Category: OSINT

The Privacy, Security, & OSINT Show – Episode 112

EPISODE 112: Privacy Lessons from the Road

This week I discuss some lessons learned when attempting anonymous travel, the most recent privacy related news, Facebook’s search changes, and a site that generates photos of people who do not exist.


SHOW NOTES:

PRIVACY LESSONS FROM THE ROAD:


PRIVACY NEWS:

https://arstechnica.com/information-technology/2019/02/catastrophic-hack-on-email-provider-destroys-almost-two-decades-of-data/

https://www.businessinsider.com/nest-microphone-was-never-supposed-to-be-a-secret-2019-2?utm_source=reddit.com

https://www.techradar.com/news/major-security-issues-found-in-popular-password-managers

OSINT:

https://inteltechniques.com/menu.html
https://thispersondoesnotexist.com/


Data Removal Workbook:
https://inteltechniques.com/data/workbook.pdf


 

New Email Search Tool for Offense & Defense

I have always maintained an Email Search Tool as part of my set of online investigation tools at https://inteltechniques.com/menu.html. This month, a series of reports about a huge new set of data breaches emerged and created unnecessary panic. While there truly was a new public database released containing hundreds of millions of email addresses and passwords, the vast majority was old data which had surfaced several years prior. Regardless, it was a good reminder that we should be diligent about checking our own email accounts against the various online repositories that possess most of the public leaks/breaches/data dumps being abused by amateur criminals. Investigators should also take advantage of this information as part of every email investigation. Recently, I made several changes to the Email Search Tool as seen below.

In this example, I entered a test email address and chose the "Populate All" option. The following details explain the first six options, which are the most lucrative.

Breaches/Leaks: This tool queries the HIBP API and presents the results in the window to the right. In this example, you can see that the test email is present within numerous data breaches. The OFFENSE of this is to identify the various online accounts in use by your target. The DEFENSE is to identify your own accounts with exposed passwords and change them anywhere they have been used.

Pastes: This queries the HIBP Pastebin API and identifies email addresses that have appeared on pastebin.com, which is often used to store user credentials.

PSBDMP: This queries the PSBDMP collection of pastebin scrapes, which identifies email addresses that have appeared on pastebin.com, even if they have been removed or were never indexed by Google. The results display in the window to the right, and I have added the complete URL of each entry for further investigation. (Thanks to Justin Seitz for fixing my pathetic PHP attempt on this). This has been a huge help with my investigations. A sample entry with the dates of original capture is below.

Verifier: This opens a new tab and queries the address through the Trumail API. This identifies whether the email address is valid, has a full inbox, is a catch-all, is from a disposable email provider, and other interesting details.

Dehashed: This opens a new tab and queries the free version of dehashed.com, which displays any additional breaches that may not have been captured by the previous attempts. Paid memberships can see the password details.

IntelX: This premium option (with a free trial) also identifies pastebin posts that reference the email address. The free version will tell you that the data exists, the premium (or free trial) will display the content.

I encourage everyone to check their own email addresses on occasion. If you appear within any of these data sets, you know that an account has likely been compromised to some extent. Be sure to change those passwords to something secure, unique, and preferably randomly generated by a password manager (I use KeepassXC).

The Privacy, Security, & OSINT Show – Episode 110

EPISODE 110: Testing Your Online Security

This week I discuss easy ways to test your VPN, DNS, Browsers, extensions, and custom settings. I also revisit canary tokens as a test of your potential exposure.


SHOW NOTES:

SPONSORS:

Privacy.com: https://privacy.com/inteltechniques

PRIVACY: TESTING YOUR ONLINE SECURITY:

https://panopticlick.eff.org/
https://www.deviceinfo.me/
https://browseraudit.com
https://browserleaks.com/
https://detectmybrowser.com/
https://ipleak.net
https://www.dnsleaktest.com/
https://www.emailprivacytester.com

OSINT:  TESTING DEFENSE TO CANARY TOKENS:

http://canarytokens.org/generate


Data Removal Workbook:
https://inteltechniques.com/data/workbook.pdf

Please submit your listener questions at https://inteltechniques.com/podcast.html


 

Buscador 2.0 OSINT Virtual Machine Released!

