OSINT Uncovered: Unlocking the Hidden Gems of Online Information

Video Statistics and Information

Video
Captions Word Cloud
Reddit Comments
Captions
so yeah let's get started with ENT um so I didn't want to make this a typical presentation where we talk about oen stuff so here's my agenda uh all of it is going to be holy I didn't know this stuff these are things I perform on probably a daily basis these are tools and tricks and techniques I use uh to dig for information things that are Beyond just Googling so a lot of people think and that's say Googling um some of it is it starts off with basic searches but this presentation is going to take it to the next level another thing I want to hone in is the fact uh of uh verification of different types of data there's thisinformation you can spread out there corrupt data so and other people do as well so it's very important to verify anything you see online as an investigator or as anyone who's just doing uh search and the goal here is so I'm going to be all over the place just to show you a variety of different techniques and so that I don't dox anyone um unintentionally so the goal here is taking lots of pieces of information and pivoting off of um them so that you can build the bigger picture right so who am I for those of you who don't know me um I'm a certified ethical hacker I've for a very long time as before it was even called pentesting um I do a lot of social engineering fishing fing impersonations U I'm a ccie I've been doing networking for some time as well um I do code for fun uh today I'm I primarily work as a virtual ceso more on the advisory role uh but I also do a lot of privacy stuff oen investigations and I wrote a book about um being a ceso as well so go check that out so ENT what is ENT it is not stocking uh so this is where the stalkers log off and this is for ethical purposes uh again I can't emphasize more uh deeply on the fact that ENT should be used for good there are way too many people out there that use ENT for stalking for cyber crimes for doxing there's a lot of us out there who can use this skill for good for protecting people for finding information for preventing all the bad out there so I hope that you use these skills for good and don't misuse them this is part of the reason I don't record a lot of my talks uh because there's a lot of sensitive information in it but let's see so ENT can be categorized into you know I've done a lot of uh talks on corporate ENT uh a lot of network based reconnaissance some geoint some social media intell elligence people will categorize it into into different things but then there's everything else and that's what I'm going to talk about everything else um ENT is very fluid uh breaches are part of it uh this is something I give a talk on um last year at black uh uh at Black Hills um sorry Wild West hacking Fest it was called what's up breaches and I talked about breaches the different types I use for ENT you can use scrapes Steeler logs uh data from different data aggregators and stuff and you'll be seeing a little bit of that uh today as well but this is one of my big resources uh so a lot of people ask me uh you know when I show them a lot of data how do you get all this sensitive data do you go on the dark web do is it on the clear web I can tell you I rarely ever go to the dark web I go there just you know hoping I would find something but I've probably never found anything useful on the dark web even things like Social Security numbers and stuff what you see here on the screenshot this is these are all from leaks and breaches and stuff these are passport copies in in different leaks that were out there or breaches there's checks with information I've redacted some of this and here was an Excel sheet I found on the clear web just searching the Google Dorking you know file type XLS or xlxs um and SSN in the name and these are Social Security numbers of students student records uh so you can find a lot of this in the cleare web online you you just need to know where to look for it so there's a lot of breaches that I use when I'm collecting information um so there's these are all the not so common breaches so people think oh breaches are for passwords no the there they're for so many other things you can find um just the presence of your name in a breach can be Troublesome so so your name could be in a porn site uh or the Ashley Madison breach which was a website for cheating spouses long time ago uh so if you're in breaches like that or guns.com or Bitcoin talk or um anything else you know that you can get a lot more information from it my favorite breach is the park mobile breach because if I get plate numbers from an image or or someplace I can reverse look up that um license plate number and find out if you were in the Park mobile data breach a lot of us were I personally was as well which I didn't know um you can find email addresses phone numbers and and this is stuff that's been volunteered by you so this is not government data this is what you put in an app so you know verify it as well but U there's a lot of sources of ENT I I categorize all of this under osen because it's still freely publicly available to anyone who knows where to find it okay so the goal of everything we do in ENT um is due diligence just make sure you're hitting all the different you know pieces of data and this is my goal here I build a picture like this of my Person of Interest I find out everything they do from a work perspective what breaches their part of what vehicles I could find uh based on um maybe Google Street View or other images their social media profiles and on and on and on so all of this you know is disparate uh when I look at emails and education I can find it in different areas but I combine all of this and build a bigger picture like this and then I start connecting the dots and verifying it so you see all those yellow dashed lines this is my methodology of verifying information saying oh from the LinkedIn breach I found this email address and this email address was also uh found in some other you know online search or this government record leaked his phone number and the phone number scholar ID was you know so on and so forth so I connect those dots and when I have this picture I know that this information is solid it's verified because a lot of things correlate to each other and imagine this this is one person now you're trying to connect it to a stalker or um you're trying to unmask someone and then they start um you know connecting the dots there you you take information that was seemingly um unknown at first a phone number you don't know about an email address but then you take that email address you look at breach data you find a password you reverse search a password find other email addresses it gets pretty interesting so enough talk let's look at some of the tools and techniques that I use and this is just a very high level introduction so this is not meant to be a full-on ENT course that's later in the year but let's see some of the tools that I use so like I said I'm not going to use conventional tools my background is a hacker so I'm going to use hacking tools I'm going to use cell Linux in the demo today I'm going to ask the government uh to give me some data and look at some historical records I'm going to start fooling ivrs extracting datas from apis uh looking at paid data that you think you would not have access to but um you do all of this what you see on the screen isn't this the definition of a hacker I mean a hacker uses um you know techniques and and data in front of them and methods and websites and and tools and uses it to extract things that the tool wasn't intended to do so we're not breaking systems we're just asking in a different way uh to extract certain data so in my opinion that's that's what a true definition of a hacker is uh so let's get into this so C Linux first and for uh foremost all of us hackers uh know what it is and how to use it and I'm going to use a I'm going to use burp suite and a few other tools to kind of demonstrate um some of my techniques so in order to do that no we won't use Google but I need a Target so I randomly chose U last night I was up as well like Ian was till 1:00 a.m. 2 a.m. and I was looking at certain targets uh and I wanted not to dox a particular person but I wanted some information for the demo purposes so I just went on fastp search.com went on um this website and searched for some random person in Kansas City Missouri why I'll tell you in a bit so I found this person's information here and if you look at their details and this is how most ens starts with people search websites you look at their data now I'm not interested in most of this data this is regular ENT um what I usually do is I go down and I want their full date of birth and websites like this will tell you part of the information it'll say this person is 63 years old born in August of this year what about the day I want the exact day that they were born um just to have a full date of birth um where do I I can search on and on but a quick way