Category: OSINT

The Privacy, Security, & OSINT Show – Episode 239

EPISODE 239-Health Portals, Vulnerability Reports, and Voice Cloning

This week I discuss the importance of claiming your health portal profile, considerations when disclosing online vulnerabilities, and the new threat with voice cloning.

Direct support for this podcast comes from sales of my books, services, and online training. More details can be found at IntelTechniques.com. Your support eliminates any ads, sponsors, endorsements, Patreon, donations, or commercial influence on this show.


SHOW NOTES:

INTRO:

None

UPDATES:

VoIPSuite Calling

NEWS:

Fraudsters Cloned Company Director’s Voice In $35 Million Bank Heist

HEALTH PORTALS:

Discussion

VULNERABILITY REPORTS:

Department of Elementary and Secondary Education website


Free Workbooks: https://inteltechniques.com/links.html

Affiliate Links:
ProtonVPN: https://go.getproton.me/aff_c?offer_id=26&aff_id=1519&url_id=282
ProtonMail: https://go.getproton.me/aff_c?offer_id=26&aff_id=1519&url_id=267
SimpleLogin Masked Email: https://simplelogin.io?slref=osint


The Privacy, Security, & OSINT Show – Episode 237

EPISODE 237-The Huge OSINT Show

This week Jason Edison joins me to discuss many new OSINT topics, resources, and tools.

Direct support for this podcast comes from sales of my books, services, and online training. More details can be found at IntelTechniques.com. Your support eliminates any ads, sponsors, endorsements, Patreon, donations, or commercial influence on this show.


SHOW NOTES:

INTRO:

Door Dash

THE HUGE OSINT SHOW:

https://inteltechniques.net

YT-DLP:
sudo python3 -m pip install yt-dlp
sudo python3 -m pip install yt-dlp -U
brew install yt-dlp
choco install yt-dlp
Modified linux.txt and linux.sh to include installation of yt-dlp.
Modified linux.txt to include update of yt-dlp.
Modified youtubedl.sh script to include yt-dlp options.
Modified updates.sh to include auto update process for YT-DLP.
Modified mac.txt (Mac)to include installation YT-DLP.
Modified Video Download Tool (Mac) to include yt-dlp options.
Modified windows.txt (Windows) to include installation YT-DLP.
Modified youtubedl.bat (Windows) to include yt-dlp options.

WSL:
wsl --install
https://github.com/microsoft/terminal

https://www.scout.tel/phone-number-lookup

Mailcat & Nexfil:
sudo apt-get update && upgrade -y
git clone https://github.com/sharsil/mailcat
cd mailcat
pip3 install -r requirements.txt
./mailcat.py username
./mailcat.py osint
git clone https://github.com/thewhiteh4t/nexfil.git
cd nexfil
pip3 install -r requirements.txt

https://osint.sh/md5/
https://osint.sh/ocr/
https://osint.sh/stack/
https://osint.sh/crt/
https://osint.sh/reversewhois/
https://osint.sh/analytics/
https://osint.sh/adsense/

https://publicrecords.netronline.com/

https://host.io/
https://host.io/inteltechniques.com
https://host.io/backlinks/inteltechniques.com
https://host.io/redirects/inteltechniques.com

http://kartaview.org/
https://kartaview.org/map/
https://kartaview.org/details/13089/2563/track-info
https://kartaview.org/details/1280753/4259/track-info
https://kartaview.org/user/jb-brown

https://breachdirectory.org/

https://linktr.ee/constellate
site:linktr.ee "osint"

https://bankrupt11.com/
site:bankrupt11.com smith

http://www.stparchive.com/landing.php
http://ytw.stparchive.com/
site:stparchive.com “keyword”
site:stparchive.com “first last” “location”
site:stparchive.com “chris reeves”
site:stparchive.com "chris reeves" "louisiana"

Next week:

238-Anonymous Phone Loose Ends


Free Workbooks: https://inteltechniques.com/links.html

Affiliate Links:
ProtonVPN: https://go.getproton.me/aff_c?offer_id=26&aff_id=1519&url_id=282
ProtonMail: https://go.getproton.me/aff_c?offer_id=26&aff_id=1519&url_id=267
SimpleLogin Masked Email: https://simplelogin.io?slref=osint


The Privacy, Security, & OSINT Show – Episode 234

EPISODE 234-Privacy, Security, & OSINT Updates

This week I discuss the importance of offline maps, a recent Protonmail court order, online petition privacy issues, and another site which provides free historical domain information.

