Posts

Showing posts with the label darkweb

We're published! The first 2 investigator515 books are ready for release.

Image
We're now published!!!!! 2 Live, 2 to go We missed the Wednesday blog cycle this week, for one very important reason. We've just finished our first round of publishing!!! We figured that its never great missing a post during the cycle, but missing it because you're compiling things to be published is mostly acceptable right??? Hold on, cause we're about to fill you in on exactly whats happening for us over the next few months. Firstly, after a short and brief love affair with google and blogspot, the investigator515 blog is now moving to a now home. Originally found at investigator515.blogspot.com, while we configured the site and domain for catfisher.info the new subdomain will be going live this week. We've attatched it to the catfisher.info site to keep everything streamlined, however we will leave most other things unchanged. There'll still be two publications a week, one on Wed and one on Sun, and we'll still rotate through OSINT anaylsis', curren...

A quick word on the dark web.

Have you ever heard of the dark web? Of course you have! Still, it's a mysterious and largely uncharted part of the internet that can only be accessed using specialized software like the TOR network. While some people use the dark web for legitimate purposes, it's also a hotbed of cybercriminal activity. One thing you'll find being traded on the dark web is stolen data. This is often data that has been obtained through data breaches, which are attacks that involve the theft of sensitive personal and financial information. These breaches can happen through unsecured databases, insecure communication protocols, or malicious insiders. Stolen data is typically sold on underground marketplaces that are only accessible through the use of TOR and other anonymity tools. These marketplaces often have complex security protocols in place to avoid detection by law enforcement and security researchers. In addition to underground marketplaces, stolen data is also often shared on pa...

Password Management 101. Part B: A quick what if in a hypothetical Data Breach

Image
 The Dangers of Reusing Passwords: An Entirely Hypothetical Scenario. Imagine that you're a hacker looking to gain access to someone's online accounts. You've come across a list of passwords that were recently leaked in a data breach, and you notice that one of the passwords is one that you've seen before - it's a password that you've used on a few of your own accounts and its also linked to a target of yours. You decide to try using this password to see if it works on any other accounts. You start by searching for the person's email address online, and you quickly find their social media profiles. You try logging into their social media accounts using the password from the data breach, and to your surprise, it works. Now that you have access to their social media accounts, you start digging deeper. You look through their posts and profile information to see what you can learn about them. You notice that they've posted about their recent vacation to Hawa...

Password Mangement 101. Part A: Why a password manager.

Password Management for Beginners: Why Reusing Passwords is a Major Security Risk If you're like most people, you probably have a lot of online accounts - from social media to online shopping to banking. Keeping track of all of these accounts and their corresponding passwords can be a hassle, so it's tempting to use the same password for multiple accounts. But this is a major security risk. If one of your accounts is compromised, the attacker can then try using that same password to gain access to your other accounts. One way that hackers can gain access to your passwords is through data breaches. These are instances where a company's database is hacked and sensitive information, including user passwords, is stolen. Once the hacker has access to this information, they can try using the stolen passwords to gain access to other accounts that use the same password. One way to protect against password reuse and data breaches is to use a password manager, which stores all of you...

A quick run down on Open Source Intelligence and Online Investigative Techniques

Open source intelligence (OSINT) is the process of collecting, analyzing, and disseminating information that is publicly available and legally obtainable. It is a powerful tool for research, investigations, decision making, and intelligence gathering, as it allows individuals and organizations to gather and analyze a wide range of publicly available information in a cost-effective and legally obtainable manner. There are many different sources of open source intelligence, including online news articles, social media, government websites, and public records. To effectively gather and analyze OSINT, it is important to have a systematic approach and to ensure you use a variety of tools and techniques. This will include using search engines, social media platforms, and specialized OSINT tools such as Maltego, Recon-ng and Shodan. It is also important to verify and validate the information you gather through OSINT, using multiple sources and considering any potential biases, agendas and bei...

Welcome to the Investigator515 blog!

  Welcome to The Investigator515 blog! As a seasoned investigator with over 17 years of experience working for corporate and government clients, I'm excited to bring my knowledge and expertise to this blog. We're here to help give people what they need to assist them in staying safe and informed online. Here at Investigator515, we're passionate about sharing valuable insights and resources related to open source intelligence techniques, (OSINT), investigative techniques for managing and processing data, cybersecurity for beginners and online safety. Whether you're a journalist, law enforcement officer, osint nerd or simply someone looking to stay safe online, we believe that everyone can benefit from the information and tools we'll be sharing on this blog. We'll cover a wide range of topics, from the basics of OSINT and data analysis to advanced techniques for protecting your online privacy and staying safe from cyber threats. We hope you'll join us on this ...

ad social bar