OSINT with ShadowDragon & Digital Tools For Modern Investigations

Follow OSINT with ShadowDragon & Digital Tools For Modern Investigations
Share on
Copy link to clipboard

This podcast covers a variety of cyber security topics, with a focus on candor, and zero b.s. Topics may include OSINT, PAI, Tailored Monitoring, Investigations, Offensive Disciplines, AI/ML, Object Recognition, Forensics, Historical Industry Lore, All things considered in Cyber.

Daniel Clemens from ShadowDragon, LLC


    • Sep 25, 2020 LATEST EPISODE
    • infrequent NEW EPISODES
    • 1h 7m AVG DURATION
    • 8 EPISODES


    Search for episodes from OSINT with ShadowDragon & Digital Tools For Modern Investigations with a specific topic:

    Latest episodes from OSINT with ShadowDragon & Digital Tools For Modern Investigations

    Exploring OSINT, War Stories & OSINT with (Nico Dekens) Dutch_OSINTguy

    Play Episode Listen Later Sep 25, 2020 80:28


    Nico shares his origin story along with war stories old, and new. Topics the following: * Leadership seems to want visualization, analyst don't care. Discussions evolve about how heat maps/crap maps may or may not be relevant. * Geographical visualization helps with different types of investigations. * Mapping Tactical Data is useful, timelines are helpful with pruning as well as mapping money laundering while other types of data fall short. Special Guest: Nico Dutch Osint Guy.

    Charl van der Walt on red team vs blue team, history, threat intelligence, infosec rockstars, and striving for excellence.

    Play Episode Listen Later Jun 18, 2020 80:26


    Red team versus blue team. All should become a purple team!! Searching for a way around the rockstar mentality all too common within the infosec industry, as the proposal to build a team of teams is announced. Deception technology mixed with an actual true cost analysis of threat intelligence lending questionable returns. The roller coaster of topics reaches a pinnacle with a reflection on being allocentric within the security industry versus viewing security solely through the lens of industry growth. Topics include: * Charl shares his history, growth, and maturity within the industry. * Red team vs. blue team, and how everyone should be a purple team. * Deception technology, honeypots, forensics, and storytelling with data. * Getting around the rockstar mentality within infosec, and teamwork produces a higher ROI. * Demystifying the value of threat intelligence. Notable Quotes: "Think about what you do as something that matters and approach it in that way and the rest will follow." - Charl van der Walt Special shout outs to: * Haroon Meer (https://linkedin.com/in/haroonmeer) from Thinkst (https://www.thinkst.com) * Roelof Temmingh (https://linkedin.com/in/roeloftemmingh) from Vortimo (https://www.vortimo.com/). Special Guest: Charl van der Walt.

    Blake Butler Interview - Intel CTF, Hacking Back, Actor Engagement & Synthetic Identities in the Cognitive Warfare Landscape

    Play Episode Listen Later Apr 29, 2020 79:33


    Actor engagement, and physical security intersect when active shooter situations or heightened security threats are targeted against executives or physical locations. Naturally, the topic of hack-back arises but this takes us down the rabbit trails of the roles synthetic identities play in the cognitive landscape, actor engagement and experiences found only in the trenches. Blake Butler from Paypal joins us in exploring very specific topics that are not discussed enough. Topics include: * Using OSINT, and Targeting in Active Shooter or physical security situations. * Hack back or Long Term Investigations * Actor engagement is a must for gleaning better intelligence. This isn't hack back, but to non-technical folks it sounds like hackback. Clarification is needed. * Cognitive Warfare landscape coupled with Synthetic Identities. Special Guest: Blake Butler.

    Matt Devost Interview -Disinformation Attacks Against Institutions of Trust, Turing Assessments for Datasets, Exploration of Red Teaming Innovation

