Perform Browser OSINT with the Mitaka Extension [Tutorial]
Earn $$. Learn What You Need to Get Certified (90% Off): https://nulb.app/cwlshop
How to Investigate Emails, URLs, Files & More in Your Browser
Full Tutorial: https://nulb.app/x51lh
Subscribe to Null Byte: https://goo.gl/J6wEnH
Kody's Twitter: https://twitter.com/KodyKinzie
Cyber Weapons Lab, Episode 188
Gathering OSINT information is always easier with browser extensions, and Mitaka is a browser extension with OSINT investigations in mind. In this episode of Cyber Weapons Lab, we'll explore the features and how to conduct an investigation using only a browser. We'll find out if an email address is linked to malware or phishing, if a file is safe to download, and and if a website is sketchy or reputable.
To learn more, check out the article: https://nulb.app/x51lh
Follow Null Byte on:
Twitter: https://twitter.com/nullbyte
Flipboard: https://flip.it/3.Gf_0
Website: https://null-byte.com
Weekly newsletter: https://eepurl.com/dE3Ovb
Vimeo: https://vimeo.com/channels/nullbyte
Видео Perform Browser OSINT with the Mitaka Extension [Tutorial] канала Null Byte
How to Investigate Emails, URLs, Files & More in Your Browser
Full Tutorial: https://nulb.app/x51lh
Subscribe to Null Byte: https://goo.gl/J6wEnH
Kody's Twitter: https://twitter.com/KodyKinzie
Cyber Weapons Lab, Episode 188
Gathering OSINT information is always easier with browser extensions, and Mitaka is a browser extension with OSINT investigations in mind. In this episode of Cyber Weapons Lab, we'll explore the features and how to conduct an investigation using only a browser. We'll find out if an email address is linked to malware or phishing, if a file is safe to download, and and if a website is sketchy or reputable.
To learn more, check out the article: https://nulb.app/x51lh
Follow Null Byte on:
Twitter: https://twitter.com/nullbyte
Flipboard: https://flip.it/3.Gf_0
Website: https://null-byte.com
Weekly newsletter: https://eepurl.com/dE3Ovb
Vimeo: https://vimeo.com/channels/nullbyte
Видео Perform Browser OSINT with the Mitaka Extension [Tutorial] канала Null Byte
Показать
Комментарии отсутствуют
Информация о видео
Другие видео канала
![Encrypt your Private Text, Photo & Archive Files with EncryptPad [Tutorial]](https://i.ytimg.com/vi/JK-RC0OjcZs/default.jpg)
![Set Up Aliasing in Your Mac's Bash Profile for Easier Wi-Fi Packet Captures [Tutorial]](https://i.ytimg.com/vi/l5SXMdxFLy4/default.jpg)
![Bypass VPNs to Track a Mac with Arduino [Tutorial]](https://i.ytimg.com/vi/BmUNKG45jlU/default.jpg)
![Monitor Live Twitter Discussions with Maltego for Disinformation Attacks [Tutorial]](https://i.ytimg.com/vi/wQV8QZLRO3U/default.jpg)
![Spy on Network Relationships with Airgraph-ng [Tutorial]](https://i.ytimg.com/vi/noCaFsvgRX0/default.jpg)
![Share Files & Chat Privately Offline with a Raspberry Pi PirateBox [Tutorial]](https://i.ytimg.com/vi/3sYP19Ts48w/default.jpg)
![Watch Hackers Demonstrate Windows Exploits & Privilege Escalation (ft. Kilian from SecurityFWD)](https://i.ytimg.com/vi/8IiE9NfN6mk/default.jpg)
![Build a Pumpkin Pi — A Rogue AP & MitM Framework That Fits in Your Pocket [Tutorial]](https://i.ytimg.com/vi/tIM-kdmKhnE/default.jpg)
![Update: New YouTube Policy & Exciting Episodes to Come!](https://i.ytimg.com/vi/WkI1NZXs0os/default.jpg)
![Set Up a Vulnerable Target Computer with DV-Pi (Damn Vulnerable Pi) [Tutorial]](https://i.ytimg.com/vi/fKOX4InkaGc/default.jpg)
![Track a Target Using Canary Token Tracking Links [Tutorial]](https://i.ytimg.com/vi/FNiBNdM7srE/default.jpg)
![Null Byte's First Q&A Livestream with Kody & Michael](https://i.ytimg.com/vi/Cgvc_7EPa-w/default.jpg)
![Track Devices via Probe Frames with Probequest [Tutorial]](https://i.ytimg.com/vi/Z8RHMUSYTiA/default.jpg)
![Watch Hackers Demonstrate a Ransomware Attack (ft. Kilian from SecurityFWD)](https://i.ytimg.com/vi/GQ-PFluWxYE/default.jpg)
![Intercept Packets with Sniffglue Without Opening Yourself Up to Zero-Days [Tutorial]](https://i.ytimg.com/vi/MtU0X0ZpR5k/default.jpg)
![Explore & Map Nearby Wireless Networks with WiGLE [Tutorial]](https://i.ytimg.com/vi/wBl7HM6a4Wo/default.jpg)
![Create Rogue APs with MicroPython on an ESP8266 Board [Tutorial]](https://i.ytimg.com/vi/OIa3BkYiQ7U/default.jpg)
![Find Employee Accounts with Password Breaches Using Maltego [Tutorial]](https://i.ytimg.com/vi/VExg83LzZ1Q/default.jpg)
![Analyze Wi-Fi Data with Jupyter Notebook [Tutorial]](https://i.ytimg.com/vi/93ABfKsHd5I/default.jpg)
![Use Nmap for Tactical Network Reconnaissance [Tutorial]](https://i.ytimg.com/vi/ltEFbi_I2KY/default.jpg)