FourCornersOSINT
118 subscribers
3.32K photos
1.57K videos
87 files
4.22K links
Coverage in the Wild West Louis L’Amour made famous... for conversation see https://t.me/FourCornersChat this one’s all news and analysis
Download Telegram
Forwarded from Truth: Harder to Find
How to be free from the vaccacine for women.

It's just simplest to say you plan to get pregnant. Period.

Canadian goverment study on the vaccine. ⬇️⬇️⬇️

https://www.redaccionmedica.com/contenido/images/pfizer-biontech-covid-19-vaccine-pm1-en.pdf
We are witnessing “one party rule”. They could easily pass 1A and 2A restrictions or new laws. Nothing can be done at the federal level. Get organized at your state and county levels. A storm is coming and we need to learn about State Rights and Nullification. 1A and 2A sanctuaries are needed as well.

Say NO to communism.

@TwilightLastGleaming

https://justthenews.com/government/congress/harris-casts-senate-tie-breaker-paving-way-democrats-19t-covid-relief-bill
Forwarded from We The Media (IET)
Gov. Jared Polis Tells Wyoming Governor ‘Hands Off Weld County’The response comes after Gordon told KOA News radio earlier this week he supports a fringe movement planning to petition to get a ballot initiative to explore the idea of Weld County seceding from Colorado to become part of Wyoming.

https://www.msn.com/en-us/news/politics/gov-jared-polis-tells-wyoming-governor-e2-80-98hands-off-weld-county-e2-80-99/ar-BB1doD4n
Forwarded from Major Burke
Forwarded from Ice Age Farmer
FDA proposes rule requiring extensive record-keeping requirements, including electronic spreadsheets, GPS coordinates of where the foods are grown, and the location, date and time that the food is harvested, cooled, packed, shipped, or used as an ingredient in another food.

Leafy greens. Eggs. Herbs, tomatoes, seafood. These are considered high-risk and require the records.

This is both: (1) hugely expensive to implement, which will force smaller producers out of business. And (2) sets the stage for the implementation of the Blockchain/AI supply chain that WEF has already been pushing for some time.

They are laying it on thick ... and FAST.

https://www.westonaprice.org/proposed-fda-rule-threatens-small-farms-food-businesses/
We must stop the infringement on the 1st Amendment and 2nd Amendment so this won’t happen here. @TwilightLastGleaming
Forwarded from Police frequency
This media is not supported in your browser
VIEW IN TELEGRAM
National forecast. Hey look. More bitter-to-dangerous cold. And also snow. FebBRRRRRuary marches on.
The communists = democrats have eroded the nuclear family for decades. They have destroyed the notion of a two parent, heterosexual, religious or spiritual republic. They attack the sanctity of life and moral virtue. They must have obedience to the state. The government “knows” your “needs” more than you. Let that sink in. Say NO to communism. @TwilightLastGleaming
Give up your 2nd Amendment right and this is what happens. Speak up. Use your 1st Amendment rights. NOW. @TwilightLastGleaming
Forwarded from We The Media (Pepe Deluxe)
Newton County Commissioners just passed a law that endows the sheriff with the authority to arrest federal agents if they attempt to enforce any laws related to firearms that contradict the Second Amendment.
https://www.skylinenewsonline.com/bc-sheriff-quentin-miller-sets-reverse-protocol-newton-county-will-arrest-feds-that-violate-2nd-amendment/
“Nullification” is gaining traction. We must as a republic, relearn the term. It is a way to save the Republic.

@TwilightLastGleaming

https://thenewamerican.com/oklahoma-governor-nullifies-bidens-executive-order-with-his-own/
Forwarded from Police frequency
This media is not supported in your browser
VIEW IN TELEGRAM
U.S. Senate votes that former President Trump's impeachment trial is constitutional.

