Pular para o conteúdo principal

Whatsapp 47 988618255

Compartilhe

RT : Anatomia do phishing: Como identificar um e-mail falso

Anatomia do phishing: Como identificar um e-mail falso Por  Jaqueline Sousa  • Editado por  Jones Oliveira  |  07/12/2025 às 18:00 Compartilhe: Seu resumo inteligente do mundo tech! Assine a newsletter do Canaltech e receba notícias e reviews sobre tecnologia em primeira mão. E-mail inscreva-se Confirmo que li, aceito e concordo com os  Termos de Uso e Política de Privacidade do Canaltech. Reprodução/Crypto ID A arte de enganar usuários para coletar dados sensíveis, como senhas e informações bancárias, tem um nome para chamar de seu:  phishing . O que é phishing e como se proteger? Smishing e Vishing: o phishing que chega por SMS e ligação de voz Identificado originalmente na época da internet discada, lá nos anos 1990, esse tipo de ataque digital se fortaleceu ao longo das últimas décadas graças aos  avanços tecnológicos , como a popularidade de ferramentas de inteligência artificial (IA), por exemplo, mas sua essência sempre permaneceu a mesma. ...

Ferramenta de Recolha OSINT: Inquisidor


OSINT Gathering Tool


Inquisitor is a simple for gathering information on companies and organizations through the use of Open Source Intelligence (OSINT) sources. The key features of Inquisitor include:
  1. The ability to cascade the ownership label of an asset (e.g. if a Registrant Name is known to belong to the target organization, then the hosts and networks registered with that name shall be marked as belonging to the target organization)
  2. The ability transform assets into other potentially related assets through querying open sources such as Google and Shodan
  3. The ability to visualize the relationships of those assets through a zoomable pack layout
It is heavily inspired from how Maltego operates, except in this tool, all transforms are performed automatically.



Concept

     The whole concept of Inquisitor revolves around the idea of extracting information from open sources based on what is already known about a target organization. In the context of Inquisitor these are called “transforms”. Related information may also be immediately retrieved from an known asset based on metadata also retrievable from open sources such as whois and internet registries.

Installation

To install Inquisitor, simply clone the repository, enter it, and execute the installation script.
pip install Cython click
git clone git@github.com:penafieljlm/inquisitor.git
cd inquisitor
python setup.py install

Usage

Inquisitor has five basic commands which include scanstatusclassifydump, and visualize.
usage: inq [-h] {scan,status,classify,dump,visualize} ...

optional arguments:
  -h, --help            show this help message and exit

command:
  {scan,status,classify,dump,visualize}
                        The action to perform.
    scan                Search OSINT sources for intelligence based on known
                        assets belonging to the target.
    status              Prints out the current status of the specified
                        intelligence database.
    classify            Classifies an existing asset as either belonging or
                        not belonging to the target. Adds a new asset with the
                        specified classification if none is present.
    dump                Dumps the contents of the database into a JSON file
    visualize           Create a D3.js visualization based on the contents of
                        the specified intelligence database.

OSINT Gathering Tool: Inquisitor Download


RATE HERE
Ease Of Use
70%
Features
66%
Value
24%
Overall Rating
35%

Comentários

Como usar um Agente OSINT IA

Pericia Digital

Ebook

OSINT NEWS NO X

Postagens mais visitadas