Posted on

DEF CON 31 Breaking: AI Cyber Challenge Announced for DEF CON 32 & 33

From: DEF CON® Hacking Conference Home

DEF CON will host the Artificial Intelligence Cyber Challenge #AIxCC semis in 2024 and the final in 2025! @DARPA, @openssf ,@Google, @AnthropicAI @Microsoft & @OpenAI are working together to challenge contestants to create novel AI cybersecurity systems.

Over $18m in cumulative prizes, access to cutting-edge tech, and a chance to help secure the open infrastructure we all rely on.

Full details at aicyberchallenge.com

Posted on

Digital Shadows: Navigating the Online Maze in Investigative Research

In the dynamic landscape of journalism, investigative research involves employing Open Source Intelligence (OSINT) and Geospatial Intelligence (GEOINT) to uncover information and verify facts. The pursuit of truth can often lead journalists to highly sensitive or controversial territories. Therefore, maintaining Operational Security (OPSEC) and minimizing one’s internet footprint becomes paramount. This article serves as a guide to keeping digital tracks concealed while conducting online research.

Understanding the Risk

Investigative journalists often navigate the tangled web of public and private information. Accessing data from various sources can lead to ethical dilemmas and legal challenges. It can also expose the investigator to potential threats and unwanted scrutiny. A strong OPSEC strategy mitigates these risks by ensuring that digital trails are concealed, protecting both the investigation and the investigator.

Essential Steps to Minimize Internet Footprint

  1. Use a Virtual Private Network (VPN): Connecting to a VPN hides the user’s IP address, making their online actions virtually untraceable. It ensures anonymity and security by establishing an encrypted connection.
  2. Utilize Secure Browsers: Specialized browsers like Tor help in maintaining anonymity by routing online activity through multiple servers. Regular browsers can be set to private or incognito mode to prevent saving browsing history, though this alone is not enough for complete privacy.
  3. Access Information Through Secure Channels: Utilizing HTTPS ensures that the data between the user’s browser and the website is encrypted. Tools like HTTPS Everywhere can be useful in this regard.
  4. Minimize the Use of Personal Accounts: Avoid logging into personal accounts while conducting research to prevent linking the investigation to the individual. Dedicated research accounts, where needed, should be employed.
  5. Employing Virtual Machines and Disposable Operating Systems: These can be used to isolate the research environment from the personal workspace, leaving no traces once the virtual instance is deleted.
  6. Avoid Geolocation Features: Disabling geolocation services on devices and browsers prevents leaking location data.
  7. Careful Handling of Metadata: Documents, pictures, and other files can contain hidden metadata that reveals information about the author, location, or device. Tools to scrub metadata should be used when handling such files.
  8. Regular Monitoring and Evaluation of Digital Footprint: Regularly auditing and monitoring the digital footprint helps in identifying unexpected traces or exposures

Investigative journalism is a delicate dance between unearthing truths and maintaining security. By embracing the best practices in OPSEC, journalists can minimize their online footprint and protect their research and personal integrity.

In a world where data is the new currency, it is essential to move with caution, armed with the tools and knowledge that can keep a researcher’s work shielded from prying eyes. Navigating the digital shadows is an art, and with careful consideration and the right practices, it can be mastered.

Posted on

Master Your Digital Domain: Enhancing Security with KeePassXC

In today’s digital landscape, managing an array of user accounts, each with its own password can be overwhelming. But fret not! By adopting tools like KeePassXC, you can fortify your online security and establish a shield against potential breaches.

🔐 Your Personal Security Fortress

Imagine having a secure vault that holds the keys to your online kingdom. That’s exactly what KeePassXC offers—a password manager that centralizes and encrypts your credentials, putting an end to the hassle of memorizing multiple passwords.

🔒 Defending Against Password-Stuffing Attacks

Ever heard of password-stuffing attacks? These malicious attempts involve hackers using leaked passwords to break into multiple accounts. Fortunately, with KeePassXC, the uniqueness of your passwords means that even if one falls into the wrong hands, your other accounts remain safe and sound.

💡 Balancing Convenience and Risk Management

As with any security tool, KeePassXC has its considerations. Storing all your passwords behind one master key might seem risky. To mitigate this, ensure your master password is a complex combination of letters, numbers, and symbols—something only you can fathom. And remember to change it regularly.

