Tel Analysis - ④ Telegram.

January 24 2023

MetaOSINT is a free and publicly available selection of the "best" tools and resources designed for OSINT investigations.
 


📬 We punch a person for free using the username

​Watch out for Internet blockages!

To date, it is desirable to be able to track the blocking of various sites, since you never know when your favorite Internet resource will be blocked. 

A tool for in-depth search query on sites 

DirAttack is a tool that allows you to search for a file and directory on a website by keywords. Open source code,

👤 OSINT. Search for a target by username.

• You've probably already encountered a service for finding a target using the username "whatsmyname", and if you haven't, be sure to pay attention. Recently, this resource has been updated and now we can search for information on the username on 576 popular sites. There is also an opportunity to search through the list of usernames, rather than going through the information for each individual query and re-perform the search.

🗞 The Privacy, Security, & OSINT Magazine.

• This month, the fifth issue of the magazine "UNREDACTED Magazine", authored by Michael Bazzell, appeared online.

Symantec researchers report details about the activities of a cybercrime group they track as Bluebottle, revealing significant similarities to the TTP gang OPERA1ER.

As the researchers found out, Bluebottle hackers used a signed Windows driver to attack banks in French-speaking countries. At the same time, the actions and goals correspond to the OPERA1ER profile, which were attributed to at least 35 successful attacks in the period from 2018 to 2020.

🫠 Social Engineering. MFA-fatigue (MFA Fatigue).


• MFA Fatigue is one of the social engineering methods used by attackers to bypass multi—factor authentication, causing an endless stream of push requests sent to the account owner's mobile device. If the victim accepts the request, the attacker will successfully complete the authorization.

👨🏻‍💻 A complete guide to attacks on Internet of Things devices.

• Internet connection gives many of the home devices new useful features, but security in the IoT world often works on the principle of "come in who wants, take what you want."

 

Site Search

Site Menu


☑ Scripts Software

Calendar

«    May 2024    »
MonTueWedThuFriSatSun
 12345
6789101112
13141516171819
20212223242526
2728293031 

Advertisement

Survey on the website

Evaluate the work of the site
 

Statistics

  • +8 Total articles 5598
  • +19 Comments 3081
  • +38 Users : 3988