Posts

Showing posts with the label ethical hacking

So what is a hacker anyway? A short look at Black hats, White hats and everything in between

Image
The term "hacker" has been around for decades, but its meaning has changed significantly over time. In the early days of computing, a hacker was simply someone who was passionate about technology and loved to tinker with computers and software. These individuals were often self-taught and would spend countless hours exploring the inner workings of technology and discovering new ways to use it. But as the world became more connected through the internet, and computers became a critical part of our daily lives, the meaning of the word "hacker" began to change. It started to take on a more sinister connotation, as individuals began using their knowledge and skills to gain unauthorized access to computer systems and steal sensitive information. Nowadays, there are three main types of hackers: white hat, gray hat, and black hat. White hat hackers are the "good guys" of the hacking world. They use their skills to help organizations and individuals identify an...

So I've officially been breached. What happens next???

Image
So I've officially been breached. What happens next??? Note: While we are going to discuss real hacks, please understand we will do so in an indirect way, without compromising any leaked information. If you're like many Australians, you may have received notification over the past year that you've been involved in some form of data breach or cyber attack. If you have a limited understanding of how this stuff works, it can be intimidating to be in this situation. It's your information in someone else's hands without a clear understanding of what's happening to it or where it's going. While every attack, breach, and compromise scenario is unique, today we will try to cover some of the common scenarios after a breach, and how you can best manage them for yourself. Firstly, it's important to wait for validation of the breach from credible sources. Note that we said credible, not official. You'll usually be able to find this out by being directly ...

A quick word on the dark web.

Have you ever heard of the dark web? Of course you have! Still, it's a mysterious and largely uncharted part of the internet that can only be accessed using specialized software like the TOR network. While some people use the dark web for legitimate purposes, it's also a hotbed of cybercriminal activity. One thing you'll find being traded on the dark web is stolen data. This is often data that has been obtained through data breaches, which are attacks that involve the theft of sensitive personal and financial information. These breaches can happen through unsecured databases, insecure communication protocols, or malicious insiders. Stolen data is typically sold on underground marketplaces that are only accessible through the use of TOR and other anonymity tools. These marketplaces often have complex security protocols in place to avoid detection by law enforcement and security researchers. In addition to underground marketplaces, stolen data is also often shared on pa...

Password Management 101. Part B: A quick what if in a hypothetical Data Breach

Image
 The Dangers of Reusing Passwords: An Entirely Hypothetical Scenario. Imagine that you're a hacker looking to gain access to someone's online accounts. You've come across a list of passwords that were recently leaked in a data breach, and you notice that one of the passwords is one that you've seen before - it's a password that you've used on a few of your own accounts and its also linked to a target of yours. You decide to try using this password to see if it works on any other accounts. You start by searching for the person's email address online, and you quickly find their social media profiles. You try logging into their social media accounts using the password from the data breach, and to your surprise, it works. Now that you have access to their social media accounts, you start digging deeper. You look through their posts and profile information to see what you can learn about them. You notice that they've posted about their recent vacation to Hawa...

Password Mangement 101. Part A: Why a password manager.

Password Management for Beginners: Why Reusing Passwords is a Major Security Risk If you're like most people, you probably have a lot of online accounts - from social media to online shopping to banking. Keeping track of all of these accounts and their corresponding passwords can be a hassle, so it's tempting to use the same password for multiple accounts. But this is a major security risk. If one of your accounts is compromised, the attacker can then try using that same password to gain access to your other accounts. One way that hackers can gain access to your passwords is through data breaches. These are instances where a company's database is hacked and sensitive information, including user passwords, is stolen. Once the hacker has access to this information, they can try using the stolen passwords to gain access to other accounts that use the same password. One way to protect against password reuse and data breaches is to use a password manager, which stores all of you...

A quick run down on Open Source Intelligence and Online Investigative Techniques

Open source intelligence (OSINT) is the process of collecting, analyzing, and disseminating information that is publicly available and legally obtainable. It is a powerful tool for research, investigations, decision making, and intelligence gathering, as it allows individuals and organizations to gather and analyze a wide range of publicly available information in a cost-effective and legally obtainable manner. There are many different sources of open source intelligence, including online news articles, social media, government websites, and public records. To effectively gather and analyze OSINT, it is important to have a systematic approach and to ensure you use a variety of tools and techniques. This will include using search engines, social media platforms, and specialized OSINT tools such as Maltego, Recon-ng and Shodan. It is also important to verify and validate the information you gather through OSINT, using multiple sources and considering any potential biases, agendas and bei...

Welcome to the Investigator515 blog!

  Welcome to The Investigator515 blog! As a seasoned investigator with over 17 years of experience working for corporate and government clients, I'm excited to bring my knowledge and expertise to this blog. We're here to help give people what they need to assist them in staying safe and informed online. Here at Investigator515, we're passionate about sharing valuable insights and resources related to open source intelligence techniques, (OSINT), investigative techniques for managing and processing data, cybersecurity for beginners and online safety. Whether you're a journalist, law enforcement officer, osint nerd or simply someone looking to stay safe online, we believe that everyone can benefit from the information and tools we'll be sharing on this blog. We'll cover a wide range of topics, from the basics of OSINT and data analysis to advanced techniques for protecting your online privacy and staying safe from cyber threats. We hope you'll join us on this ...

ad social bar