Winn Schwartau: Facebook OSINT Module for Recon-ng

Categories: Software
Tags:
Winn Schwartau

Winn Schwartau

Title: Facebook OSINT Module for Recon-ng
Source: Kc57
Date Published: 25th April 2013

Excerpt:

‘….If you haven’t yet heard of Recon-ng I suggest you check it out. It walks you through the process of collecting recon in various forms and provides a nice framework to store, sort, and report on
everything you collect. You should definitely get this set up if you plan to follow along.

I have been working on a Recon-ng module to do some Facebook OSINT by using the Facebook Graph API to search for phone numbers. It allows you to search for a specific phone number, or brute force
through a range of numbers and grab all of the publicly available information on each associated Facebook account that matches……’

Read complete article with code graphics.

Comments Off
May 2

Journal: Weaponizing Web 2.0

Washington Post Full Story

Washington Post Full Story

By Brian Krebs

July 29, 2009; 3:15 PM ET

The Washington Post

Imagine simply visiting a Web forum and finding that doing so forced your browser to post an embarrassing Twitter message to all of your contacts, or caused you to admit a stranger to your online social network. Now consider the same dynamic being used to move money out of your online auction account or delete the contents of your e-mail inbox.

. . . . . . .

The problem with the token-based security approach, as researchers prior to Hamiel and Moyer have noted, is that it works only if the attacker doesn’t have access to that random string of data as well.

To take the Alice and Bob on the forum example a step further, consider what happens when Alice views a forum posting by Bob that includes a link to an off-site image hosted at a site controlled by Bob. That image, when loaded by Alice’s browser, will automatically send Bob’s site a referrer URL that includes the full token that is unique to Alice’s browser session with that forum. Armed with the referring URL’s token, Bob can then respond to the image request from Alice’s browser with a request to silently take action on that forum in Alice’s name.

. . . . . . .

Moyer said one way to prevent this attack is commonly used on banking Web sites involves what’s known as a nonce, which is essentially a random, one-time-use-only number that is appended to a URL each time a visitor loads a page on that site. He noted that one reason most sites don’t adopt this approach is that it requires far more computational and Web server capacity, which can drive up costs — particularly for high-traffic sites.

DefCon White Paper

DefCon White Paper

+++++++Phi Beta Iota Editorial Comment+++++++

In 1990-1991 Winn Schwartau testified to Congress.  They ignored him the way they ignored Peak Oil testimony in 1974-1975.  In 1995 Robert Steele organized three top experts, Schwartau, Jim A from NSA, and Bill Caelii, and submitted a cross-walk of crystal clear recommendations adding up to $1 billion a year to Marty Harris, responsible for the security of the National Information Infrastructure (NII).  Today the US Government is about to waste $12 billion a year helping NSA further its own agenda while ignoring the root needs of the American people for trusted electromagnetic services.  The federal government is so busy attacking other people it is neglecting the people that created the federal government as a service of common concern.  The gap between those exercising public power and those who elected them and pay them has grown cataclysmic.  Public intelligence in the public interest is one way to help the Republic heal.

Comments Off
Jul 30

2008 Earth Intelligence Network Brief to Hackers on Planet Earth (HOPE)

Tags:
EIN at HOPE

EIN at HOPE

At the recommendation of Winn Schwartau, Robert Steele was invited to open Hackers on Planet Earth (HOPE) in New York City in 1994, and has been a speaker each conference since then.  Although 2008 was billed as the last event, it may continue.  Steele also does a “SPY IMPROVE: Everything You Ever Wanted to Know But Did Not Know Who to Ask.”  Above is the “formal” briefing delivered on 18 July 2008.

Comments Off
Jul 18