to do this is since this person is in Kansas I search Kansas City voter registration records and I see this website check your voter status I can go in here and I can start putting in that person's name let's say I put in a random whatever it asked me for a last name and a date of birth I press search and we could not find your record so for this person it was Tores and their date of birth I don't know the first part of it so I can start guessing one by one I can have 30 iterations of this so an easy way to to kind of go through this is open up C Linux open up this page um let me turn intercept off and load this page again so this is the voter registration page I put in that name and I put in that date of birth and I click so before I click search I'll put intercept on and I'll press the search button this is not a tutorial on Burp Suite but have a look at what happens when I press forward forward so here's the actual field I'm after the first name stays the same the date of birth is the month the day so the second field I don't know I know the month I know the year I'm going to iterate through the second field so I put this in Intruder and I write their last name date of birth and I put this as a wild card the second um Fe field here which is the day and I want burpsuite to kind of iterate through all of these and I I just start the attack here let me start this attack and as you can see it's going through all the days it's going to go through 30 iterations and one of these you see the payload length is different than the than the rest um this is probably that person's datee of birth and you can kind of see um where is the results of this let this finish there we go so if I look at the response let's look at the response of some other field and render the response so the response would show we couldn't find your record but for this one the odd one out the response would be there you go so here's their water records it shows you a street address 7th Street um not a lot of other information but I have something that's verified by the government now so Seventh Street let's go back to um that person's profile here you see a lot of addresses uh where is the addresses here a lot of different addresses two of them have the word Seventh Street let me search for it so three of them have Seventh Street on it they're slightly different addresses so I can now start narrowing it down a lot of the times I've had um you know many many uh addresses come out from different search results not just fast people search but many others and that's how I kind of verify based on voter records so the government will tell you I I chose this um vo registry the Kansas uh City one because they only ask for a last name and a date of birth some others will ask for maybe a zip code no problem I can put that in some will have a capture underneath it Florida now has a capture previously it didn't it probably got on to my technique here um but so every site every state every County will be different but that's where ENT leads you so now I have some verified information I have a full date of birth where can I use it you know you can use it in many different places I won't get into it but that's how you kind of start digging deeper and verifying some of that information um so let's pick a different Target now let's pick me uh Michal khan.com uh so let's see who's registered this website so part of the ENT thing is I want to know um U this is network based ENT looking at DNS records and stuff so if I look at normally if I look at um someone's who is records they're most of the times they're going to be redacted like this this is a live who is record you can go on Terminal type who is domain name you'll get the same thing but if I go to hook.com I believe that's how you pronounce it and you look at the records there they give you historical records so the current records are all let me zoom in a little bit are all redacted but right below that um and this is all free version of this website you'll see who owned this website in the past so someone by the name of Michelle aan gmail.com own this record it's not me I I bought it after them uh so now I have an email to go by even though this record was redact is redacted today in the past uh it wasn't so now I'm starting to reveal more information what can I do with this I can start putting plugging this into other websites and start reverse searching but let's go back to Cy Linux and let's close this stuff here let's close burp Suite to exit yes all right so in C Linux you what you can do is um so let's go back to before I show you that let's take this email address michan so instead of searching it through many different places my basic search always involves searching it through have I been pound.com to see where this person's email address is so gravitar is one place so I know if it's in gravitar there's probably um an image there so you go to gravitar uh.com slight check put in that person's email address there and now you get an image a thumbnail icon of her uh so now I know a little bit more about that person uh what they look like if I now look at breach records for this person now I don't want to dox them completely so let's change the email address a little bit let's just do Michelle gmail.com again I don't own this unfortunately uh so let's let's see what breach directory comes up with sometimes this page takes a time to load you just got to refresh it kind of times out yeah that that's why Cloud flare so let's do that search again and so I see some passwords here now like I said I'm not after passwords but let's say I do find passwords of Michelle gmail.com these are past previous passwords of some breaches and if I look at these this password for example I can pretty much guess what these uh asterisks here are so there no need to MCH them but let's say I want to know what this password was or or the ones with the number this could be a phone number or whatever let's say this one this website does give me a hash of the password um so it's new P so as hackers very quickly when we look at hashes the first thing that jumps to my head at least is um hashcat so if you go if you look at hashcat you put in the hash it was a sha one hash yeah so it's sha one which is M100 um so I'm going to do an attack where I know the first few um characters new p and then wild cards after that and I click enter I'm going to crack this some may take time but since I know half the password and I'm just guessing the latter half uh it already said cracked so that password was new passw so it's probably truncated or probably not because it's a hash so this was the password at some point now I can take this password and reverse search it in some other website and say which other email addresses had the same password if it's Unique enough it may come up with the um other email addresses that I didn't initially find so that's what I usually do those who are not you who don't come from a hiking background may you know use this information and just search the hash itself you can do that as well on on Google and maybe find the answer there but this would have been my tick technique um there's other things I other tools I use in Cali Linux so let's let's look at an Instagram profile so I just literally wrote in Bob as an Instagram I wanted the a short simple name so instagram.com Bob I don't know who this person is um but this is what their profile starts with Bob let's say this was my target again don't want to dox anyone that's why I keep switching targets um what do I see in the Instagram profile very quickly don't see a lot of U I don't see a phone number an email address I don't know if this is their name maybe this is their name um I see a link tree uh thing what does that take me to it takes me to more links on that same person oh I have a phone number starts with 404 but there's a tool I use which can extract some hidden information based on API calls from this profile that you don't see right now that tool many of you may be familiar with is called um hold on I don't know how to pronounce it but it's called tuttis and it's on um um GitHub so I downloaded this tool and I put in the username Bob and you got to put in like a session token which when you sign in you get it uh you can follow the tutorial but when I try to extract some information out of this it goes through and hits the Instagram API and now it found that same same link tree link that I found but it also gave me an email address which is not there and a phone number for the profile which starts with 850 let's look at that profile again there's no phone number here there's no email address here even the link tree link had a 404 um phone number whereas the LinkedIn uh was created using an 850 number so that that's another way of extracting information using some apis um and this is not public information um at least LinkedIn uh sorry I keep saying LinkedIn Instagram doesn't uh show it as public info and you can see this uh email has a different domain tjs DJs if I go and look that up it's probably the record label company of that