Added resouces best wordlist & Update WIKI

This commit is contained in:
Jieyab89
2024-08-22 01:43:34 +07:00
parent fde18b2115
commit bcab6b55e8
2 changed files with 25 additions and 2 deletions

View File

@@ -3338,6 +3338,8 @@ Wordlists for all
- [PentesterSpecialDict](https://github.com/ppbibo/PentesterSpecialDict)
- [fuzz.txt](https://github.com/Bo0oM/fuzz.txt)
- [wordlists](https://github.com/assetnote/wordlists)
- [Hashmob](https://hashmob.net/resources/hashmob)
- [RockYou2024](https://github.com/exploit-development/RockYou2024)
Web fuzz wordlists
@@ -3403,7 +3405,15 @@ Privilage Escalation Cheat and check
- [wadcoms](https://wadcoms.github.io/#+Windows) WADComs is an interactive cheat sheet, offensive security tools and their respective commands, to be used against Windows/AD environments
- [g0tmi1k linux priv esc](https://blog.g0tmi1k.com/2011/08/basic-linux-privilege-escalation/) Basic Linux Privilege Escalation
- [Windows Privilage Escalation](https://github.com/Ignitetechnologies/Windows-Privilege-Escalation?tab=readme-ov-file) Methods of escalating privilege on Windows-based machines and CTFs with examples
Hacking Playground
- [wackopicko CSLAB](https://wackopicko.csalab.app/)
- [juiceshop CSLAB](https://juiceshop.csalab.app/#/)
- [dvwa CSLAB](https://dvwa.csalab.app/)
- [hackthebox](https://www.hackthebox.com/)
- [tryhackme](https://tryhackme.com/)
# Audio OSINT
- [Audio metadata](https://github.com/tmont/audio-metadata)

View File

@@ -4,11 +4,23 @@ A fake account, but this account was created authentically with interactions, ph
# What Is The Purpose?
OSINT investigators create sock puppets so they can access content on various sites, such as social media platforms, where content is only available with an account.
Sock puppets are also created to isolate OSINT research, ensuring a separation between the personal and work lives of OSINT investigators. It is essential to emphasize the importance of separating an OSINT investigator's real identity from their research accounts, otherwise known as practicing good Operational Security (OPSEC).
Some platforms, such as Facebook, may tell a target they are being investigated through friend recommendations. Further, suppose you use your personal accounts to conduct OSINT research; you may accidentally "like" a post on your target's profile or accidentally send a friend request.
Posing the following question may help you further understand why it matters that you create sock puppets before researching targets. If you were a police officer, would you conduct surveillance using your personal vehicle? Most of you would hopefully answer "no"; you would not do that. The question to ask yourself is why you would use a personal Facebook account to research your subject. It's similar because your vehicle links to your real identity, just as your social media accounts link back to your real identity.
1. To investigate others without revealing your true identity.
2. Make the investigation authentic (HUMANINT, MASINT, other. With someone)
3. Approach and know the target in real time and in detail
4. Monitoring your target
# The Benefits of Sock Puppets
It is recommended that OSINT investigators avoid using their personal social media accounts for research purposes to uphold their privacy and security and ensure the investigation's integrity. Keeping personal and work accounts separate when conducting research is crucial for gathering information discretely and anonymously for good OPSEC.
# How To Detect?
*Pro tips you can read the https://github.com/Jieyab89/OSINT-Cheat-sheet/blob/main/wiki/Facebook%20investiagtions.md
@@ -66,4 +78,5 @@ In other cases, the catfisher lacks the self-confidence needed to express themse
Reff:
- https://www.fortinet.com/resources/cyberglossary/catfishing
- https://www.fortinet.com/resources/cyberglossary/catfishing
- https://www.sans.org/blog/what-are-sock-puppets-in-osint/