🛡️ Navigating Vulnerabilities Prudently

No solution is foolproof, and vulnerabilities can occur. KeePassXC’s open-source nature helps to mitigate risks, thanks to vigilant developers and contributors. Stay proactive by regularly updating the software to shield against potential threats.

🔐 Mastering the Master Password

The strength of your master password determines the strength of your fortress. Make it a formidable combination of words, characters, and randomness. Opt for a passphrase that’s memorable only to you, steering clear of easily guessable elements.

🌐 Embrace a Safer Digital Journey

KeePassXC isn’t just a tool—it’s an ally in your quest for digital safety. By adopting this approach, you’re taking significant steps towards guarding your online identity and bolstering your defense mechanisms against cyber threats.

🔑 The Path Forward: Empower Your Security

Ready to bolster your digital defense? Begin by acquainting yourself with KeePassXC. It’s not about quick fixes; it’s about adopting a mindset of vigilance and incorporating tools that elevate your overall security posture.

Remember, while no solution is infallible, KeePassXC is a stride towards a more secure digital presence—one password at a time.

#CyberSecurity #DigitalProtection #OperationalSecurity #KeePassXC

Posted on

Update: Major website revision & 2023.2 is now public!

🔥 Exciting News! Elevate Your Skills with CSI Linux 2023.2 🔥

🌐 Introducing the New CSI Linux Website: Your Gateway to Advanced Training 🌐

Are you ready to supercharge your Linux skills and take your career to new heights? We’re thrilled to announce the launch of the all-new CSI Linux website at https://shop.csilinux.com/! Whether you’re a seasoned IT professional or a passionate beginner, our revamped platform offers a comprehensive learning experience that caters to your needs.

🚀 Streamlined Learning Experience 🚀

We’ve integrated our training site, formerly known as training.csilinux.com, directly into the main CSI Linux website. This seamless integration ensures that you have easy access to our courses, resources, and community forums, all in one place at https://shop.csilinux.com/academy. Say goodbye to the hassle of multiple logins and get ready for the convenience of single sign-on, which will be available in the near future for both the main site and your academy courses.

🆓 Dive into Free Learning Opportunities 🆓

We believe in the power of accessible education. That’s why we’ve added a plethora of free courses, designed to enhance your knowledge and skills across various domains. Explore courses like “Resume Writing” at https://shop.csilinux.com/academy/course/view.php?id=75, and embark on a journey of continuous learning without any cost.

📚 CPE/CEU/ECU Credits for Your Certification Journey 📚

Are you a certified professional looking to maintain or upgrade your credentials? CSI Linux Academy has got you covered! Our expansive selection of computer science and professional development courses align with your continuing education credit (CPE/CEU/ECU) requirements. Fulfill your credit needs while deepening your expertise in areas like Security+, CEH, CHFI, CISSP, and beyond. Our platform is your go-to resource for staying up-to-date with the evolving industry landscape.

🎓 Unlock Your Potential with CSI Linux Academy 🎓

Whether you’re looking to enrich your skills, earn valuable credits, or explore the latest CSI Linux release, our new website and integrated academy provide the ultimate learning destination. Take the first step towards your educational journey by visiting https://shop.csilinux.com/ today!

📚 A Special Note about the College Courses 📚

We’re proud to offer a range of college-level courses that are made available under the Creative Commons Attribution (CC BY) license from Saylor Academy. These meticulously crafted courses provide you with an opportunity to engage with high-quality content that’s been curated for your success. As part of our commitment to accessible education, these courses open doors to a world of knowledge and growth.

🔍 What’s New: CSI Linux 2023.2 🔍

Exciting times call for groundbreaking updates! We’re thrilled to announce the release of CSI Linux 2023.2, the latest version of our cutting-edge Linux distribution. With enhanced features, improved security, and upgraded tools, CSI Linux 2023.2 is your toolkit for mastering Linux like never before. Get your hands on the new version, available exclusively at https://shop.csilinux.com/.

Remember, knowledge has no limits, and with CSI Linux, neither do your possibilities. Discover, learn, and excel with us today!

