image/jpeg

RSS Saver

When I was reviewing OSINT tools from the Intel Techniques course, I wondered if there is a better way to keep track of what’s going on with a specific website. You could screenshot that website multiple times per day, every day, but that could be tiresome and potentially rate-limited.

It occurred to me that many times a website will tell you when it’s updated via an RSS feed. Any RSS feed reader will read the feed and output it to the display, but can I use that feed to download the entire page where the feed is linked to without needing to visit the page directly? The answer, of course, is yes, but the problem is that there isn’t already a tool that does that. That’s why I wrote RSS Saver. Here’s how it works:

Read more

How to Use Usenet for Research and OSINT Investigations

OSINT, especially the SOCMINT (Social Media Intelligence) specialty, is often focused on widely used social media platforms like Twitter/X, Facebook, etc. However, there are lesser-known alternatives, such as Usenet, that can be a goldmine for OSINT investigations.

This article is not only for OSINT practitioners but also for researchers and internet historians who want to understand the specific ins and outs of Usenet research.

What is Usenet?

Before diving into how to use Usenet for OSINT, let’s briefly cover what it is. Usenet, also previously known as “NetNews,” is a decentralized network of servers that provide access to the Usenet network. Usenet is not a product; much like Email or IRC, it is an open internet standard (NNTP) that anyone can use. In many ways, you can think of it as the message board cousin to Email.

Read more

Grok Analysis

Earlier today, Elon Musk wrote:

musk (Original Link)

So I wondered, would this work with Geolocation?

I live in a city with a fair about of tourist attractions and while Grok was able to identify the city with a few photos, it was no able to tell me specifically where in the city. It also completely failed to recognize a few major landmarks. OK fine, it’s not good at direct Geolocation. Maybe that is something that will be better with time or maybe that’s there on purpose as a privacy measure.

Read more

My First (and only) Hack

When I say “hack,” I’m referring to something that was potentially illegal by today’s standards, but this was nearly 30 years ago, and since no one ever caught on, I’m okay sharing this tale.

Back in the fall of 1996, I started at a small rural community college. Their tech setup was basic - think laughable DSL for internet and a library BBS for book reservations and searches, which you could dial into.

Read more

Metadata

My first job in IT was at a small company, “A,” that researched telephone data for a very large company, “B.” You see, company “B” was a huge multinational conglomerate with offices all over the world. This meant they had several telephony providers that charged them not only for actual phone usage but also for the phone ports in the PBX.

That meant I spent days each week researching which phone ports were actually used by calling the phone numbers with little or no usage. It was boring and tedious, to say the least, but at least I got to listen to some awesome podcasts when podcasts first started becoming popular.

Read more

This Old Laptop

Teclast-F5

My backup laptop is a Teclast F5. It has an 11.6″ touchscreen display, a Celeron N4100 CPU, 8GB of RAM, and a soldered 128GB SSD (not NVMe). I’ve owned it since at least 2018, though it’s not my daily driver. For everyday use, I rely on a newer ASUS laptop with an i9 CPU, 32GB of RAM, and 2TB of disk space. However, despite the superior specs, I often face issues with video and other drivers, particularly on Linux, and occasionally even on Windows. In contrast, the Teclast F5 just works.

Read more

Working with Torsocks

Torsocks acts as a network wrapper around linux applications. This allows them to work on the Tor network where that might not normally be possible. If the application that you are working with already has functionality that allows it to take advantage of a SOCKS5 proxy, then you can use Tor’s built in proxy to do that. However if the application doesn’t have that functionality, you can try to use Torsocks instead.

Read more

Email2.0

For those who may not know, email is not owned by any one company. There are no copyrights or patents associated with email itself. It’s an open standard that evolves over time through RFCs. While individuals and companies are free to develop software—whether open or closed source—using this standard, the core of email remains unchanged.

My Suggestion: Make Metadata-Minimized Email the New Standard Currently, email consists of headers and a body. Even if the body is encrypted, the headers are not. These headers contain a significant amount of data that can be harvested, even if the message content remains unknown. This makes email inherently less private than other forms of electronic communication, and it’s one of its greatest vulnerabilities.

Read more

Use Tor Without Tor Browser

This post originally came from a reply that I made to a question that was asked on the r/tor subreddit.

So, you want to run the tor service on in Linux but not just with the Tor Browser. Let’s assume that you’re running a Debian-based Linux distro.

sudo apt update && sudo apt install tor torsocks
sudo systemctl enable --now tor

This will install the tor service and run it as a server as the “tor” user. Any program that you run that can use a SOCKS5 proxy can take advantage of this service by connecting to localhost:9050.

Read more

Space Oddity

I’m not a David Bowie fan, but in the song Space Oddity, there’s this amazing line:

This is Ground Control to Major Tom

You’ve really made the grade

And the papers want to know whose shirts you wear

Now it’s time to leave the capsule if you dare

Sandwiched between congratuations to Major Tom and telling him that he has to progress to the next step of his mission, we find out what actually matters to the press (and the regular people): “And the papers want to know whose shirts you wear”. In other words, they don’t really care. This event is the first so everyone is excited because of that, but they don’t actually care about it really. They care more about Major Tom’s choice of fashion than about him or his mission.

Read more