×

Lorem Ipsum is simply dummy text of the printing and typesetting industry.

Some great Tools for VENDORS to protect yourself and to check your OpSec

TyperTech

Regular Member
Joined
Feb 26, 2024
Posts
44
Reaction score
0
Status
Offline
Last Seen
TinEye: Reverse image search
https://tineye.com/⚠️

WHAT IT IS
TinEye is an image-focused web crawling database that allows users to search by image and find where that image appears online.

USE CASE
You can uploads an image to TinEye or searches by URL. TinEye constantly crawls the web and adds images to its extensive index to search where your images are using or posted/appears online


Wayback Machine: Explore billions of webpages
https://web.archive.org/⚠️

WHAT IT IS
Wayback Machine analyzes websites published across time, allowing researchers to review how the webpage looked when it was originally launched or updated, revealing data that may no longer be visible or searchable through regular search engines.

USE CASE
Suppose a website was seized by the FBI, but the original content is no longer there. You can use Wayback Machine to reveal information that the site may have contained prior to the raid.


CipherTrace: Follow the money
https://ciphertrace.com/ciphertrace-maltego-transform/⚠️

WHAT IT IS
Maltego CipherTrace is a popular security research and forensics tool that uses the Bitcoin blockchain to track funds. CipherTrace uses identifiers for criminal, mixer, dark market, gambling, ATM and exchange activities. It comes in the form of a Maltego Transform.

USE CASE
Create directed graphs to track an asset's final destination, even when a Bitcoin mixer attempts to launder the funds.
It will help you to cover your tracks for laundering and you can check your bitcoin transaction as well to keep your self alert.


ThreatMiner: IOC lookup and contextualization
https://www.threatminer.org/⚠️

WHAT IT IS
ThreatMiner is a threat intelligence portal designed to enable an analyst to research indicators of compromise (IOCs) under a single interface. That interface allows for not only looking up IOCs but also providing the analyst with contextual information. With this context, the IOC is not just a data point but a useful piece of information and potentially intelligence.

USE CASE
Identify and enrich indicators of compromise to have a better understanding of attack origins.


VirusTotal: Analyze suspicious files and URLs
https://www.virustotal.com/gui/⚠️

WHAT IT IS
VirusTotal inspects items with over 70 antivirus scanners and URL/domain blacklisting services. Scanning reports produced by VirusTotal are shared with the public to raise the global IT security level and awareness about potentially harmful content.

USE CASE
Users can select a file from their computer using their browser and send it to VirusTotal. Results are shared with the submitter, and also between the examining partners, who use this data to improve their own systems.
This very important for vendors, always check any file or link you received by others if they malicious or not otherwise you will be easy target of LE.


To be continued......

❉⊱•═•⊰❉⊱•═•⊰❉⊱•═•⊰❉❉⊱•═•⊰❉⊱•═•⊰❉⊱•═•⊰❉
 
Top