Hello there, I've been exploring a little bit the OSINT "system/procedure" for while and I Wonder How To get more reliably info and so my questions are: Which tool(s) do you use to gather information on individuals? Which tool(s) do you use to gather information on companies ...more
I only knew about it when I was reading a very small article (five sentences long) in a local newspaper. Despite of not telling how was the process of acquiring their targets it seems Tor (and perhaps I2P) are compromised in a larger scale that we thought. SOURCE link Dark w ...more
(NOTE: This is a ctrl-c / ctrl-v from the original site) PrivaTegrity communication network provides secure communication platform and Anonymity — Maybe better than Tor. A new anonymous communication network by the name of PrivaTegrity has been launched by renowned encryptio ...more
Hello there, I was surfing the web a looking for scripts in PHP when I came across this: FBI crack Tor and catch 1,500 visitors to biggest child pornography website on the dark web They mention, and I quote "deployed a network investigative technique (NIT) – a hacking tool – ...more
Hello there Could someone give me a hand or point into the right direction? Is it possible to insert a payload or any other .exe into an image file and make it run when clicking on it? Does ms has something for that? I've been googling and "Null bytting" but I cant get any c ...more
Hi there, this just happen today, and I hope I'm not on that age of starting to ear stuff in my head. I was just killing some time on facebook, before come to work, I was playing a game when suddenly I started to ear on the speakers CB communications. Just for a second or so ...more
A hacker entered the BitDefender antivirus known servers and found that many did not expect: passwords without encryption stored on the servers. The case happened a week ago, and is leaving quite astonished security community, because the encrypted passwords is a basic rule o ...more
They aren't rappists, drugg dealers ou murderers, they are hidden hackers, that after their deeds the FBI offered a total of 380 million euros for capturing them. I'll leave here the top 5 1. Evgeniy Mikhailovich Bogachev Reward: 3 milhões dolars. Responsable for the creatio ...more
I was wondering on the web yesterday and I found this: REcon - "REcon is a computer security conference with a focus on reverse engineering and advanced exploitation techniques. It is held annually in Montreal, Canada. The conference offers a single track of presentations ov ...more
So as I was reading the http://null-byte.wonderhowto.com/forum/hornet-onion-ring-routing-network-0163393/ Hornet Onion post I followed the link and read the "news". But I caught an eye another interesting report: Proxyham - How to access Wi-Fi anonymously from miles away - htt ...more
Hey there, I was with nothing else to do and I was pinging random domains and in one I've got something like this: I ping the main domain and got an IP, pinged one of it subdomains and got an IP on the same address range but after that, pinging it "sub subdomain" I got a diffe ...more