Six Republicans voted with the Democrats to move forward with the trial:

Mitt Romney
Bill Cassidy
Ben Sasse
Susan Collins
Lisa Murkowski
Pat Toomey

The vote was 56-44
Forwarded from Ice Age Farmer
War On Farms — suddenly your manure is classified as toxic industrial waste and must be disposed of expensively:

Environmental Protection Agency (EPA) Victoria recommendations that would see farm animal manure classified as industrial waste under changes to the state's environmental protection act.

"Farmers have been utilising animal manure as a sustainable by-product of agriculture for decades," he said

Manure from chicken and pig farms is a valuable fertiliser, especially in organic cropping systems, while deep-banding animal litter has shown huge promise in the state's south-west in lifting soil organic carbon levels.

https://www.theland.com.au/story/7121257/manure-as-industrial-waste-call-causes-farmer-dismay/
Forwarded from Fierce Awakenings
There was another big purge on social media today. Anyone who dares post FACTUAL information that doesn’t fit the mainstream narrative will be removed under the guise of sharing harmful misinformation. Except it’s not misinformation and it’s not harmful, it’s helpful. One of those purged was Robert F Kennedy Jr. RFK is huge advocate of educating the people on the dangers of vaccines. He is the president of the board of Waterkeeper Alliance, a non-profit environmental group that he helped found in 1999, and is the chairman of Children's Health Defense, an anti-vaccine advocacy group. Welcome to the United States of Communism.

@fierceawakening

https://t.me/fierceawakening
9 Must-Have OSINT Tools
Open source intelligence (OSINT) refers to intelligence that has been derived from publicly available sources. In this photostory, we cover the most popular and important OSINT tools for a security researcher. Basically, OSINT tools are used in the reconnaissance phase to gather as much information about the target as possible. These open source intelligence tools utilize artificial intelligence features to mine data from the Web about all possible matches to the desired target.

With OSINT tools, the reconnaissance process gets streamlined, enabling a more efficient narrowing-down to the target. Using open source intelligence tools drastically reduces the number of permutations and combinations to be dealt with, in respect of information gathered. This leads to an effective combination of classical social engineering attacks on the target, which in turn can be used to harvest more information. OSINT can also be used for effective target discovery and subsequent phishing attacks.

1. Maltego
Maltego is an extremely powerful OSINT framework, covering infrastructural reconnaissance and personal reconnaissance. The infrastructural component of Maltego enables the gathering of sensitive data about the target organization, email addresses of employees, confidential files which are handled carelessly, internal phone numbers, DNS records, IP address information, geo location of the network, MX servers, and so on. The gathering of such data – known in Maltego as transformations -- needs to be creatively and thoughtfully engineered in order to get the best results. Maltego’s personal reconnaissance on the other hand helps in the harvesting of person-specific information, such as social networking activity, email addresses, websites associated with the person, telephone numbers, and so on. This happens with the use of search engines on the Internet, which Maltego effectively communicates with to gather all this information.

2. Shodan
Shodan is an acronym for Sentient Hyper Optimized Data Access Network. Unlike traditional search engines that crawl the website to display results, Shodan attempts to grab data from the ports. Developed by John Matherly, Shodan is available as a free version as well as a professional, paid version. The free version provides up to 50 results, beyond which one needs to procure the paid version. Creative usage of the Shodan OSINT tool helps find the vulnerable services in a Web server, which is a very important aspect of the vulnerability assessment phase. Various filters such as country, port, operating system and host names are available with this tool.

3. Metagoofil
Metagoofil is a very powerful OSINT information gathering tool, developed by Edge Security. In essence, Metagoofil is used to extract metadata from the target. It supports various file types, including pdf, doc, xls and ppt. This open source intelligence tool can also be used to extract MAC addresses from these files, thus giving the attacker a fair idea of what kind of network hardware is being used at the target installation. In tandem with the instincts and intelligence of the attacker, Metagoofil can be used to guess type of operating system, network names, and so on. A brute force attack can then be performed, once enough information is garnered from the metadata of the files. With the metadata obtained through Metagoofil, it is possible to extract path information, which can be used to map the network. The results are displayed in HTML format.

