The world awaits...

usernames (3)

My Approach to Dark Web Investigations

anonymous woman on stairs at computer

After numerous presentations and trainings on darknet investigations, here's my advice and approach. This is just how I've evolved to do them over the past decade. Your process and results may vary. I'm interested in…

Continue reading...

Frustrations with Passwords and Mobile Phones

Here's a typical password for an account of mine: u5F<UQA:!:a*2HUk>aW&qbj6+Ik%3Hj#A\%|cQP4w.1-q]XmH*Uk]IxXR'`-`VXEjjPH/@9Pq>@z+"\- Now try to type that into an app on your phone. Now try to type that every time the app updates or you come out of…

Continue reading...

SSH attack usernames

Today I received 201 ssh attacks against one of my servers. I logged all of the attempted usernames: Times Used & Username 1 (space) 1 Fake 1 anon 1 anonymous 1 apple 1 bin 1…

Continue reading...