For those who do #ThreatIntel; could you please read this thread and share with me your thoughts?
1. Client signs up for a service 2. Client after a while sends email requesting their email to be deleted from our systems to limit online exposure 3. Client gets email deleted
1/3
After a month+ 1. Clients signs up for service again using different email 2. After a while, client sends an email requesting account deletion claiming they're limiting their online exposure
Question after this scenario: what is the real benefit they gain from this? #OSINT
2/3
You might be asking how I noticed this? The answer is they used the exact same email! It was very clear to me that I've seen this before & a quick search revealed that my brain was still functioning! 😊
I would appreciate anyone educating me with ideas! #ThreatIntel#OSINT
3/3
This could be a new way of phishing or something!
I honestly don't know and haven't seen it until recently.
• • •
Missing some Tweet in this thread? You can try to
force a refresh
For everyone who responded to this #DFIR question below. I gathered all your feedback and put it into a repository which can be found below. I'll continue to update with everything related. #DigitalForensics#AntiForensics
I will add what we already cover in our anti-forensics course already
JFYI, if you check my past publications, you'll notice I've covered so many of what have been mentioned here back in 2015/2016 ... but I want to see if I'm missing anything new and it turned out YES, there is one/two that I did now know. Thank you all for sharing, appreciate it.
Uploaded all my Offensive Security & Reverse Engineering (OSRE) course labs (docx) to my repo found below. Most of them have very detailed instructions and should be great to get you started in Software Exploitation. 1/n #Offsec#SoftwareExploitation#RE
The only labs I did not upload, were the RE labs, because most of them were from online CrackMe(s) and from @OphirHarpaz online #RE workshop found below. 2/n
There is also probably one executable that I need to find the source for it, before I add it to the repo and also once I have time maybe I'll organize it to look better!
I don't think I'll be teaching this anymore and hope they will be useful to someone out there. 3/n
During my last #DFIR training for 2022; I did many new video recording. Some have already been added to the #CCDFA course, while others will be added very soon. The course "currently" has 55+ hands-on labs, 50+ videos, and over 40 Q&As.
Why am I saying this? 1/3
Because @cyber5w and @hexordia are both running a 30% discount on all #DFIR courses and training which ends tomorrow! Therefore, I highly recommend you take advantage of this discount and register for the #CCDFA course. 2/3 academy.cyber5w.com/courses/ccdfa-…
Check the syllabus below & you'll be surprised with what is covered in each section. Also, this is the only #DFIR course that we currently have that covers disks, volumes, and file system forensics (FAT+NTFS) #EOM