This episode of Week in OSINT features some very exciting topics. Not only do we have some really cool tips and tricks on Telegram, but there's also a new tool to locate Telegram users. Then there is a nice tutorial on how to use cURL, an article on a dark market vendor, and we dive into the world of drones:
Twitter user hatless1der wrote a blog earlier this month with some good Telegram tips. And the great thing about this post is, that you don't even need to have an account for these tips. From expanding the intro text, to quickly browsing within channels that offer a preview. Some solid tips, with a bonus bookmarklet by Micah Hoffman. Maybe some tips were known already, but I've learned something new too!
Over on Twitter the user Tactical OSINT Analyst shared a long tutorial that he posted over on GitHub. It has lots of tips on how to use cURL to retrieve information from the internet. It might be that he uses iOS, and therefore installs the tool with
brew. But if you need to know how to install this tool for your personal operating system, then simply visit the official cURL page over here: https://curl.se/
Bushidotoken has written an article on his personal blog, where he dives into the Dark Maul dark market. I included this article, to show how open source information can be used within threat intelligence. From basic information within Whois registrations, to usernames on forums. These are just a few pieces of information that are the basis of a profile, that will extend over time when more information emerges. In this line of work it's important to document every bit of information, to create an as complete picture as possible.
Venessa Ninovic, better known as Intel_inquirer on Twitter, published a blogpost about drones last week. The article is riddles with links to examples, news articles and other blogs. But it also features a set of links that will point you to resources to help you identify drone types, find registration information or even drone footage. And of course you can track drones too, and Vanessa gives an example of that. But if you're really lazy, you can also go over to ADS-B Exchange and click the 'Drone' filter (link). And with that, I'll add another bonus tip: If you are searching for registration numbers of USAF aircraft, then I would suggest you check out the extensive history over at Joseph Baugher's page. And if you want to be really lazy, you can open
ADS-B Exchange: https://globe.adsbexchange.com/
USAF Serials: http://www.joebaugher.com/...
Twitter user alb_310 from ProjetFox created an enhanced version of the Telegram nearby tool. After installing and filling in all the information needed, the tool works flawless. With a click on the button, it'll retrieve all users within a distance of 500, 1000, 2000 or more than 3000 meters. And the good thing is, it also stores the results in a JSON file after it finishes. It doesn't offer any searching within the GUI itself, and even though there are no scrollbars, you can actually scroll through the results. But the tool works really easy, and besides showing an avatar to everyone, it doesn't need any other extra rights. So in regard to OpSec, geogramint is a welcome addition to your toolbox!
Have a good week and have a good search!