FourCornersOSINT
118 subscribers
3.32K photos
1.57K videos
87 files
4.22K links
Coverage in the Wild West Louis L’Amour made famous... for conversation see https://t.me/FourCornersChat this one’s all news and analysis
Download Telegram
U.S. House Resolution 91 has passed (230-199). Marjorie Taylor Greene (R-GA) has been removed from her committee assignments.

11 House Republicans vote to strip Marjorie Taylor Greene of her committee assignments:

Carlos Gimenez
Mark Jacobs
John Katko
Young Kim
Adam Kinzinger
Nicole Malliotakis
Maria Elvira Salazar
Mario Diaz-Balart
Chris Smith
Fred Upton
Brian Fitzpatrick

They'll keep Eric Swalwell and Diane Feinstein who both had Chinese nationals stealing secrets from them...but cancel Majorie Taylor Greene. Think about that.
We must relearn the term “nullification”. This will be our safeguard against federal tyranny. They are coming for our 1st and 2nd Amendments. We cannot let them succeed. @TwilightLastGleaming
Forwarded from Truth: Harder to Find
How to be free from the vaccacine for women.

It's just simplest to say you plan to get pregnant. Period.

Canadian goverment study on the vaccine. ⬇️⬇️⬇️

https://www.redaccionmedica.com/contenido/images/pfizer-biontech-covid-19-vaccine-pm1-en.pdf
We are witnessing “one party rule”. They could easily pass 1A and 2A restrictions or new laws. Nothing can be done at the federal level. Get organized at your state and county levels. A storm is coming and we need to learn about State Rights and Nullification. 1A and 2A sanctuaries are needed as well.

Say NO to communism.

@TwilightLastGleaming

https://justthenews.com/government/congress/harris-casts-senate-tie-breaker-paving-way-democrats-19t-covid-relief-bill
Forwarded from We The Media (IET)
Gov. Jared Polis Tells Wyoming Governor ‘Hands Off Weld County’The response comes after Gordon told KOA News radio earlier this week he supports a fringe movement planning to petition to get a ballot initiative to explore the idea of Weld County seceding from Colorado to become part of Wyoming.

https://www.msn.com/en-us/news/politics/gov-jared-polis-tells-wyoming-governor-e2-80-98hands-off-weld-county-e2-80-99/ar-BB1doD4n
Forwarded from Major Burke
Forwarded from Ice Age Farmer
FDA proposes rule requiring extensive record-keeping requirements, including electronic spreadsheets, GPS coordinates of where the foods are grown, and the location, date and time that the food is harvested, cooled, packed, shipped, or used as an ingredient in another food.

Leafy greens. Eggs. Herbs, tomatoes, seafood. These are considered high-risk and require the records.

This is both: (1) hugely expensive to implement, which will force smaller producers out of business. And (2) sets the stage for the implementation of the Blockchain/AI supply chain that WEF has already been pushing for some time.

They are laying it on thick ... and FAST.

https://www.westonaprice.org/proposed-fda-rule-threatens-small-farms-food-businesses/
We must stop the infringement on the 1st Amendment and 2nd Amendment so this won’t happen here. @TwilightLastGleaming
Forwarded from Police frequency
This media is not supported in your browser
VIEW IN TELEGRAM
National forecast. Hey look. More bitter-to-dangerous cold. And also snow. FebBRRRRRuary marches on.
The communists = democrats have eroded the nuclear family for decades. They have destroyed the notion of a two parent, heterosexual, religious or spiritual republic. They attack the sanctity of life and moral virtue. They must have obedience to the state. The government “knows” your “needs” more than you. Let that sink in. Say NO to communism. @TwilightLastGleaming
Give up your 2nd Amendment right and this is what happens. Speak up. Use your 1st Amendment rights. NOW. @TwilightLastGleaming
Forwarded from We The Media (Pepe Deluxe)
Newton County Commissioners just passed a law that endows the sheriff with the authority to arrest federal agents if they attempt to enforce any laws related to firearms that contradict the Second Amendment.
https://www.skylinenewsonline.com/bc-sheriff-quentin-miller-sets-reverse-protocol-newton-county-will-arrest-feds-that-violate-2nd-amendment/
“Nullification” is gaining traction. We must as a republic, relearn the term. It is a way to save the Republic.

@TwilightLastGleaming

https://thenewamerican.com/oklahoma-governor-nullifies-bidens-executive-order-with-his-own/
Forwarded from Police frequency
This media is not supported in your browser
VIEW IN TELEGRAM
U.S. Senate votes that former President Trump's impeachment trial is constitutional.