person so that's another way of extracting some hidden information and then pivoting off of that there's there's another tool called H by the same person who made this um Instagram tool to titis and what that tool does is let me run that tool against Michelle gmail.com so it's going to look at a lot of popular social media or online websites and see if an account exists or not um and it has a long list a couple of hundred list uh hundreds of um accounts there so it comes out with only the ones that have accounts created so I know that this email has an Amazon account an eBay an Eventbrite at GitHub and and so on and so forth I don't know what those URLs look like but I do know that it's registered against them and because the stool goes out and um sees if there's a registration against that email or not so this is a good way of knowing that hey this person has a Twitter account now my job is to find it I don't know what the tw Twitter handle is but U I know it exists so it's it's a good way to um kind of pivot off of an email address to accounts that may not be publicly visible today but I do know that one exists this can also be used for law enforcement and say you know this person is on I don't know last pass.com or nike.com they can issue a subpoena to Nike and say give me everything you have on this person maybe there's an IP address in here maybe there's a home address that's in one of these profiles and whatnot so this is useful information to put in a report that these accounts exist for this email address again this could not have been possible with just going on each account one by one and trying to create a username uh with this email address that email address would likely get notified U with a validation link um so that's you know some of the tools I use with C lenux there is a lot more um but for the sake of time we'll we'll move on in breaches um so another thing I can do so we looked at some historical who is records but a lot of The Who records have been breached so if you go to intelligence X or intell x. and put in a domain you'll see some breaches of MX Records who is records um so let's look at maybe this last one this is a 2018 breach and so I already have an email address address uh for this so mishal khan.com that's I own the website now but remember previously um under the who is records the only additional piece of information I found was a Gmail address but inside a breach so I have this record line here let me blow this up a little bit so it says registered Google Inc so previously in 2018 somebody registered in Google uh there's some email address um it's all redacted redacted so maybe it wasn't this record it was the 2019 so there's only two who has breaches for this so let's see if I can find anything more than just that email address Google Toronto Toronto again so this is probably the registar thing so let's see I did this this MX records DN [Music] let's try this one one more time so in my demo I did find a address of New York somewhere here we go Brooklyn New York so it has a street address laurren Street Brooklyn New York for this person and that same email address is there so I found one more piece of information looking at Bree data um a New York address so now I'm just building on top of of where I started so again breaches are your friends when it comes to ENT because this information was not available in historical data either so moving onwards from technical tools what else um so other things you can look for in government records besides this water registry you can look at a lot of other uh personal records if you know where that person lives look at in their County and this was very surprising to me there was a document available online and this is a random search um a long time ago I took a screenshot this was some I think adoption records or or child custody records of of some person again public records but this record had a full social security number of both the parents unredacted all this redaction is me presenting it to you on a on a PowerPoint thing there were so many things had to redact in this this is all pii full date of birth where they live their full name their middle name so many other every single page had something the birth records and this was way too much their signatures was there which can be used for forgery as well so this this information is out there people ask me how do you get Social Security numbers is the dark web or you pay for it no I just asked the government they'll tell you it's it's it's funny but it's not so yeah so you you can get a lot of unredacted Records just by looking up public court records or County records and these things are not googleable you have to literally go on each County website and you know uh search them up there but historical data I showed you hook.com for domain registration historical data there's archive.org which most most of you are familiar with for past versions of a website um there's also Google Street View so some people know this but um a lot of people are kind of surprised on the information you can find so another random address I put in in Orlando Florida uh of a house that has Google Street View let's look at Google Street View here so I can have a look at this and see that this house has a vehicle but I can see more dates as well so you can look at past versions of this so 2014 it looked like this April it looked like that another car um more stuff here so there's many versions of this you can look at and extract more information maybe a security system there's a flag here maybe they support some political candidate and they have a plard here so there's a lot of information you can get from Google street views and previous versions and then you have to correlate with with home records and see if that person actually lived on that date or was it a previous tenant or not but simply from this you see um a vehicle here now there's um a tool that can identify this vehicle now for us looking at this I mean it's pretty obvious it says F-150 it's a Ford F-150 but let's say you didn't know what this vehicle was there's tools like this Carnet doai where you can actually um plug in stuff so let me um stop sharing this thing here so that I can show you what this looks like so if I take a screenshot of this vehicle right here I took a screenshot and put it in this tool here I can quickly identify it says Ford F-150 probability 77% that's great now I put that in the person's record I saw another vehicle in their historical records which was this um I don't know what this vehicle is looks like a I don't know Kia or something let's see what it is here put that in here again yeah it's a Kia Soul 83% probability it is a Kia Soul so very quickly I can kind of verify what vehicles there were here based on historical records now I have a starting point for something um I can take this one step further so if I take that same address uh there's other things I can find about that address on sites on other people search website like that's m.com so I put in this address here and I see you know the the regular information like phone numbers previous addresses more email addresses but another thing you get here with some of these records is if you do show full profile you get IP addresses something that normally we don't get where they're getting this from probably breached records somewhere but if you like look these IP addresses up and just go to a simple um you know IP address lookup tool my preferred one is maxmind uh.com has a demo page where you can submit IP addresses and this does ipv uh six as well that's why I like this and you can put in like up to 25 here so it'll quickly tell you you know where this IP address is again this is not verified data but it's you know pretty close um you can get at least a rough location and an ISP address put that in your report and then you know further your investigations based on the ISP and uh location information so that's you know more digging deeper into uh a profile just things Beyond basic uh email address phone numbers and stuff another thing you can do so let me go back to um my slide um bring this up so there's a lot of paid private data which large organizations um gather so anytime you sign up for something or the government collects your data like DMV data um there was an article I read that uh the California DMV made $5 million a year or makes $5 million a year just by reselling your data which you think they're not going to resell but they are so your home address your um anything you give to the DMV is sold for millions of dollars literally by the DMV but so that data is not public data um but there is a way to kind of uh query that data I found many methods and I'll show you one so insurance providers they want to help you out so let's go to an insurance provider like um State Farm and say I want a quote for the same person here so let's take their zip code um 32819 so let's do this 3 2 819 and I want an auto quote and I put in a street address first name I don't know Toby Stark Tony Stark's brother uh let's put a random date of birth