🔗 Visit https://shop.csilinux.com/ to Get Started! 🔗

#CSIlinux #LinuxTraining #ContinuingEducation #LearnLinux

Posted on

Using Sock Puppet Accounts for OSINT

‘A sock puppet or sock puppet is an online identity used for purposes of deception. The term, a reference to the manipulation of a simple hand puppet made from a sock, originally referred to a false identity assumed by a member of an internet community who spoke to, or about, themselves while pretending to be another person.’ – Wikipedia

These fake social media accounts are used by both sides of the cyber game. You can find hackers, scammers, bots, and other cyber criminals on the dark side while journalists, penetration testers, and investigators are on the other. Like any decent tool, it can be used for both good and evil. Why would YOU want to create an undercover account? When investigating, it is always a good idea to separate your real identity from the initial investigation. You increase the likelihood of the target will get suspicious. You also run the risk of being identified and doxed, harassed, and in the absolute worst-case scenario, targeted for lethal retaliation. Depending on who the suspect is, you always need to take the appropriate countermeasures to protect your organization/agency, yourself, and even your family. Another thing to take into consideration is that many social media sites have Terms of Service (TOS) that specifically cover fake or investigation accounts. Organizations like Facebook are actively looking for these types of accounts, even if they are law enforcement, and banning them.

!!!DO NOT USE YOUR PERSONAL OR BUSINESS ACCOUNTS TO DO INVESTIGATIONS!!!

The Importance of Anonymity and Security

You should connect to a public WiFi access point and only use VPN or Tor as a last resort. The reasons are that VPNs and Tor are sometimes tracked, blocked, or marked as questionable by websites when creating an account. This means the likelihood you will be able to create the account without having a real phone number decreases drastically. Public WiFi tends to look a bit more “normal”.

More about Tor

I love Tor and always have. Tor is great at offering some of the best anonymity available and the best part is that it’s free. The mechanics of Onion routing is that you are essentially moving through several different proxy servers, and this minimizes trace evidence that can be used to tie the traffic back to its original source. You can easily set up a hidden service with a “.onion“ address. This allows us to communicate securely with other investigators, informants, or even suspects. The downside of using Tor is that it is commonly used by criminals and many of the websites we need to investigate may be blocking traffic from Tor or red flagging it. So, even though it offers a lot of benefits, Tor is not always good for Surface Web investigations.

VPN Value?

There has been a ton of advertising for Virtual Private Network (VPN) services that claim that they will protect your Internet traffic. This is only partly true and mostly false. A VPN is a Point-to-Point encrypted tunnel that allows one network to talk to another through an encrypted tunnel. Think of it this way. You are using a third-party VPN service; your traffic is very secure when connecting from your system to the third-party network. The traffic then routes from that server through their Internet connection. The other thousand people using the same service will also share that same gateway IP address. That sounds fine, right? Well, after you leave that service provider, your traffic is back on the Internet for everyone else to see. This means it is naturally less anonymous than Tor. The providers may also be watching everything you do in the name of “Marketing”. Free VPNs and cheaper ones are the biggest risks. The services that claim they DO NOT STORE LOGS are also usually lying or not telling you the whole truth. Within networking, there will always be logs. They are required to troubleshoot when things fail. Logs will be there; it is just a matter of how long and how they are destroyed. Some of the websites are red-flagging the popular VPN services.

Creating a persona

Some people make these accounts from scratch. The more content and backstory you create in the beginning gives you more of direction to make the account look like a real person’s account. Use a password manager to keep track of everything you are creating for these accounts including the user/pass info and keep notes. KeePassXC is a great free solution that is cross-platform that will allow you to share your password management database among multiple computers and different operating systems.

Character/Persona generators

Creating an account can take some time, effort, and creativity. If you are short on any of those for whatever reason. Anyone that has played role-playing games like D&D, WARHAMMER, or other games where you need to generate a character to play, has a step up because they have done this before. There are a few resources you can leverage to help speed up the process and spit out a “character” with a lot of random attributes and content. Below is a list of resources you can use when generating your Sock Puppet persona. Just remember that all information generated is fake. You can change the data to fit your narrative:

  • Fake Identity Generator (fakepersongenerator.com)
  • Random Name Generator (www.elfqrin.com/fakeid.php)
  • Random Character Generator (random-character.com)
  • Personality Generator (rangen.co.uk)
  • Trait Generator (rangen.co.uk)

Image generators

Generating images that have consistency to them can be a challenge. You want to create a realistic person with history and consistency. It is important to NEVER use pictures of friends or family. This can put the investigation at risk and possibly them at risk as well.

