FourCornersOSINT
118 subscribers
3.32K photos
1.57K videos
87 files
4.22K links
Coverage in the Wild West Louis L’Amour made famous... for conversation see https://t.me/FourCornersChat this one’s all news and analysis
Download Telegram
We must stop the infringement on the 1st Amendment and 2nd Amendment so this won’t happen here. @TwilightLastGleaming
Forwarded from Police frequency
This media is not supported in your browser
VIEW IN TELEGRAM
National forecast. Hey look. More bitter-to-dangerous cold. And also snow. FebBRRRRRuary marches on.
The communists = democrats have eroded the nuclear family for decades. They have destroyed the notion of a two parent, heterosexual, religious or spiritual republic. They attack the sanctity of life and moral virtue. They must have obedience to the state. The government “knows” your “needs” more than you. Let that sink in. Say NO to communism. @TwilightLastGleaming
Give up your 2nd Amendment right and this is what happens. Speak up. Use your 1st Amendment rights. NOW. @TwilightLastGleaming
Forwarded from We The Media (Pepe Deluxe)
Newton County Commissioners just passed a law that endows the sheriff with the authority to arrest federal agents if they attempt to enforce any laws related to firearms that contradict the Second Amendment.
https://www.skylinenewsonline.com/bc-sheriff-quentin-miller-sets-reverse-protocol-newton-county-will-arrest-feds-that-violate-2nd-amendment/
“Nullification” is gaining traction. We must as a republic, relearn the term. It is a way to save the Republic.

@TwilightLastGleaming

https://thenewamerican.com/oklahoma-governor-nullifies-bidens-executive-order-with-his-own/
Forwarded from Police frequency
This media is not supported in your browser
VIEW IN TELEGRAM
U.S. Senate votes that former President Trump's impeachment trial is constitutional.

Six Republicans voted with the Democrats to move forward with the trial:

Mitt Romney
Bill Cassidy
Ben Sasse
Susan Collins
Lisa Murkowski
Pat Toomey

The vote was 56-44
Forwarded from Ice Age Farmer
War On Farms — suddenly your manure is classified as toxic industrial waste and must be disposed of expensively:

Environmental Protection Agency (EPA) Victoria recommendations that would see farm animal manure classified as industrial waste under changes to the state's environmental protection act.

"Farmers have been utilising animal manure as a sustainable by-product of agriculture for decades," he said

Manure from chicken and pig farms is a valuable fertiliser, especially in organic cropping systems, while deep-banding animal litter has shown huge promise in the state's south-west in lifting soil organic carbon levels.

https://www.theland.com.au/story/7121257/manure-as-industrial-waste-call-causes-farmer-dismay/
Forwarded from Fierce Awakenings
There was another big purge on social media today. Anyone who dares post FACTUAL information that doesn’t fit the mainstream narrative will be removed under the guise of sharing harmful misinformation. Except it’s not misinformation and it’s not harmful, it’s helpful. One of those purged was Robert F Kennedy Jr. RFK is huge advocate of educating the people on the dangers of vaccines. He is the president of the board of Waterkeeper Alliance, a non-profit environmental group that he helped found in 1999, and is the chairman of Children's Health Defense, an anti-vaccine advocacy group. Welcome to the United States of Communism.

@fierceawakening

https://t.me/fierceawakening
9 Must-Have OSINT Tools
Open source intelligence (OSINT) refers to intelligence that has been derived from publicly available sources. In this photostory, we cover the most popular and important OSINT tools for a security researcher. Basically, OSINT tools are used in the reconnaissance phase to gather as much information about the target as possible. These open source intelligence tools utilize artificial intelligence features to mine data from the Web about all possible matches to the desired target.

With OSINT tools, the reconnaissance process gets streamlined, enabling a more efficient narrowing-down to the target. Using open source intelligence tools drastically reduces the number of permutations and combinations to be dealt with, in respect of information gathered. This leads to an effective combination of classical social engineering attacks on the target, which in turn can be used to harvest more information. OSINT can also be used for effective target discovery and subsequent phishing attacks.

1. Maltego
Maltego is an extremely powerful OSINT framework, covering infrastructural reconnaissance and personal reconnaissance. The infrastructural component of Maltego enables the gathering of sensitive data about the target organization, email addresses of employees, confidential files which are handled carelessly, internal phone numbers, DNS records, IP address information, geo location of the network, MX servers, and so on. The gathering of such data – known in Maltego as transformations -- needs to be creatively and thoughtfully engineered in order to get the best results. Maltego’s personal reconnaissance on the other hand helps in the harvesting of person-specific information, such as social networking activity, email addresses, websites associated with the person, telephone numbers, and so on. This happens with the use of search engines on the Internet, which Maltego effectively communicates with to gather all this information.

