OSINT Techniques
May 11, 2025
An online notepad
May 11, 2025
November 29, 2024
Backup is the first rescue line a company uses to handle a breach. But what happens if the backup is on the attacked server? And even worse, what happens when the backup file is the entrance vector for the hacker? A Russian hacker shared a story on a dark web blog about how he breached a company using a backup file.
November 21, 2024
The information provided in this post is intended for educational and research purposes only. It is not intended to encourage or condone any illegal activities. Hiring a hacker or engaging in any form of unauthorized access to computer systems is illegal and can result in severe legal consequences. It is crucial to always respect the law and refrain from participating in criminal activities.
November 14, 2024
The information provided in this post is intended for educational and research purposes only. It is not intended to encourage or condone any illegal activities. Hiring a hacker or engaging in any form of unauthorized access to computer systems is illegal and can result in severe legal consequences. It is crucial to always respect the law and refrain from participating in criminal activities.
November 7, 2024
The information provided in this post is intended for educational and research purposes only. It is not intended to encourage or condone any illegal activities. Hiring a hacker or engaging in any form of unauthorized access to computer systems is illegal and can result in severe legal consequences. It is crucial to always respect the law and refrain from participating in criminal activities.
October 31, 2024
The information provided in this post is intended for educational and research purposes only. It is not intended to encourage or condone any illegal activities. Hiring a hacker or engaging in any form of unauthorized access to computer systems is illegal and can result in severe legal consequences. It is crucial to always respect the law and refrain from participating in criminal activities.
March 22, 2024
September 6, 2023
February 20, 2023
After we learned in a brief what is risk management we can dive into what is social engineering risk management.
February 15, 2023
A short recap about risk management in general. Any risk management is based on four functions -
April 22, 2022
September 23, 2021
New day new task without Stackoverflow solution.