Shadow Hunting: Advanced OSINT Skills to Navigate the Breach Data Labyrinth
In a world where digital footprints can lead to unexpected revelations, understanding the nuances of breach data is key to uncovering hidden narratives. This session will delve into advanced techniques for analyzing breach data and infostealer information, offering insights that challenge the status quo of OSINT practices.
Participants will explore:
• Advanced Forum Data Hunting: Learn how to identify user clusters and community dynamics within criminal forums, leveraging features like referral links and user roles to uncover hidden connections.
• Infostealer Data Analysis: Discover how to pinpoint victims among criminal populations, using time zone data and geographic insights to enhance your investigations.
• Automating Pivot Analysis: Streamline your analysis with pivot automation techniques, demonstrating how to efficiently connect the dots across various data sources.
• Cryptocurrency Wallet Attribution: Gain skills in clustering cryptocurrency wallets based on transaction patterns, revealing potential laundering activities and connections to illicit networks.
• Metadata and Behavioral Profiling: Extract and analyze metadata from leaked files and infostealer logs to build comprehensive profiles of both threat actors and victims, identifying patterns that may indicate criminal behavior.
This session is designed for analysts seeking to enhance their investigative capabilities, providing actionable tips and advanced methodologies to improve their OSINT practice. Join us to unlock the potential of breach data and elevate your analysis to the next level.
View upcoming Summits: http://www.sans.org/u/DuS
SANS Open-Source Intelligence Summit 2025
Shadow Hunting: Advanced OSINT Skills to Navigate the Breach Data Labyrinth
Dan Mathews, Director, Worldwide Solutions Engineering, Constella Intelligence