background preloader

Maltego

Maltego

https://www.paterva.com/web7/

Related:  Digital Forensic

Comparison of i2 Analyst's Notebook from IBM to Sentinel Visualizer Alternative from FMS Background Whether you're in the intelligence, defense, counter-terrorism, drug interdiction, law enforcement, research, or other data intensive environments, Sentinel Visualizer will amaze you with its next generation data analysis and visualization features. In fact, it is so impressive that In-Q-Tel, the CIA's venture capital arm, is an investor in FMS and strong supporter of our efforts to bring leading edge technology into their mission. Analyst's Notebook from i2 and IBM has dominated the data analyst market for years. While the technology was leading edge when it was introduced in the early 1990's, it's fallen behind technologically and fails to meet the demanding needs of today's analyst. To clear any confusion, this page summarizes the significant advantages of Sentinel Visualizer over Analyst Notebook.

Maltego 3: First Look Tutorial by Wardell Motley Maltego, developed by Roelof Temmingh, Andrew Macpherson and their team over at Paterva, is a premier information gathering tool that allows you to visualize and understand common trust relationships between entities of your choosing. Currently Maltego 3 is available for Windows and Linux. There is also an upcoming version for Apple users that has yet to be released. Basic Use Of Maltego For Network Intelligence Gathering Description: This is a screen-cast demonstration of the basic uses of Maltego, a powerful program used in network and open source intelligence gathering, by Rick Gurley of Risk Management Research & Investments, Inc. - a licensed private investigation agency in Columbia, Missouri. With the continued growth of your organization, the people and hardware deployed to ensure that it remains in working order is essential, yet the threat picture of your “environment” is not always clear or complete. In fact, most often it’s not what we know that is harmful - it’s what we don’t know that causes the most damage.

Online Penetration Testing Tools About this tool Every penetration test should start with a passive reconnaissance phase. Since public search engines have gathered huge amounts of information about almost every website from the Internet, it is a good idea to make some queries and get this information from them. I Need A Relationship Mapping Tool I was asking for better ways to track PC/NPC relationships in my game on RPG Stack Exchange and Brian brought up the free game Minimus, which is basically an example of social network mapping for an RPG. This reminded me of the person-to-person tracking diagrams I’ve seen in books on intelligence work, it’s a common HUMINT technique. But then I started looking for good tools to do it and started coming up short.. There’s super complicated open source BS like graphviz – not something I want to deal with as part of my hobby.

www.securityg33k.com/blog/ 44Con Trip report Last week I attended the UK security conference, 44Con. I went into 44Con feeling a little jaded with the overall security community, but left with a real spring in my step. There are many very approachable and knowledgeable people doing some amazing work. It’s easy to forget if you focus on the minority of the community who bring arrogance and elitism to the table in large amounts. theharvester - Information Gathering The objective of this program is to gather emails, subdomains, hosts, employee names, open ports and banners from different public sources like search engines, PGP key servers and SHODAN computer database. This tool is intended to help Penetration testers in the early stages of the penetration test in order to understand the customer footprint on the Internet. It is also useful for anyone that wants to know what an attacker can see about their organization.

Top 10 Best Free Keylogger Software to Monitor Keystrokes in Windows A keylogger can be either a piece of software or a small hardware device that is used to capture the keystrokes that are typed on the keyboard. The hardware based keylogger can be easily detected because the physical device needs to be connected in between the keyboard and the USB/PS2 port. However, as for a software keylogger, it can be run while being completely invisible and not get noticed by average computer users. Free Resources for Law Enforcement These are the most recent notes for my "Free Stuff" presentation. This most recent presentation was from the IACA conference in September 2013. I hope that everyone who came to my presentation can save more than was spent on their conference tuition and expenses.

Related:  mikey92