Direct support for this podcast comes from sales of my books, services, and online training. More details can be found at IntelTechniques.com. Your support eliminates any ads, sponsors, endorsements, Patreon, donations, or commercial influence on this show.


SHOW NOTES:

INTRO:

None

PRIVACY & SECURITY UPDATES:

Offline Maps: https://osmand.net/
Protonmail Court Order
IRS Proposal Petitions

OSINT:

https://osint.sh/whoishistory/


Free Workbooks: https://inteltechniques.com/links.html

Affiliate Links:
ProtonVPN: https://go.getproton.me/aff_c?offer_id=26&aff_id=1519&url_id=282
ProtonMail: https://go.getproton.me/aff_c?offer_id=26&aff_id=1519&url_id=267
SimpleLogin Masked Email: https://simplelogin.io?slref=osint
Silent Pocket: https://silent-pocket.com/discount/IntelTechniques
Amazon: https://amzn.to/3eCjp7J


The Privacy, Security, & OSINT Show – Episode 231

EPISODE 231-This Week In Privacy, Security, & OSINT

This week I offer discussions on the latest T-Mobile breach, a US Census breach, another lesson on "Journalism" and doing your own research, macOS telemetry updates, and an OSINT tip for image forensics.

Direct support for this podcast comes from sales of my books, services, and online training. More details can be found at IntelTechniques.com. Your support eliminates any ads, sponsors, endorsements, Patreon, donations, or commercial influence on this show.


SHOW NOTES:

INTRO:

TC Jr.

UPDATES:

None

THIS WEEK IN PRIVACY, SECURITY, & OSINT:

T-Mobile Breach
Census Breach
A Lesson on "Journalism" and Doing Your Own Research
https://inteltechniques.com/blog/2021/08/18/macos-telemetry-update/

OSINT:

https://inteltechniques.com/blog/2021/08/14/sherloq-an-open-source-image-forensic-toolset/


Free Workbooks: https://inteltechniques.com/links.html

Affiliate Links:
ProtonVPN: https://go.getproton.me/aff_c?offer_id=26&aff_id=1519&url_id=282
ProtonMail: https://go.getproton.me/aff_c?offer_id=26&aff_id=1519&url_id=267
SimpleLogin Masked Email: https://simplelogin.io?slref=osint
Silent Pocket: https://silent-pocket.com/discount/IntelTechniques
Amazon: https://amzn.to/3eCjp7J


Sherloq: An Open Source Image Forensic Toolset

In my OSINT book, I spoke very favorably of Foto Forensics (http://fotoforensics.com) as an online tool which could examine details of a photo including metadata and image analysis. This could help identify areas of an image which have been manipulated plus many other features. Foto Forensics has been blocking VPN addresses lately, and I have always been a bit uncomfortable uploading images associated with my investigations. This is where Sherloq (https://github.com/GuidoBartoli/sherloq) enters our arsenal of tools.

Sherloq includes the same features, but runs 100% locally on your machine. It works within Windows, Mac, and Linux. Since I use Linux VM's within my book and my investigations, I will only focus on Linux installation. Furthermore, I have created a desktop launch script which matches the other apps within my OSINT VM. I have updated the linux.txt file within the book resources page (link included in your book) with the full directions, but I will also include them below. These are modified from the instructions at the source to match the needs of the VM from my book. Images of the tool with sample photos is at the end of this post.

Installation:

cd ~/Downloads/Programs
mkdir Sherloq
cd Sherloq
sudo apt install python3-distutils python3-dev python3-testresources subversion -y
sudo python3 -m pip install virtualenv virtualenvwrapper
echo -e "\n# Python Virtual Environments" >> ~/.bashrc
echo "export WORKON_HOME=$HOME/.virtualenvs" >> ~/.bashrc
echo "export VIRTUALENVWRAPPER_PYTHON=/usr/bin/python3" >> ~/.bashrc
echo "source /usr/local/bin/virtualenvwrapper.sh" >> ~/.bashrc
source ~/.bashrc
mkvirtualenv sq -p python3
git clone https://github.com/GuidoBartoli/sherloq.git
cd sherloq/gui
sudo python3 -m pip install -r requirements.txt

Add a launch icon:

curl -u UsernameFromBook:PasswordFromBook -O https://inteltechniques.com/osintbook8/vm-files/shortcuts/sherloq.desktop
sudo mv sherloq.desktop /usr/share/applications/
cd /usr/share/applications/
sudo chown --reference=usertool.desktop sherloq.desktop
sudo chmod +x sherloq.desktop

This will add a new shortcut in your Applications menu to launch Sherloq.