cookie

We use cookies to improve your browsing experience. By clicking «Accept all», you agree to the use of cookies.

Advertising posts
2 211
Subscribers
+524 hours
+637 days
+43930 days

Data loading in progress...

Subscriber growth rate

Data loading in progress...

Anyone here who can unban a telegram channel? Dm - @reversable
Show all...
How do hackers use OSINT? Google is of course an essential tool for OSINT, but hackers don’t limit themselves to a basic use of the search engine. They’ll use “Google Dorks” searches that include advanced research features in order to find information that a “basic” research would not have found, and that companies might not be aware is publicly available. Hackers also use specifically designed software or search engines to scan the web or social networks. Some of these tools might be publicly available, but others have to be bought and require technical skills to use. Their common feature is that they allow someone to aggregate a large amount of information and to recoup them (for example, with Searx or Kali Tools.
Show all...
Hackers use OSINT for their phishing attacks
Everything we do online leaves a footprint: this is equally true for companies, which aren’t necessarily aware of the information available online about them and the digital traces left by their employees. OSINT is a way to find publicly available information - especially online
But
What information can be found using OSINT? Different channels can be used to find information related to a company and its employees: the company’s official communications of course (through its website), which is freely accessible online, satellite imagery( dated and available on Google Earth archives), social media (posts, pictures, videos, comments…), online forums… In short, OSINT can reveal a wealth of information about a given company. Some of that can then be used for phishing attacks: This Includes Log in Start for free OSINT, hackers and phishing How hackers use OSINT for their phishing attacks Mantra Team Hacking Facebook Twitter Linkedin Everything we do online leaves a footprint: this is equally true for companies, which aren’t necessarily aware of the information available online about them and the digital traces left by their employees. The issue? That information can be collected using OSINT methods (an intelligence gathering technique that uses public sources of information) and used for malicious purposes. What is OSINT? What information can be collected and how can hackers exploit them for phishing and spear-phishing attacks? What is OSINT? OSINT is a way to find publicly available information - especially online What we call “Open Source INTelligence” (OSINT) comes from the intelligence sector. The idea? To find publicly available information (in particular online) on a target, to compare and recoup and to transform this into strategically actionable intelligence. How can this information collection process be conducted? By using search engines (Google obviously, but not only since there are also search engines specifically for OSINT), online maps, the metadata of pictures… etc. After being used in the intelligence industry, this technique can be used in the corporate sector for different purposes: competitive intelligence, economic oversight, online reputation tracking, cybersecurity… But even though OSINT is legal, it can be used for malicious purpoes. What information can be found using OSINT? Different channels can be used to find information related to a company and its employees: the company’s official communications of course (through its website), which is freely accessible online, satellite imagery( dated and available on Google Earth archives), social media (posts, pictures, videos, comments…) online forums… In short, OSINT can reveal a wealth of information about a given company. Some of that can then be used for phishing attacks: Personal : The names and addresses of employees Personal information available on social networks : holidays, purchases, pets… that can be used to personalize targeted attacks Professional : The email addresses, electronic signatures, job descriptions (via LinkedIn for example) The name of C-level managers (the name of the CEO, CFO our Head of HR fro example) can be very useful in opening doors for hackers The names and contacts of certain clients, suppliers or contractors. Personal or financial information that shouldn’t be public but are unfortunately available (through a page that hasn’t been de-listed, or a database that is accessible for example Technical : The tools and software used by the employees (professional mailbox, collaborative suite, HR tool, payroll software, CRM… etc
OSINT + phishing : the winning recipe for hackers
Hackers use OSINT to gather relevant information the companies they target and therefore better prepare their phishing attacks. It’s an essential tool of the reconnaissance phase that precedes a cyberattack
Show all...
4
Play some OSINT CTF's 😉😉
Show all...
Join our discord server for further discussion and details about ctf prelims Link : https://discord.com/invite/c6jVWhSU53 🔥CTF IS LIVE🔥 Website link https://linuxbites.thundercipher.tech/
Show all...
Join the 𝗟𝗶𝗻𝘂𝘅𝗕𝗶𝘁𝗲𝘀 Discord Server!

Check out the 𝗟𝗶𝗻𝘂𝘅𝗕𝗶𝘁𝗲𝘀 community on Discord - hang out with 72 other members and enjoy free voice and text chat.

20:02
Video unavailableShow in Telegram
Website OSINT
Show all...
047-Website OSINT.mp477.37 MB
Awesome OSINT Framework Context : All info about tools & techniques related to search online information GitHub : https://github.com/jivoi/awesome-osint
Show all...
GitHub - jivoi/awesome-osint: :scream: A curated list of amazingly awesome OSINT

:scream: A curated list of amazingly awesome OSINT - jivoi/awesome-osint

Searching for pro people's to make a good team if you have any of the below mentioned skills ib me :- • Crackers( combo maker, config maker) • site hunter (who can find site such as charge, auth) • carder / binner • spammer • coder • android / pc hacker • osinter • web pentesters • app pentesters • bot maker • logo maker • editor • web developer • or any other skills you have let's discuss about it in dm Dm :- @Reversable
Show all...
Repost from N/a
Searching for pro people's to make a good team if you have any of the below mentioned skills ib me :- • Crackers( combo maker, config maker) • site hunter (who can find site such as charge, auth) • carder / binner • spammer • coder • android / pc hacker • osinter • web pentesters • app pentesters • bot maker • logo maker • editor • web developer • or any other skills you have let's discuss about it in dm Dm :- @Reversable
Show all...
Go there for tg premium giveaway - https://t.me/GreyGlitch/540
Show all...
Choose a Different Plan

Your current plan allows analytics for only 5 channels. To get more, please choose a different plan.