and um Vehicles so now um is this yeah whatever yes so let's see what information State Farm gives us um add up to four vehicles didn't give me any info fail demo fail let's do this in a different window so sometimes it has cach records and it doesn't go anywhere so 32819 let's do this again orando uh let's do this so what it does is it sometimes spits out the vehicles for you maybe for this address it's not there you go so I just opened a new window a new container and it actually showed me the vehicles so so pH demo Gods um so Ford Fusion Ford F-150 WS wagon Jetta so let's go back to this view here and we do know there's a F-150 that the person owns So this house has registered U Insurance um for this vehicle so we know this is not a visitor so now I've kind of confirmed that this is the vehicle that the residence owns the other car here was another Ford and we can do the same thing with carat. to kind of figure out what this was but going back to the vehicles um that's a Ford Fusion I know for a fact that's a Ford Fusion and now I know the the year of that as well so we found two of we verified two of those vehicles that Jetta was probably not parked there at the moment so again information that wasn't public at first but through some sneaky ENT techniques um through State Farm I I found that yep that those vehicles are vehicles that belong to the residence so we can't extrapolate this much further and assume stuff we can only um see what what information is available at least we know those weren't guest Vehicles there so a lot of cool stuff that comes out of this one last API call I'll I'll I'll show you is um GitHub repos so if you go to github.com and and you go to any um let's say a repository signal um signal is open source so if you go to signal Android signal desktop let's say and you want to know who made these commits um you can see the rough you can see an idea the Josh Dash signal made this commit and you can go underneath the commit and see the code changes what you can see here is his email address uh you can you can if you use the command line and go under the details of this but what you can also do is call their API so that that API is api. github.com repo the repo name Signal app and then you know/ commits and what you get is a raw Json output of everything if I do expand all I see the commit name and then the email address of that commit as well this wasn't there on github.com but it is on api. github.com um so you and you can see a lot more information I just need the email address so I created a little script to kind of go through all of this and just extract the emails from it this is an offline version of um Michael Basil's tools that um I kind of tweaked a little bit and in this version of the tool there's a little script I created so you go to um this tool and you write in let's say um this one Signal app signal iOS and search all the email addresses and it just pops up all the email addresses you see some of them are legit um ending at signal.org um but some of them are kind of masked and it says github.com in them so as a as a security or privacy policy you should all go and um put that setting in GitHub and say mask my email address address in public commits because you don't want people to send you spam or start digging deeper into uh that email address any further so again apis this wasn't the intended purpose for it but from an enters perspective you can uh extract much more out of it Michael basil also has similar tools on his website Intel techniques.com tools and um you can kind of have a shortcut version of doing a lot lot of those things and you can press like the populate all button and 20 tabs will open up and you can start closing types one by one that's how I gain speed in ENT cuz there are thousands and thousands of resources they keep changing over and over but um like I said initially due diligence is what we are after and you got to look at all different sources of information one last or second last technique I want to show you is so another means of exploiting something legitimate um so ivrs we can hack or exploit ivrs for information as as well uh so interactive voice um recording or whatever that means so Xfinity so a lot of people have Xfinity accounts at their home for internet uh or voice uh so when I find out their phone numbers through osen and I find out who owns the phone number or the landline number and if it's xinity for landline um I usually do this exploit so this is a two-step process so Step One is spoofing their phone number so that's why having their phone number is valuable so I spoof their phone number using Telex or twio apis um and um just changing the outbound color ID on it won't go into detail with that for the sake of time but once I've spoofed their phone number I call Xfinity's 1800 number and XFinity thinks that I am that person calling cuz they want to help me out they want to kind of U skip the process of me telling them what their phone number is because they can see the caller ID so here's an example and it's a redacted example of the name of the person who I uh spoofed but here's the information that Xfinity tells me from their automated system hi thank you for calling Xfinity this call may be monitored or recorded recorded enter or say the ZIP code where you have or want service I don't have a zip code let's say let's try something else I'll need a phone number or account number to look you up which would you like to use sometimes it gives it to me sometimes it asks for it please say or enter any phone number associated with your account so I give him the phone number I actually don't even have to spoof a lot of the times once I give the I have the numbers of your stream address as 611 is this the account you're calling about yes so it gave me the street address of where it's registered that phone number that cell phone number so if I don't know where the person lives I just have their phone number and I look through scraped data and I get 20 old addresses or um the random home addresses Xfinity will tell me which is the current registered address for internet service for that person it's a huge data leak in my opinion and this has validated and solved a lot of cases for me so again uh hopefully Xfinity is not looking at this and doesn't uh block this method but uh I can tell you for a fact anytime you've called any ivr whether it's a bank whether it's you know some some other Institute uh and they automatically or autom magically know who you are based on your phone number you can try this technique with I've gotten their entire billing information and how much money they owe with the Xfinity ivr as well so there a lot you can do I'll leave it at that apis we looked at GitHub API extraction um so I'll skip this but um lastly I'll look at verifying information so don't believe everything you see on the internet um a lot of people do spoil some information online well I want a lot but I do um so here's an example um mermaids exist okay let's let's leave it to that uh let me prove it to you Wile so wigle.net is a great website I use for looking at um Wi-Fi ssids in a neighborhood so this is that same address I put in an address this is that same Florida address I can zoom in so another version of that this is where those Vehicles were here's actually you can see the Ford F-150 right here so if I zoom in here I see all these little dots I just press query button here again and it shows me a list of all the SS IDs that it's picked up here and this is crowdsource data people War driving going around with a Raspberry Pi or a phone and collecting SS IDs and uploading it here so that's how the process works now as a hacker I know how it works can I inject you know wrong data in here or can I misuse and abuse that data so for ENT it's it's it's pretty good I I see an HP printer somewhere here so one of these houses has an HP printer daddy dude is one SSID okay um so sometimes you'll get an actual name or um if the house is isolated and there's no other house around it you know this is their SSID and it may reveal something about the person like Daddy dude um or Cubs maybe a Cubs fan I don't know so you you can look at all of this but you can also this data isn't all very um authentic you can uh inject fake data in here so if I search for an SSID called Wi-Fi for mermaids and query the results let me delete the latitude longitude cuz it's limited by those you'll actually get two SSID and let's use a satellite view so where is this SSID it's right there it's in the middle of the ocean that's literally impossible and the MAC address is C4 c400 01 02 that's not a correct Mac address either so there this is literally impossible to scan an SSID here in the middle of the ocean by War driving unless you're on a ship maybe but I purposely injected this data here to show you an example of things can be spoofed you can't take everything for granted that you see online um and this has historical data as well different times this was scanned and put in there so if you know how to put the data in you can corrupt the data