    Play Episode Listen Later Apr 20, 2020 67:33


    Risk management strategies that work are hard to find in such a noisy infosec buzzword filled industry. Our guest Matt Devost, offers perspective on subjects which will be helpful for beginners, advisors or CISO's. We cover some of the following items: * AI & Turing Integrity Assessments * Risk Management strategies that work. * Historical reference points to the beginnings of the threat intelligence industry. * Similarities between an evolving TI landscape, and red teaming over the last 20 years. * Where bad threat intelligence can take you. * Insider threats are always constant. * Context and discussion on disinformation. "Here are the threat actors that likely to target you, here are the goals that they are trying to achieve, here are the attack surfaces that presented themselves, here is the outcome we could achieve, here is the mitigation strategy. Metrics and measurement matter, but strategic outcomes must be pursued. Risk management should always focus on time to detection.".... (Paraphrased from Matt Devost) Matt Devost was one of the first white hat hackers to bridge the gap between the top-secret / national security circles and the hacker world. He was one of the few to have a masters degree in political science with a focus on national security, while also having the skills to attack and defend. He has been renowned as one of the few that had a world of "first's" within the industry. Matt was one of the first pulled into the United States Presidential commission on critical infrastructure protection in the 90s. The Presidential commission had a significant focus on cyber risks associated with the United States' critical infrastructure. Something that affects most of our careers in one way or another today. Special Guest: Matt Devost.

    Covid19 Conversation and Observations

    Play Episode Listen Later Apr 14, 2020 69:47


    In our podcast, we aren’t always the experts in all of the topics at hand, but we know where to get experts and have candid conversations. Standard Disclaimer The intent is to explore information around this topic. This episode is long, and we will get a bibliography put together. In no way should the questions fan the flame of conspiracies, fear or panic. The information discussed are opinions and dialogue. Please verify the information or theories shared on your own time. The doctor Interviewed had requested to not publish his identity in this piece. We respect that and hope you will as well.

    5 - Incident Response, Long Time Investigations Need Story Telling & Innovation in Event Query Languages.

    Play Episode Listen Later Apr 13, 2020 80:38


    The hack of old Zack Payton describes his role in pushing the boundaries of incident response, threat hunting and scaling up SOC teams and MSSPs with the innovations Westward.AI is pushing. Mr. Payton spent years providing in the trench incident response, reversing, exploit development and so much more. Special mentions to the following: @insanitybit grapl project: https://github.com/insanitybit/grapl @rw_access Ross Wolf designer of EQL https://github.com/endgameinc/eql @Cyb3rWard0g Roberto Rodriguez Inventor of Mordor, HELK, and OSSEM https://github.com/hunters-forge/mordor https://github.com/hunters-forge/OSSEM https://github.com/Cyb3rWard0g/HELK @john_threat - making memory thieves Special Guest: Zack Payton.

    #04 - Cyber Cyber Bang Bang - Attacks Exploiting Risks within the Physical and Cyber Universe. Poor Security can get someone killed.

    Play Episode Listen Later Apr 6, 2020 40:45


    Truly Advanced Persistent attacks where physical exploitation and even death are rarely discussed. We cover some of this along with security within the Healthcare and Government space. Security Within Healthcare and government is always hard. Tensions between information security and the business make this harder. Hospitals hit in fall of 2019 had a taste of exploitation. Similarly, state governments have had issues with cartel related attackers. CISO's that enable assessment, and security design around systems that cannot be fully hardened can kill two birds with one stone. Weighing authority versus influence, FDA approved equipment, 0day discovery within applications. Designing security around systems is a must when unpatchable vulnerabilities exist.

    Episode 1: #03 - You offer forensics and you don't have a CSI room?

    Play Episode Listen Later Apr 2, 2020 38:42


    *A variety of topics are covered in this episode. * * Candor on the Infosec industry. * VC Trends & Startup trends. * Tools vs. Process. * Brian Dykstra, shares some of the high's and low's after doing forensics for the last 24 years. * If you don't have a CSI room while doing forensics, you are totally lame. * Hotness with getting 500g/sec on forensic image acquisition. * Evaluating Sandbox technologies in use. What is hot or not. ThreatGrid, Joe's Sandbox, or bare metal. Dan's Inbox review: * Casemanagement vs. Target centric analysis. * Alternatives to Maltego, pros/cons. Tools mentioned Kaseware, Kivutech, Datawalk, i2, etc. * Vc's falling into "Platform" trap, versus understanding data sales market.

    Claim OSINT with ShadowDragon & Digital Tools For Modern Investigations

    In order to claim this podcast we'll send an email to with a verification link. Simply click the link and you will be able to edit tags, request a refresh, and other features to take control of your podcast page!

    Claim Cancel