  • (thispersondoesnotexist.com) – GitHub project available
  • AI-Generated Faces (boredhumans.com)
  • Gallery of AI-Generated Faces (generated.photos)

Emails

Creating an email is the base for setting up your undercover investigation account. This will be used for setting up social media accounts and communications with suspects. Any email service will work. Here are a few:

  • GMX.com
  • Mail.com
  • Protonmail.com
  • Yandex.Mail

Burner Phones

A burner phone is extremely useful and may be required to create accounts on certain websites along with creating a history for the persona. The reason is the sites are trying to prevent fake accounts from being created and will send an SMS validation message to a phone. Bots rarely have their own phone numbers. In some countries, you do not need to tie your ID or Passport to buy a SIM card or burner phone. If you are in one of these countries, it is suggested to use cash only and let the phone sit for 2+ months before you activate it with a sock puppet email. Sometimes SIM cards can also be purchased on Amazon.com. Keep an eye out for deals and trial offers. Phone emulators can also work.

VoIP Phone

Generate a Voice over IP (VoIP) account with an online vendor. This will be useful to add another layer of separation. Many online services like Google Voice require you to have a real phone number to tie to your account. This makes your burner phone that much more important.

Pre-Paid Credit Cards and Gift Cards

In some cases, you may need to use a credit/debit card for purchases, account setups, and account verifications. If you are in a country or area that allows you to purchase these types of cards (VISA/Mastercard), use good OPSEC to minimize links back. You can also use a privacy.com masked credit card.

Cryptocurrencies

If your investigation requires cryptocurrencies for transactions, you can use prepaid cards on most of the crypto services. Exodus.com is a wallet that allows you to trade many different currencies and their Desktop software is cross-platform compatible. An example of needing cryptocurrencies during an investigation may include fraud cases on sites like Facebook Marketplace, Instagram’s Shop Now, Craigslist, etc. You may also find them useful when purchasing content and buying services.

Social Media Accounts

When creating a social media account, you want to look as ‘normal’ as possible on the website because many of them are trying to stop people from creating fake accounts. Make sure you are not breaking the law or violating terms of service when doing this. Now things to look at when creating your OSINT undercover accounts:

  • Use public Wi-Fi and do NOT use a VPN
  • Pick a social media site to focus on
  • Use your persona’s “real” phone number for verification
  • Save the information in a password manager like KeePassXC
  • Keep Operational Security (OPSEC) in mind:
    – Use a very strong password for the password manager access
    – Use a different password for each account
    – Never cross over accounts with your real-world or personal accounts
  • Go into the settings of the account you just created and change the phone number to a VoIP number
  • When you are done, log out of the account
  • Log back in and start adding information to your account relevant to the profiles
  • Go back to step 2 for the rest of the sites you want to try

Note: You may burn UC personals when creating accounts. Just be patient and persistent. This process takes time and effort.

Aging the Account

Like a fine wine or good whiskey, the account needs to be “aged”. This means creating content and history. This will minimize the likelihood of the account getting flagged as a fake by the service provider and deleted. Become the persona. Go to the same public WiFi you created the account with to log in and generate activity. Like posts, make comments, share things, and grow your connections. Log out when you are done. This is very important and ties into OPSEC. Not logging out can leak other networks and information out for Big Data if you are not careful. The goal is that you are training the site that you are a real person by doing real-person things. Try to add content and history following the personality of the fake character. This includes finding banners with image searches. Think of banners for your social media pages, memes, and pictures from the location your persona is from. Build your account pages how you believe your sock puppet would have. Add enough information to make it look real. Over time, keep logging into the account and add content to build history and the trustworthiness that the account is a “real” person.

Learn from your Investigations

‘Operations security (OPSEC) is a process that identifies critical information to determine if friendly actions can be observed by enemy intelligence, determines if information obtained by adversaries could be interpreted to be useful to them, and then executes selected measures that eliminate or reduce adversary exploitation of friendly critical information.’ – Wikipedia

Things always change and you must keep improving to keep up. Make it a habit of using good OPSEC. There is a saying with investigators. The suspect needs to be lucky every single time, but you only need to be lucky once. The other side can use the same Tactics, Techniques, and Procedures (TTPs) as you do and that flips the table on you. Now, you need to be lucky every single time and they only need to be lucky once.