technically as well so extreme example but this kind of shows that all the other information that you see on um people search websites like that's them and stuff it can be taken out you can inject false information in here or some of this information is just not updated or true I've done searches on people I know very well and I know for a fact they've never lived in a certain address or state but websites like this show it to be true sometimes they mix up information as well so don't take everything for granted this is why we need to do our uh due diligence and um let's go back to the presentation yeah so hopefully your minds are blown uh following these techniques so there's a lot more U that can be done using exploitation of seemingly useful services online uh whether it's hacking tools or using data that the public does not see and and notice nowhere here did I use Google to kind of show you a point that yeah you can start off with Google if you don't know where the data is but if you know exactly what you're looking for you're going to have a nice workflow of all the resources all the tools that you need at your disposal to create that bigger picture uh that I um showed earlier and again the purpose is Pivot you know things like just the existence of an email address can show legitimacy can show an age of an account if an account has a MySpace email address and a lot of them are part of the Myspace breach you know this person is not maybe young they've been around the internet for a while it can show interest I had a person whose um whose email address was in an audi.com datab breach or a BMW data breach or whatnot uh it shows they must own that vehicle for them to be in that data breach so it shows interests it shows password reuse because you can um reverse search passwords if they're unique enough and sometimes you can find juicy information based on that and you can do historical scrapes and IP addresses and eventually you can unmask a lot of information that may seem hidden at first that was my quick and dirty intro to Advanced Osan skills and the possibilities that are out there and um I'm open for questions so uh you I there oh I'm not hearing myself there we go uh one uh Michelle I actually texted John during your talk because right now we have 1,000 100 people watching live wow so uh you are killing it and when you get a chance to go back and look through the Discord we we got a few questions and I'm gonna go through them with you but um uh it's basically nothing but Gifts of people's heads exploding and and and Jaws dropping so uh and I and I want to say this real quick and everyone if you want to jump back on turn your cameras back on we'll do a little post show chat and Q&A um one I for everyone listening I think I'm pretty good at ENT I would say a lot of people on this call are probably really good at ENT we watch Michelle and go oh my God like you are looking at a real Pro that Pros hat and go what um so yeah I say all that so that before we go into questions um I want to say two things and this is how we've been doing this recently because we want to go into questions we want to be cognizant everyone's time but we also want to remind you if your mind was blown uh one of the comments Michelle which was great which was this is the free stuff like speaking of your training and uh I responded yeah imagine what the actual training is like so that being said if your mind is blown Michelle's going to be teaching this at Wild West hacking Fest join us come out have your mind whatever's left of it further blown and you can find out more at wildwest hackin fest.com and I'm sure someone is going to put I already posted the link there excellent I'm bringing up my mic Ryan sorry I I I couldn't hear myself previously I didn't realize I'd turned down the headset um so that said let's uh uh get into questions but do stick around even after the questions or actually we might as well do it now Velda um if you can come back on camera before we go into questions um we are planning our next Summit after The Blue Team Summit and we would like your feedback on what we should do should it be blue team should it be purple team should it be all about platypuses should it what you know what what should we do uh should we name it B mcboat face um so we're going to have a poll coming out here uh either a little later in in this conversation or uh check it out during the next webcast and on social because we'd like your feedback I think that we were thinking maybe AI or um osen too okay um as the topics uh for that so we'll get a poll up uh maybe we can post it in Discord you go all right go so if you're in there is a poll right look at the people holy Toledo that's man I've never seen this this looks like AI crowd the current crowd might be a little biased yeah it shows there's an audience here right so yes all the ENT fans show up okay we'll we'll do a couple more polls here as we go as we get closer to the end of the year here because a couple folks already said Megan no no purple team we're not talking about purple team so yeah before before we came on we were talking about um Ai and ENT specifically so so just as well so the purple team what you do is you listen to the red team conference and the blue team conference one in each year at the same time yes oh and it's purple yeah and then you get a cat yep Gerald's saying cough GRC cough uh any I don't I think really think a GRC Summit would be good I think honestly but that being said you don't want to hear more about this but please do vote obviously uh we we do have some bias here as we approach the more than halfway point of the participant 6 6% here obviously are all like yes more ENT please it's currently 70% ENT 30% AI so yeah nice yeah very good so let's get into the questions here um so we had a question from Matt at JPL Mars rocks uh is this chat going to also look at meaning this talk caii commercially available information vendors folks like Intellis old school public info I think the answer to that is definitively no but can you give us some feedback what do you think of those tools yeah so I I have access to a lot of those paid tools as well which uh you know the the clear that the the T U and those type of Records um and you pay a hefty fee for those what they do give you back in return is pretty much the same information you saw on people search websites so multiple addresses Associates their family members the maybe an an email address and stuff in my personal experience I've always found more information online ENT freely available stuff than with these paid data Brokers because they're way behind uh everything else the only information I would say sometimes they find better is Utilities information so because they do tap into actual utility companies like your gas and electric and water and stuff and buy information from them so that information may not have ended up on the free online tools yet but they will have access to it but that's pretty much the only thing they will almost never have better email addresses or breach data or social media um links and stuff so if you know you you pick and choose um but this is why a lot of the old school investigators or pis are lagging behind because ENT techniques like this are Way Beyond any paid search uh tools and I say this and I have access to at least five of the major paid data Brokers and I don't use them a lot it's like most commercial tools where they're more about making analysis easier than they are about the data itself it's about a product you know it's like saying who built the fastest car well it was probably some dude in a shed but would you drive it maybe not yeah talking about the Tesla right it'll it'll be the fastest for the rest of your life it's not going fast that kills you it's immediately becoming that's right immediate stop yeah the attraction with those tools is one click and you get a whole report and the report is like 40 pages long and it's full of junk the time it takes you to sift through 40 pages and delete you know 39 of them um you you're better off doing ENT very good all right so moving on through here friend of the show an amazing human white cyberduck uh question does the Instagram API work against private profiles it does it works for both private and business profiles business profiles tend to give you a lot more information like the profile I used of Bob or boob now that I know is H was a business profile so it gave you more info but um I've used it on a lot of private profiles it's hit or miss so what you do get on private profiles is redacted information like it'll be like a star starstar gmail.com so at least you know they have an email on this platform and not proton and and and whatnot so yeah it does again it's hit or miss you don't control that information it depends on your your profile settings as well so I still use it and you know just take what I can get from it all right um so the next question here I what's going on with my mic because yeah I'm picking it up ran I don't know if I'm just not talking in right anyway uh the next