4. GHDB
Google happens to be the most powerful OSINT tool for a user to perform attacks, and forms the basis for GHDB – the Google Hacking DataBase. Using Google, an SQL injection on a random website can be performed within 0.2 Google seconds. Specially crafted words given as input to Google are named as dorks, or googledorks. These GHDB dorks can be used to reveal vulnerable servers on the Internet, to gather sensitive data, vulnerable files that are uploaded, sub-domains, and so on. Effective usage of GHDB can make the hacking process considerably easier. Exploit DB
maintains a collection of googledorks under a section named GHDB.

5. The FOCA
The FOCA is a network infrastructure mapping tool that can be used for OSINT. It can analyze metadata from various files, including doc, pdf and ppt files. FOCA can also enumerate users, folders, emails, software used, operating system, and other useful information. Customization options are also available in this OSINT tool. For more juicy information and details about insecure methods, there is a crawl option provided. The metadata can be extracted from a single file or from multiple files. The FOCA is thus a great tool in the reconnaissance phase, to extract information from the metadata.

6. EXIF data viewers
Smartphones and digital cameras use a standard to specify formats for images and sounds that are recorded using them. This standard is called the exchangeable image file format (EXIF). Various EXIF data viewers are available. They provide details such as type of camera, focal length, type of lens, and so on. Most importantly, EXIF data viewers provide the geo location information that is stored for each image. In fact, by default, all smartphones have the GPS setting switched on. So, this can potentially leak the location where the image was taken. The accuracy is such that the latitude and longitude will be provided by the EXIF data viewer when extracting the EXIF data, thus leaking very private information.

7. Social Engineer Toolkit
Social Engineer Toolkit is an open source tool to perform online social engineering attacks. The tool can be used for various attack scenarios including spear phishing and website attack vectors. Social Engineer Toolkit works in an integrated manner with Metasploit. It enables the execution of client-side attacks and seamless harvesting of credentials. With Social Engineer Toolkit, one can backdoor an executable and send it to the victim. It can automatically create fake login pages of a given website and spawn a server to listen to returning connections.

8. Cyberstalking tools for reconnaissance
There are several websites and OSINT tools available online that can be used to find public information about a particular person. The PeekYou and Lullar websites enable gathering of information about a person that is available on various social networking sites. The Wayback Machine is a website that can be used to find previous versions of webpages, enabling one to see websites in their earlier avatars. These reconnaissance tools come in handy for cyberstalking or executing social engineering attacks. EDGAR, the electronic data gathering, analysis and retrieval system, is another website providing access to company information that might otherwise be difficult to obtain. Then there is YouGetSignal, providing OSINT tools to check for phone numbers, IP addresses, whois data, geo location, tracing, and so on.

9. Passive Recon
Mozilla Firefox has a lot of security add-ons in the form of plugins. One such powerful OSINT plugin is Passive Recon. As the name suggests, this tool does not query the domain directly. In fact it looks up all the public databases for gathering as much information as possible about the target. Passive Recon passively provides whois information, MX records, DNS information, and other useful data. Significantly, due to the passive nature of Passive Recon, the owner of the domain you are querying is not alerted.

https://www.pinow.com/articles/2238/social-media-computer-investigations
"...So yeah, we are in the John Wick phase now. We have been provoked, and we will do what we must do, just as we have always done. We are the ones equipped to think on our feet, adapt to change, and use pragmatic solutions to the problems put before us.

My suggestion to everyone else? Shut up and get out of the way. We are going to do what we have to do. We are going to fix things. You may not like how we do it, but you really do not have a choice. You are living in a Gen X world now. Learn to enjoy it."

https://www.menofthewest.net/keanu-reeves-gen-x-icon/