2. Shodan
Shodan is an acronym for Sentient Hyper Optimized Data Access Network. Unlike traditional search engines that crawl the website to display results, Shodan attempts to grab data from the ports. Developed by John Matherly, Shodan is available as a free version as well as a professional, paid version. The free version provides up to 50 results, beyond which one needs to procure the paid version. Creative usage of the Shodan OSINT tool helps find the vulnerable services in a Web server, which is a very important aspect of the vulnerability assessment phase. Various filters such as country, port, operating system and host names are available with this tool.

3. Metagoofil
Metagoofil is a very powerful OSINT information gathering tool, developed by Edge Security. In essence, Metagoofil is used to extract metadata from the target. It supports various file types, including pdf, doc, xls and ppt. This open source intelligence tool can also be used to extract MAC addresses from these files, thus giving the attacker a fair idea of what kind of network hardware is being used at the target installation. In tandem with the instincts and intelligence of the attacker, Metagoofil can be used to guess type of operating system, network names, and so on. A brute force attack can then be performed, once enough information is garnered from the metadata of the files. With the metadata obtained through Metagoofil, it is possible to extract path information, which can be used to map the network. The results are displayed in HTML format.

4. GHDB
Google happens to be the most powerful OSINT tool for a user to perform attacks, and forms the basis for GHDB – the Google Hacking DataBase. Using Google, an SQL injection on a random website can be performed within 0.2 Google seconds. Specially crafted words given as input to Google are named as dorks, or googledorks. These GHDB dorks can be used to reveal vulnerable servers on the Internet, to gather sensitive data, vulnerable files that are uploaded, sub-domains, and so on. Effective usage of GHDB can make the hacking process considerably easier. Exploit DB
maintains a collection of googledorks under a section named GHDB.

5. The FOCA
The FOCA is a network infrastructure mapping tool that can be used for OSINT. It can analyze metadata from various files, including doc, pdf and ppt files. FOCA can also enumerate users, folders, emails, software used, operating system, and other useful information. Customization options are also available in this OSINT tool. For more juicy information and details about insecure methods, there is a crawl option provided. The metadata can be extracted from a single file or from multiple files. The FOCA is thus a great tool in the reconnaissance phase, to extract information from the metadata.

6. EXIF data viewers
Smartphones and digital cameras use a standard to specify formats for images and sounds that are recorded using them. This standard is called the exchangeable image file format (EXIF). Various EXIF data viewers are available. They provide details such as type of camera, focal length, type of lens, and so on. Most importantly, EXIF data viewers provide the geo location information that is stored for each image. In fact, by default, all smartphones have the GPS setting switched on. So, this can potentially leak the location where the image was taken. The accuracy is such that the latitude and longitude will be provided by the EXIF data viewer when extracting the EXIF data, thus leaking very private information.

7. Social Engineer Toolkit
Social Engineer Toolkit is an open source tool to perform online social engineering attacks. The tool can be used for various attack scenarios including spear phishing and website attack vectors. Social Engineer Toolkit works in an integrated manner with Metasploit. It enables the execution of client-side attacks and seamless harvesting of credentials. With Social Engineer Toolkit, one can backdoor an executable and send it to the victim. It can automatically create fake login pages of a given website and spawn a server to listen to returning connections.

8. Cyberstalking tools for reconnaissance
There are several websites and OSINT tools available online that can be used to find public information about a particular person. The PeekYou and Lullar websites enable gathering of information about a person that is available on various social networking sites. The Wayback Machine is a website that can be used to find previous versions of webpages, enabling one to see websites in their earlier avatars. These reconnaissance tools come in handy for cyberstalking or executing social engineering attacks. EDGAR, the electronic data gathering, analysis and retrieval system, is another website providing access to company information that might otherwise be difficult to obtain. Then there is YouGetSignal, providing OSINT tools to check for phone numbers, IP addresses, whois data, geo location, tracing, and so on.

9. Passive Recon
Mozilla Firefox has a lot of security add-ons in the form of plugins. One such powerful OSINT plugin is Passive Recon. As the name suggests, this tool does not query the domain directly. In fact it looks up all the public databases for gathering as much information as possible about the target. Passive Recon passively provides whois information, MX records, DNS information, and other useful data. Significantly, due to the passive nature of Passive Recon, the owner of the domain you are querying is not alerted.

https://www.pinow.com/articles/2238/social-media-computer-investigations
"...So yeah, we are in the John Wick phase now. We have been provoked, and we will do what we must do, just as we have always done. We are the ones equipped to think on our feet, adapt to change, and use pragmatic solutions to the problems put before us.