question here is from can't never could and again I love that username how do you go about vetting some of the ENT resources such as that website that's them.com Comon man I I run into those same problems like you find something and you look and it's a very similar domain and they've grouped it all together but then you look it's like that's not even the same company so H how do you go about getting your sources so again it's hard to vet these public websites because a lot of them will be around for like a year and then they won't exist I have a long uh list um of bookmarked websites nicely categorized under phone number and email and social media and stuff like that and I am constantly deleting them adding new ones um because they're not vetted and I want to emphasize this a lot of that information is just not true you'll find like I search myself all the time on these websites and that's like my ultimate test and I see completely false information about me on it and I'm like good Let It Be I'm not going to redact it this is like to throw people off or whatever but I'm like how did they get that information and sometimes I have a good idea because there's people with you know the same name as myself or the same address or something similar to me and they kind of mix and mingle that information together because you have to know how they collect it they're using algorithms and um large techniques to kind of mix that information together there's no human sitting next to it and verifying it so that algorithm gets confused a lot of the times and it just mixes that info together and that's why I said due diligence you have to look at at least 10 15 20 different uh people data websites and then come up with your own conclusion and say this is what I found based on this here's the outliers which gave me completely wrong information and then you start verifying it based on either apis or government records or other things that you may know on social media and whatnot so verification is probably 50% of the process yeah you're you're talking about real like intelligence provenance where it's if I can verify this five different places and only one outlier maybe we're 80% sure kind of thing so right yeah yeah um we have got a ton of questions but we are one minute away from ending I want to be Co cogniz everyone's time if you have to drop off please join us over in Discord uh Michelle will you be able to jump over in that Discord a little uh later and kind of check out the comments and respond awesome uh and then can you stick around for just a five minutes we've got maybe like five or six more questions I'd like to I can stick around for at least half an hour more awesome so for those of you who have to drop off it is one o00 get back to work securing everything and hacking all the Gibsons uh for the rest of you who can stay on for more Q&A uh thanks we've got almost 900 of you that are sticking around for Q&A so obviously people are very interested um so I'm going to jump to a question that as I'm going through these uh it actually answers a bunch of them and I apologize everyone we are not going to be able to get to all the questions here I was tracking questions to ask at the end came back to the Q&A and you had dumped 59 new questions in here so I'm just pulling out the ones that I think uh will be able to get to that said um let's take a look here uh did you get this one okay so techie B says uh he was asking a qu question to me but techy B says when finding the pii can it be requested to be removed or taken care of in cases like public records so yeah not all so if you have um like for for public records like court records if it has something to do with you know children or child custody or whatever yeah you can have you can request them to remove it for the safety of a minor and stuff like that if it's yourself you have to give the judge a reason on why you need your social security offline I'm like seriously so it's it's it's very difficult I'll be honest I've tried it with some clients and stuff and you literally need a court hearing for that and kind of present your case and say hey I'm a victim of doing and people are you know calling me sending me pizzas whatever at my doorstep and impersonating me with my Social Security once you present your case the judge will say yeah okay fine we'll redact it so a lot of the times when I do search public records I do find that information has been removed so I know it's possible I look at documents court records and it says this document this docx file or PDF was removed by the judge so it'll have a little comment on it and these are mostly people with a lot of money celebrities you know CEOs and stuff like that who have time to hire a lawyer and do it so it is hard so my policy around it is never get that information uh in the in the system so that you don't have to remove it I know it's easier said than done but that's where my privacy side kicks in and say anytime someone someone asks you for let's say ID I never show them my driver's license because driver's license is meant for driving because a driver's license has your at home address written on it and they will take a picture of it it'll go in public record or whatever uh show them something else like uh a passport card or um I use uh the global entry card which is still a government um um issued ID this way they don't note down my address on it and then when they ask you for your address give a random address that does not exist or PO box or you you UPS address so those are ways not to get information in public record but that's um discussion for a whole different day yeah you have a separate talk about that which was one of my faves like the one the part about you teaching your kids to lie to people when they ask for private information is one of my favorite things you're just like okay it's okay to lie in certain scenarios right right all right so let's uh keep moving through these uh let's see what are we on to um I forgive me I'm going to pronounce your name in a way that a friend who had a similar name uh introduced s so Oni uh asked a question can we also use emails with the password hash on reverse search is there a tool for that emails with a password hash for so you mean to use the password hash as a reverse search I think that's what they're asking I've only got what they've got in front of me yeah so if that's what you mean to use the password hash to search records yes absolutely because most most data breaches will have the hashes um actually they'll only have hashes and um you know someone like Corey or whoever will take that data and you know dehash it or go through some hashing like hash cat or Jack the Ripper and stuff and try to um you know reverse those hashes and put the actual password in there this is why some of the data breaches don't have passwords like uh some passwords will be missing some will be there because they weren't able to um dehash all of them so the hash is always there whether it's md5 or shaan or bcrypt so bcrypt you can't but if it's a simple hash like shaan or md5 um yeah and that's a technique I use all the time there's actually websites that will store all these hashes I think hashes dorg was one of them a famous one where you just put in the password hash in there and it'll show you uh you know if it had already cracked and you can search data breaches as well based on just the hash uh sometimes you'll find more records than just um uh searching the actual password so yeah that's a good technique okay and and for those still listening I have captured as many questions as we can in a separate note so if your question didn't get answered in Q&A or in Discord um please jump back into Discord after we end the webinar Michelle's going to hang out for a little bit and uh you know try and answer your questions so nothing against you we've just got a pile of them so uh an anonymous in attendee asked most of this is us-based how much Works in different countries yeah so he's right a lot of this is us-based because us privacy laws suck um that's how I'll put it in plain and simple terms uh I mean I travel International all the time um I've I've done ENT and intelligence work in many many different countries and they're right um public data and information is not that freely available in those countries especially utility information people search websites don't show a lot of info either because they take it from these paid sources as well the only piece of data I would say is common across the board are breaches because breaches don't care about geography and they just care about online presence so that is probably your number one source of intelligence for international use and social media so those two work very well uh everything else that's probably you know vetted government information doesn't work AP still work uh like you know GitHub or or social media apis and stuff but yeah it is a limitation but it's also a good challenge to have nice okay um I love this question because it's actually not technically related to ENT but boy oh boy internally we uh