020

2020 will be eventful and likely one of the most historical years containing change, balancing the tension between change, conflict, and hopefully peace in a long time. When reflecting on…

WhatsInAnEmail3

What’s in an email address?

By Elliott Anderson / December 17, 2019

A few weeks ago we went over an interesting way to pivot from breached data passwords to a target by virtue of the lazy way many people reuse the same…

GetRelatedMalwareSamplesFromDomain 1

Iranian Watering Holes. Target Centric Analysis & Looking for Additional IOCs Related to clear.co.ir | 79.127.125.179 with ShadowDragon MalNet & ProofPoint Data

By Daniel Clemens / December 1, 2019

Additional information is always needed on initial indicators for a SOC analyst or incident handler. In this case, initial indicators point to [ clear. co. ir and 79.127.125.179 ] engaging…

Scroll to Top