Six Republicans voted with the Democrats to move forward with the trial:

Mitt Romney
Bill Cassidy
Ben Sasse
Susan Collins
Lisa Murkowski
Pat Toomey

The vote was 56-44
Forwarded from Ice Age Farmer
War On Farms — suddenly your manure is classified as toxic industrial waste and must be disposed of expensively:

Environmental Protection Agency (EPA) Victoria recommendations that would see farm animal manure classified as industrial waste under changes to the state's environmental protection act.

"Farmers have been utilising animal manure as a sustainable by-product of agriculture for decades," he said

Manure from chicken and pig farms is a valuable fertiliser, especially in organic cropping systems, while deep-banding animal litter has shown huge promise in the state's south-west in lifting soil organic carbon levels.

https://www.theland.com.au/story/7121257/manure-as-industrial-waste-call-causes-farmer-dismay/
Forwarded from Fierce Awakenings
There was another big purge on social media today. Anyone who dares post FACTUAL information that doesn’t fit the mainstream narrative will be removed under the guise of sharing harmful misinformation. Except it’s not misinformation and it’s not harmful, it’s helpful. One of those purged was Robert F Kennedy Jr. RFK is huge advocate of educating the people on the dangers of vaccines. He is the president of the board of Waterkeeper Alliance, a non-profit environmental group that he helped found in 1999, and is the chairman of Children's Health Defense, an anti-vaccine advocacy group. Welcome to the United States of Communism.

@fierceawakening

https://t.me/fierceawakening
9 Must-Have OSINT Tools
Open source intelligence (OSINT) refers to intelligence that has been derived from publicly available sources. In this photostory, we cover the most popular and important OSINT tools for a security researcher. Basically, OSINT tools are used in the reconnaissance phase to gather as much information about the target as possible. These open source intelligence tools utilize artificial intelligence features to mine data from the Web about all possible matches to the desired target.

With OSINT tools, the reconnaissance process gets streamlined, enabling a more efficient narrowing-down to the target. Using open source intelligence tools drastically reduces the number of permutations and combinations to be dealt with, in respect of information gathered. This leads to an effective combination of classical social engineering attacks on the target, which in turn can be used to harvest more information. OSINT can also be used for effective target discovery and subsequent phishing attacks.

1. Maltego
Maltego is an extremely powerful OSINT framework, covering infrastructural reconnaissance and personal reconnaissance. The infrastructural component of Maltego enables the gathering of sensitive data about the target organization, email addresses of employees, confidential files which are handled carelessly, internal phone numbers, DNS records, IP address information, geo location of the network, MX servers, and so on. The gathering of such data – known in Maltego as transformations -- needs to be creatively and thoughtfully engineered in order to get the best results. Maltego’s personal reconnaissance on the other hand helps in the harvesting of person-specific information, such as social networking activity, email addresses, websites associated with the person, telephone numbers, and so on. This happens with the use of search engines on the Internet, which Maltego effectively communicates with to gather all this information.

2. Shodan
Shodan is an acronym for Sentient Hyper Optimized Data Access Network. Unlike traditional search engines that crawl the website to display results, Shodan attempts to grab data from the ports. Developed by John Matherly, Shodan is available as a free version as well as a professional, paid version. The free version provides up to 50 results, beyond which one needs to procure the paid version. Creative usage of the Shodan OSINT tool helps find the vulnerable services in a Web server, which is a very important aspect of the vulnerability assessment phase. Various filters such as country, port, operating system and host names are available with this tool.

3. Metagoofil
Metagoofil is a very powerful OSINT information gathering tool, developed by Edge Security. In essence, Metagoofil is used to extract metadata from the target. It supports various file types, including pdf, doc, xls and ppt. This open source intelligence tool can also be used to extract MAC addresses from these files, thus giving the attacker a fair idea of what kind of network hardware is being used at the target installation. In tandem with the instincts and intelligence of the attacker, Metagoofil can be used to guess type of operating system, network names, and so on. A brute force attack can then be performed, once enough information is garnered from the metadata of the files. With the metadata obtained through Metagoofil, it is possible to extract path information, which can be used to map the network. The results are displayed in HTML format.

4. GHDB
Google happens to be the most powerful OSINT tool for a user to perform attacks, and forms the basis for GHDB – the Google Hacking DataBase. Using Google, an SQL injection on a random website can be performed within 0.2 Google seconds. Specially crafted words given as input to Google are named as dorks, or googledorks. These GHDB dorks can be used to reveal vulnerable servers on the Internet, to gather sensitive data, vulnerable files that are uploaded, sub-domains, and so on. Effective usage of GHDB can make the hacking process considerably easier. Exploit DB