have a phrase It's report as you go report as you go report as you go report as you go as you're capturing things so Spence Hutchinson how do you organize your notes any particular tools you use yeah so I I use probably three different techniques to kind of organize my notes one one is just a raw dump as I'm going along I need speed speed is key in all of this you cannot slow down and you can go into rabbit holes so for Speed I just dump you know pieces of information in a notepad so just a text based uh stuff and I just start dumping it in because I'm going to start deleting it very soon so I'm not very organized when I start off but as soon as I start seeing patterns then I start I have another window open with a doc file which is my final production ready um report and then I start injecting uh information in the right places so I'll have like a you know a place for basic information a place for breach information as soon as I see the breach information I'll put it in the breach section then I'll jump onto something else and put it there so I'm jumping all over the place this is just how my mind works when it's working fast uh but I'm also not missing any information as soon as I find something I'll inject it in the right place uh in the doc file and uh I'll keep a mind map for me that is the most important piece of uh information that one screenshot where I showed with joho in the center and all those lines going across I use xmind for that I found that to be a very nice tool so XM I'll just start putting in information there so this way every now and then when I go into rabbit holes or trying to and I'm drifting away from my source of information I look at the Mind map and say yeah this is related because of this this and this so let's go back to the the core part of the investigation not go too far out so that's how I'll do it I'll have multiple windows open and I'll have focused time to do all of this so that I I'm not distracted because as it is that information is overwhelming yeah I know um I want to add one more one more note on that which I think kind of summarizes exactly what you said the the note taking system that works best is the one that works best for you so if you're a one notee person cool if you use uh was it Google Vault great well Cory's not on one note person um but whatever it is you use whatever works best for you and you're comfortable and moving fast in which is kind of the key thing that he mentioned there so just use something that has a format you can export to any other tool which is like 80% of them other than one note yes one note getting the date out is impossible but like every other tool use is markdown so right yeah uh good call out actually yeah there's a question I'll I'll take the last question about upack let me just answer that since we're talking about do I use strict opsc um in case something Le leads back to you absolutely I am always on a VPN and I'm always switching my VPN around so that there's no correlation to that one IP address I'm always on browser containers so I have a container for investigations I have a container for like 10 other things different sock puppet profiles that I've created so every social media account I have has not one multiple sock puppet accounts cuz again I don't want one sock puppet to lead to 10 different targets that I'm searching so I'll keep switching up sock puppet accounts that's a different guesse that they keep getting banned but I keep creating new ones uh so that's a cat Mouse battle but yes so sock puppets uh browser containers I changed my browser um agents randomly as well sometimes that breaks stuff so I switch it back so yeah it is a little bit of um there's a little bit of friction when I do stuff like that but it works sometimes I'll use a VM so I use the K Linux VM for a lot of uh the the things and yeah so obsc for me is number one uh it's there's a rare chance that I'll get in trouble you know quote unquote because all the work I do is legit it's legal um I'm not hacking I'm not doing black hat stuff but still I don't want to be caught in the wrong place with my hands in the cookie jar um when law comes in the way um they don't look at these things they don't look at intention uh they just look at the facts are like oh it came from your IP address and this website and blah blah blah you're arrested you're guilty until proven innocent I don't want to be in that position I've seen way too many people fall in that trap so yeah upsc for me is topnotch and a lot of people fail at that so I would advise make sure you're you're using all these tools for opsac you know otherwise um you could um land in some trouble yeah and definitely don't trust whatever you know whatever ENT tool you found on the dark web might not be the best one run on your workstation like unless you got it from Cory then you got it from me then it's fine but otherwise you know don't trust what you see in telegram group chats Etc oh man if you go to my Twitter my last tweet and or X or Z or X ormen or whatever um you'll see me messing with one of those telegram Bots dming people anyway um I do want to add one other little Pro tip on that and I want to see if you agree with it uh Michelle when you're setting up sock accounts for all the folks that are in the Discord chat right now that said hey it sounds like I need to set up more sock accounts um if you want to rapidly grow that sock accounts LinkedIn Network to see more profiles uh reach out to and connect to every recruiter you can find uh they will immediately accept they will respond back and ask what you're asking for and then those recruiters have thousands of connections and now suddenly you're a first or second connection another tip I would recommend on sock puppet accounts is to go to a really good school a big school um because a lot of the you know colleges like almost on my on most my sock puppets they went to big fancy schools and there's no way of vetting it and they have students from those schools that work at almost every large company or large firm so you know that's another easy way to uh get first level connections with most to build on what you said Corey my my motto is for sock butet you need to be the hay in the hay stack you don't want to be the needle in the hay stack you don't want to stand out you need to be the H stack you don't want to be found um all right and we had another question here that I'm just going to cover real quick here because uh someone asked what were the results of the poll uh the results of the poll with uh seven with 100% answered or I'm sorry forgive me uh 785 of 86 so 96% of you uh 67% said we want an ENT conference but Corey I think you're right I think it's a little biased uh moving on we're gonna run it again it's happening I mean the Paul says we have data yeah we have data uh Justin Wilson I love jumping into this because you were talking about things that you do as Lego Justin Wilson what are some of the job roles that Leverage osen What what are some things that they can go get a job as using it yeah there are quite a few roles so um obviously the the the ones that stand out are investigators or threat intelligence people in cyber security but there's also journalism a lot of journalists use ENT their lives depend on it and in fact fact um I've seen a lot of courses advertised for journalists only um marketing people need osen because they're constantly reaching out to people collecting information and they have access to all these databases like Zoom info and stuff and they have paid subscriptions to them so they get a lot of information they need to learn how to vet that information out as well so there's quite a few of those out there they don't know it's ENT they don't call it ENT all of them but um that's where you can use uh such information awesome um yeah if you're interested in that journalism pieces as well I'd suggest you go join the Belling cat Discord there's a lot of cool stuff going on in there for anyone listening um okay uh next we've only got like four more questions thank you for sticking on I was trying to keep this to about 15 minutes but people are really loving this we've got 625 still hanging on so uh Anonymous attend yes uh have you heard about rooch Che for quote lookups and I haven't have you okay fair don't think I have no great 10 out of 10 yeah uh Pete is that dis figgies I hope I'm saying that right how much weight does goip really account for anymore since most are now running VPN well I wouldn't say most people are running vpns um most people are probably not running vpns but the first half of the question yeah I agree there's not much weight given to um IP addresses because they change you your home IP address changes a lot and also I've noticed that the correlation between the IP address and the actual location is a rough estimate it's it's a database that's out there and once the ISP changes your IP address to something else they'll reuse that IP address to for a different country for a different city sometimes but that database won't be updated it'll say oh this IP address is in