Resources

  • Creating Research Accounts for OSINT Investigations – We are OSINTCurio.us
  • Dark Side 116: Sock Puppets. What if I told you not all fake social media accounts are used maliciously?
  • DeBot: Twitter Bot Detection via Warped Correlation
  • How to Make Sock Puppet Accounts for OSINT in 2021 | Hacker Noon
  • The Art of The Sock (secjuice.com)
  • The Ultimate Sock Puppets Tutorial for OSINT Operators – Ehacking
  • Identifying Sock puppet Accounts on social media
Posted on

FAQ: What custom tools and features are available in CSI Linux ?

CSI Linux offers a comprehensive suite of custom tools designed to enhance online investigations, incident response, training, and more. Here is an overview of these specialized features:

  • CSI Tools (Online Investigation Tools): A wide array of tools catering to various investigative needs.
  • Centralized Evidence Capture: Organized collection and storage of critical evidence.
  • Cryptocurrency Wallet Lookup: Quick search and analysis of cryptocurrency wallet transactions.
  • CSI TorVPN: A dedicated VPN for secure and private online operations.
  • Custom GUIs: User-friendly interfaces for many tools, integrated with Case Management.
  • Domain and Website Analysis: In-depth capabilities for analyzing domains and websites.
  • Forensic Disk Image Mounter: Access to disk images for detailed analysis.
  • Forensic Volume and Image WriteBlocker: Protection against accidental alterations to original data.
  • Geolocation for SSID/BSSID/IP: Geographical tracking associated with network identifiers.
  • Hash Capture of Evidence Files: Integrity assurance for evidence files through hash capturing.
  • Timestamped Archive of Evidence: Chronological record-keeping of evidence for audit trails.
  • Twitter Feed Pull: Targeted Twitter feed extraction for investigation.
  • Username (Social Media, Dark Web, and NSFW) Search Identification of user accounts across platforms.
  • Sock Puppet Generator: Creation of false online identities for covert investigations.
  • FBI Wanted Download: Direct access to FBI’s wanted information.
  • CSI Recon Browser (Online Investigations): Specialized browser tailored for online investigation tasks.
  • Investigator Anonymity Protection: Safeguarding personal anonymity for investigators.
  • Custom Dark Web tools for accessing, researching, and investigating several darknet networks.
  • CSI Triage for Incident Response: A dedicated tool for evidence collection during incident response.
  • Echo AI for Training Data: A specialized AI tool for generating and managing training data.
  • Navi: A virtual cybersecurity AI assistant with a forensic focus, designed to aid and guide investigations.

These custom tools and features collectively enhance the efficiency and security of CSI Linux, making it a powerful asset for digital forensics, online investigations, incident response, and training. Whether it’s searching for specific information, protecting investigator anonymity, managing evidence, or facilitating incident response, CSI Linux provides the necessary tools to accomplish the task seamlessly.

Posted on

FAQ: What is CSI Linux?

CSI Linux is a specialized Linux distribution designed specifically for digital forensics. Developed by professionals in Computer Forensics, Incident Response, and Competitive Intelligence, it serves as an open-source “theme park” for the cybersecurity industry, offering a comprehensive suite of tools for investigations, analysis, and response.

Available in various formats including a Virtual Machine Appliance, Bootable Triage disk image, and a pre-built workstation, CSI Linux aims to empower forensic investigators by providing an all-inclusive, multipurpose investigation environment. Whether it’s online investigations (including OSINT, social media, domain recon, dark web analysis) or offline Digital Forensics, Incident Response, and Malware Analysis, CSI Linux is designed to be an ideal tool for both training and real-world applications.

The platform is tailored to address challenges across several domains:

  • Minimize Time and Effort: CSI Linux streamlines processes in reconnaissance, OSINT, SOCMINT, and Dark web analysis, offering a more manageable and often cost-effective solution.
  • Cyber Crime Case Handling: With a combination of state-of-the-art technology and investigative expertise, it provides a low-budget solution for efficient cyber triage and emergency response.
  • Malware Analysis: CSI Linux’s SIEM (including Elasticsearch, Kibana, and Zeek IDS) and additional malware analysis tools like Radare 2 and the NSA’s Ghidra ensure robust capabilities in traffic analysis and further investigation of malicious code.
  • Forensics: For traditional computer forensics or “Dead Box” forensics, CSI Linux offers tools like Autopsy for file analysis and forensic data recovery.

In summary, CSI Linux is a versatile and accessible tool developed to meet the diverse and evolving needs of forensic investigators, government agencies, and the cybersecurity industry at large.