My suggestion to everyone else? Shut up and get out of the way. We are going to do what we have to do. We are going to fix things. You may not like how we do it, but you really do not have a choice. You are living in a Gen X world now. Learn to enjoy it."

https://www.menofthewest.net/keanu-reeves-gen-x-icon/
Forwarded from Free State Colorado
Conservative grassroots organizer challenges Colorado Republicans

Republicans across the country are doing some hard thinking about the future of their party after four years of Donald Trump’s presidency came to an end, but not before a violent attempted takeover of the United States Capitol on Jan. 6. In El Paso County, which had one of the biggest voter shifts in the state away from Trump when comparing the 2016 and 2020 elections, longtime Republicans are now dealing with an attempt by political activist group FEC United to commandeer the party.

The divisions within the local GOP — between the relatively moderate voices of career Republicans and those willing to embrace the angry far-right — have come to a head in recent weeks. Many party members, some of whom were hesitant to speak on the record, are concerned about the growing influence of Douglas County-based FEC United, and its controversial founder Joe Oltmann, on local politics. Since its inception, FEC United (the FEC stands for faith, education and commerce, the three pillars of the group’s focus) has used doxxing and intimidation tactics in an effort to silence critics and secure political power and influence in Colorado.

On Jan. 24, FEC United’s Facebook page shared a call for members to report to the El Paso County GOP’s headquarters to fill precinct leader positions, an unusual move that sparked rebuke from El Paso County Vice Chair Wendy Miller, according to emails obtained by the Indy, which were sent to GOP Chairwoman Vickie Tonkins. Tonkins was re-elected as chairwoman during the Feb. 6 El Paso County Republican Central Committee Meeting.

“It is completely illegal for you to send a message that the El PASO GOP is part of the FEC group as well as using resources to violate our By-Laws,” wrote Miller to Tonkins. “While I appreciate you trying to get volunteers to sign up, your approach in reaching [out] to [an] outside group like FEC using party resources to control the outcome of an upcoming election is illegal and a misuse of county resources! This is not an equal playing field for the other candidates that are competing.”

The concerns over Tonkins’ actions with FEC United are just the latest in a series of problems that have plagued her term as chairwoman. “There is a huge disconnect in the El Paso County GOP between Vickie Tonkins and the mainstream, true conservative GOP members, and it’s tearing the party apart,” says Curtis Sehon, a 40-year Republican who recently changed his party affiliation over his disgust with how politics often attributed to Trump have impacted the party. “Considering how terrible the Republican Party has acted recently, you could almost say ‘Well, that’s a good thing,’ but it’s not. We need parties on both sides. We need a right and we need a left and we need a center that can work together for the American people. If you eliminate the right, which they’re doing by suicide, then you’re only going to have a left, and that’s not necessarily a good thing either.”

https://www.csindy.com/news/conservative-grassroots-organizer-challenges-colorado-republicans/article_34f8b222-6b32-11eb-bd0b-033db6f0aee6.html
All of this is meant as a primer in #4GW for 21st century Mountain Warfare.

See https://t.me/rockymountain_intel/2929

See https://t.me/rockymountain_intel/2911 for low cost thermal test

See https://t.me/rockymountain_intel/2905 for global guerrilla analysis

See https://t.me/rockymountain_intel/2904 for suicide drone UAVs used in Armenia

See https://t.me/rockymountain_intel/2898 for the most cost effective and probable counter to the 2A armed and ready patriot movement in mountainous areas...

Follow comments at https://t.me/rockymountain_intel/2898 for recommendations for local Rocky Mountain groups to implement into their planning for #CW2 which seems like it is going to occur...

@RockyMTN_Intel_Chat
@FuryRoad_Intel
Forwarded from Truth: Harder to Find
Was This Launch Platform the Source of Colorado’s Drone Swarm in 2019?

Video footage shows that the unmanned aircraft are very similar in form and function to more recent models of China Poly Defense’s CH-901 loitering munition.

In 2020, it seems like the design has evolved and replaced the v-tail with another set of pop-out wings and folding twin-tail arrangement, similar to the drones we see in the CAEIT test video.

CAEIT’s test also involved at least one drone launched from a tube mounted on a Bell 206L helicopter, as well as one that popped out of a tube dropped from a what appears to be a Robinson R-series helicopter.

If we are in a conflict with China, expect to see trucks like this - definitely a better thing to take them out on the way to their AO than deal with the drones (as Armenia found out with Turkish killer drones) once they’re launched...
See https://thedeaddistrict.blogspot.com/2020/10/loitering-uav-swarm-from-china.html
Keep Your Head in the Game... @exposingthelies
Forwarded from Griffin 777
Everyone in the Rocky Mountains... typically the American Swiss Alps typographically — needs to have a plan to counter the Armenian issue earlier this year with hunter-killer drones which would be used rather than ground-based infantry. #CW2 #4GW
Forwarded from Griffin 777
A few theories... mostly about defeating the sensors used to target... and getting hold of the drone operators wherever they may be.