New York but you look at five different um lookups for IP addresses like IPL location.com or IP address.com or Max mine or whatever and I do all of those and that's where I do my due diligence I look at five six different versions of um IP address lookups and I usually get you know 90% of it is the same data but one will be like something else a different location completely different one so yeah what does that really prove not much you know it kind of validates some of your location based uh estimates when you're trying to um pinpoint um a Target but for law enforcement it can give a lot more it can you know um it can give them the ability to issue a subpoena to get subscriber information for a certain date certain time and that's how they kind of uh dig information but a better way would be so that IP address information that's online may not be true in a breach it's usually pretty solid so that when the breach happened you were using this IP address so that's a pretty good source of Truth uh for pent testers we know to send um Canary tokens to a person and we can just send them that open a doc file with a canary token in it and that'll give their live IP address of where they are but that's not ENT anymore so sure no that becomes active at that point so uh John's got some great stories about working with law enforcement to do that to uncover folks so um check out some of his talks for that um let's take a look here uh last couple questions last three questions uh Anonymous attendee any thoughts on delete me the delete me server yeah I've used it it's not that great um delete me has good resources good articles on how to remove yourself from the internet some of them work some of them are outdated and it's a very small subset of stuff that you can use it's basically just the surface area stuff uh all the people search websites um a better tool is the one I created uh operation privacy.com uh it has all the things an investigator would look at so all the things I would delete someone off the internet from so I'll go through that tool it's it's a free tool it's a it's a dashboard basically you don't have to give any information in it it's a collection of all the places where you can delete yourself so it's delete me 10 times more and it has opsac tips in it as well so one other reason I wouldn't use these online services is because you have to provide them information first and then they'll take that information and then delete it but they're storing that information somewhere what if they get hacked I don't want to give my information to someone when I'm trying to actively remove it so I don't trust most of these companies and delete me type services are very large companies with a lot of funding you think they're just going to take your data and do nothing with it um I don't and the other sad not to be a Debbie Downer but the sad thing is companies don't really delete things at the end of the day um you know Facebook might or meta might say they deleted you but there chances are that your data is still somewhere um we've seen multiple data breaches we've seen data breaches where like they the site is breached five years after and people will find records that were deleted three years before the breach or something like that there's many examples of this or try this delete your Google account go inside and say permanently deleted like 30 days later there's no way you can retrieve it we've permanently deleted your Google email address and stuff then after a month or two or even after a year try to create the same Google account with that same username you won't be able to they'll be like uh this user you can't create a user exists so they're keeping that information somewhere at least the email address God knows what else cuz that's private information yeah all right uh I think that also answers the next question from osmo would you please post Michael's uh and they put Michael I think they mean Michelle uh Michelle's website I think that's probably the one that they meant your uh your o your operation privacy is there another website you'd like to steer them to that's that's yours me if you want to or send me my single source SCE of Truth is Michal khan.com or m. us both domains lead to the same and there I mention all the other websites and a brief um you know some videos about me as well so don't need to end me just go to my website I'm pulling that up myself right now all right so if somebody could get that into the oh uh yeah if somebody could get that into the chat that would be great um also then this seems Daniel says this is very similar to opposition research Oppo have you ever conducted Oppo yeah so if they mean the the term yeah competitive research or opposition research then yeah uh it is that's another field that does ent but really doesn't call it ENT um but yeah I've I'm asked to do that every now and then for companies who reach out to me and say Here's a competitor we need you know uh competitive analysis and this is like the corporate o this is not personal no and we need to know everything about a company their history who they work with who their partners are and that's more intelligence about them so that they can make better informed decisions before they get into a contract with that company so yeah that's another side of ENT all right last question I save this one for last because I think it's a great one to end on so for those of you who stuck around the 587 of you that stuck around for an extra 20 minutes thank you uh we we're thrilled that you love this and we really hope that you check out more content from Michelle especially the training class coming up at Wild West hackin Fest the last question from Anonymous attendee this may seem dumb there's no dumb questions that's why we're doing a webcast but this may seem dumb how did you get started in all this ENT stuff did you read a book how how what is your origin story great question um I got started in this at the dawn of the internet now so when the internet first came out when I was in college um 20 plus years ago um in high school and and then College the internet was very new and they had a lot of information in it uh that wasn't restricted in in any way um so that's when I started these techniques some of the techniques I still use today I discovered over 20 years ago on how to extract information from social media or apis and stuff and it was quite open back then especially the metadata analysis of images and stuff almost every website had metadata in it now almost no website does so I started off with helping people out so my intentions were never malicious it was always hey I got hacked or somebody did this or someone's talking me and here's an email address or somebody gave me a call with this number can you find him and I'm like yeah I have some it skills back then it wasn't really cyber skills so I'm like yeah let me dig into it the more I dug into it I I saw how easy it is to get information around people and create this entire dossier around my Target and it it was just addictive and fun from then on and I was known as that person in my Social Circle or Community who could get you the information you wanted basically so I'm like I didn't consider it hacking or ENT or cyber at that point I was just using my it skills for good it's just something you started doing isn't that always the path into security though I just kind of fell into it by doing this thing um so yeah so again for the 573 of you that are still on thank you for hanging out we're seeing the comments here and you're loving it and hopefully we'll get you back on Michelle do another webcast soon obviously you got your training coming up so there's no shortage of being able to get Michelle uh and and really pick their brain um Michelle you said you're gonna hang out over in Discord for a little bit correct I will yeah excellent so if you're watching us in zoom and you haven't uh you had a question that didn't get answered please jump over into Discord discord.gg antiphon we're on the webcast live stream channel and uh Michelle will hang out for a little bit longer so you can chat with them and ask questions but I think we've taken enough of everyone's time who isn't a DI hard here for the 5 now 42 of you thank you for hanging out we do webcasts on uh on Wednesdays and Thursdays every week so make sure that you sign up uh to our email list to get notifications about that or just check us out on socials where we publish that as well um I think that's about enough so from myself Ian Meyer uh Ryan Megan Velda Brian uh Corey and of course Michelle thank you for joining us today on another antiphon anti- cast we hope to see you on another one and in one of our training classes Ryan my pleasure with fire bye everyone bye take care
Info
Channel: Antisyphon Training
Views: 4,783
Rating: undefined out of 5
Keywords:
Id: e-WXHFb7c3k
Channel Id: undefined
Length: 84min 42sec (5082 seconds)
Published: Thu Jul 27 2023
Related Videos
Note
Please note that this website is currently a work in progress! Lots of interesting data and statistics to come.