Posts

How to extract Telegram correspondence from a phone in airplane mode?

Image
Colleagues here had an interesting question about how to upload correspondence in a private Telegram chat from a smartphone seized by the police… I answer with pleasure. Since the smartphone is almost certainly unlocked and in airplane mode, there are only two ways to safely retrieve correspondence from it. 1️⃣ Use of forensic software (UFED, MK, Avilla, etc.). Various files (documents, audio, video, photos) that were sent via Telegram can also be found manually on the device itself. They are located at storage/emulated/0/Android/data/org.telegram.messenger/files/Telegram 2️⃣ Alternative extraction . Smartphones running the Android and iOS operating systems do not allow you to backup correspondence. Finding the device offline allows us to retrieve the correspondence in the form of only: šŸ…°️ Screenshots . You can then recognize text in screenshots using: https://image-to-text-ocr.netlify.app/ https://yandex.by/images/search https://lens.google.com/search šŸ…±️ A text document created on

The “Comrade Major” neural network has appeared in Russia to determine the owners of Telegram channels.

Image
In Russia, they created the “ Comrade Major ” neural network, which is capable of identifying the owners of anonymous Telegram channels. This was reported by Izvestia with reference to the press service of the National Technology Initiative (NTI). Artificial intelligence checks the channel description, information in messages and built-in chats. The software is currently being tested at the development company T.Hunter. The process also includes collecting data about administrators from the channel description, its archived copies, posts, as well as obtaining metadata of published files. The neural network can find the necessary information in message captions, built-in chat, sticker packs, documents and videos uploaded to the channel. In addition, AI analyzes data leaks and matches them with the user’s name or photo. Igor S. Bederov

Identification of web resource owners

Image
A WEBSITE (or simply a site) is a collection of web pages and related resources that are accessible via the Internet. Each web page within a site has a unique URL (Uniform Resource Locator) that allows users to easily find and access a specific page. Web pages are usually linked together by hyperlinks to enable navigation throughout the site. Websites can be static or dynamic. A static site consists of pre-built web pages that remain the same for all users. A dynamic website is built on templates and a database, which allows you to generate unique content and interact with users. WHO IS THE OWNER OF THE SITE? The site owner is the person or organization that owns the domain name and/or hosting. Depending on his status, he can be an individual or a legal entity. A website administrator is usually the name of the person or group of people responsible for managing and maintaining the site. It can perform tasks such as hosting management, installing and updating software, backing up data,

15+ best and free computer forensic tools

Image
In this article, I decided to collect programs that will help you in conducting investigations and will be free at the same time. NirSoft Utility’s Our list opens with a site that presents a selection of several hundred different free utilities for a forensic specialist. Everything is here, from Windows password recovery to network tools. Most of the tools do not require installation and work without leaving any traces. Everyone can find here something that will help him in a particular situation. Link: https://www.nirsoft.net/ BULK_EXTRACTOR A great tool that allows you to scan disk images, files, file directories, etc.) and extract structured information from them, such as email addresses, phone numbers, credit card numbers, GPS coordinates, fragments of JPEG and JSON files without parsing or file system structures. Link: https://github.com/simsong/bulk_extractor SHERLOQ A whole set of useful tools for the examination of electronic images in one bottle. The service applies the latest

OSINT by nickname…

Image
OSINT by nickname is the process of collecting and analyzing information about a nickname on the Internet. Thanks to this collection method, we can build a chain of all mentions on the Internet, be it social networks or websites. WhatsMyName — a simple, fast and reliable service. Presented as an online service and open source software . Checks the presence of a nickname (strict compliance only) on 600 web resources. Also displays results from Google’s main search results and document searches. It does not provide additional types of search. Maigret is a more advanced service. Presented in the form of a Telegram bot and open source software . Checks the presence of a nickname (strict compliance only) on 3000 web resources. Allows you to upload an extended report on the inspection performed, including additional data on identified profiles. It does not provide additional types of search. mailcat is a service designed to search for the use of a nickname as part of an electronic address

Military intelligence using OSINT methods

Image
As practice shows, modern armed conflicts require new approaches to organizing the collection and analysis of open data, which we operate within the framework of OSINT. In this article, we will look at various tools that can be used in the context of frontline reconnaissance and the collection of information about what is happening in the war zone from open sources. DISCLAIMER : This article is for informational purposes only and is not intended to be a guide to misconduct or educational material for covering up wrongdoing. To begin with, let’s define the very concept of front-line intelligence. Its main goals are to obtain information about the deployment and movements of enemy formations, their weapons and equipment, personnel, combat missions and held settlements. And in the conditions of modern conflicts, a significant part of this information can be obtained by organizing constant monitoring of the Internet. So, let’s figure out what categories of data will fall into our condition

Top of my free OSINT tools in 2023

Image
In this article, we will look at the tools that are used every day in my work related to the investigation of crimes. Last year was tough but interesting. Some developments stopped working in Russia. Many, on the contrary, were created in our country. Including with my participation. So let’s go! Datashare and Pinpoint Datashare Pinpoint Datashare and Pinpoint are for eDiscovery… The term is unfamiliar for Russia, so I’ll explain it. eDiscovery is the process of identifying, collecting, validating, and analyzing digital evidence. If it is quite simple — the electronic material of the investigation. Compare, 10 volumes of a criminal case or a link to a similar case that can be shared online with external users, and it also has the ability to end-to-end analytics and search through materials. In other words, a must have for the execution of investigations. Archivarius 3000 and DtSearch Archivarius 3000 DtSearch Archivarius 3000 and DtSearch are designed to work with arrays of textual