Citadelo Blog on leaking IP's This is a website with a great write up about finding web server's actual IP's behind reverse proxies like cloudflare. Extremely informative and devious because it explains all the attack vectors well. I got to get better at XML External Entity vulnerabilities so I can leak IP's on applications that use XML through the Document Type Definition (DTD). Festina Lente.
Knowing how to pivot is important in OSINT it seems and to go from a wide scope to a narrower scope. Pivot charts are useful to collect information of results from selectors, each pivot being a resultant node of information. Going from a wide search to a narrower search is like the goldilock's effect, a little too wide and you lose focus but too focused you can lose out on other wider details. All sources state that methdology trumps tools and the focus early on in an OSINT career is to develop your methodology like knowing how to pivot and knowing the intelligence cycle. Being nimble and flexible in your search queries is important to hone your searches using Google as a primary tool to locate information. You just have to Google it. You Google to find tools like websites that facilitate investigations. It seems that Rae Baker, the author of Deep Dive into OSINT, is adept at using Google to serve her needs though she stresses the importance of methodology. Cynthia Hetherington of ...
Comments
Post a Comment