Buscador is a free Linux Virtual Machine that is pre-configured for online investigators. It was developed by David Westcott and myself, and distributions are maintained at https://inteltechniques.com/buscador/index.html. We also released a podcast today about this new release, which can be found at https://soundcloud.com/user-98066669/109-privacy-news-buscador-20-release. Download links and install instructions can be found at https://inteltechniques.com/buscador/index.html. The current build is under 5GB and includes the following resources:

Custom Firefox Browser & Add-Ons
Custom Chrome Browser & Extensions
Tor Browser
Custom Video Manipulation Utilities
Custom Video Download Utility
Amass
BleachBit
EmailHarvester
ExifTool
EyeWitness
Ghiro
GIMP
Google Earth Pro
HTTrack Cloner
InstaLooter
KeePassXC
Kleopatra
Knock Pages
LibreOffice
LinkedInt
Maltego
Metagoofil
MediaInfo
Metadata Anylisation Toolkit
PhoneInfoga
Photon
ReconDog
Recon-NG
SkipTracer
SocialMapper
Spiderfoot
StegoSuite
SubBrute
Sublist3r
theHarvester
Tinfoleak
Twint
Twitter Exporter
VeraCrypt
VLC
Yubico Utilities

The Privacy, Security, & OSINT Show – Episode 109

EPISODE 109: Privacy News & Buscador 2.0 Release

This week I talk about the latest privacy news and David Westcott joins me to announce the official release of the free Buscador OSINT Virtual Machine.


SHOW NOTES:

SPONSORS:

Silent Pocket: https://silent-pocket.com/discount/totalprivacy
Authentic8: https://info.authentic8.com/

PRIVACY/SECURITY:

Latest Breach Discussion:
https://krebsonsecurity.com/2019/01/773m-password-megabreach-is-years-old/

Chrome Proposes to Eliminate Script Blockers:
https://www.theregister.co.uk/2019/01/22/google_chrome_browser_ad_content_block_change/

Archive.org Ignoring Robots.txt:

User-agent:ia_archiver
Disallow: /
User-agent: archive.org_bot
Disallow: /

MyLife Removal Update:
https://www.bbb.org/consumer-complaints/file-a-complaint/get-started

"Dumb" Blu Ray Players:
Magnavox 4K blu day player

A.I. is Now Watching Us:
https://www.cbsnews.com/news/60-minutes-ai-facial-and-emotional-recognition-how-one-man-is-advancing-artificial-intelligence/

China Crowdsourcing Debt Shaming:
https://www.dailymail.co.uk/news/article-6620879/China-launches-app-tells-500-yards-debt.html?ito=social-facebook

OSINT:  Buscador 2.0 Release:

David Westcott:
https://twitter.com/ninjininji

Buscador 2.0:
https://inteltechniques.com/buscador/index.html

LISTENER QUESTIONS:

Q: When I was in grade school, my parents signed a release allowing the school to publish my full name, school assignments/awards, and picture on their website. Since then, the websites been archived and cannot be removed. Besides that, the school says they wouldn’t remove it anyway since they have a valid release signed. Now, when I search my true name, pictures of me and the school I went to and my hometown and old friends and such are all readily available. Is this something I should be concerned about? Is there anything that can be done to remove it or bury it under disinformation or something?

Q: I've been using Lastpass for a few years and have recently started looking into non-cloud options like KeePassXC. I just came across a few services, like LessPass, MasterPassword, and getVau.lt, which take contextual data like the site and your login ID along with a master password to calculate passwords for services. Because of this there is no need to store passwords and you can even generate a password directly from the websites by entering the site, login, and your master password. What are your thoughts on something like this?


Data Removal Workbook:
https://inteltechniques.com/data/workbook.pdf

Please submit your listener questions at https://inteltechniques.com/podcast.html