![]() It is also often a matter of identifying the connections between websites, finding users/owners of domains and IP addresses, and other similar topics. For example, for email addresses and social network profiles, I need to identify the possible “real” person behind them. The focus of my investigations is “corporate investigations”. ![]() In this post, I will introduce the most important “OSINT” Maltego transformations. Last but not least, there is the possibility to write or install your own local transformations. From free-to-use transformations to expensive enterprise solutions, everything is available. The range of professional transformations in Maltego’s “Transform Hub” is therefore just as diverse. But which Maltego transforms do they use?Īlmost all users carry out “OSINT” investigations, but they have different perspectives and needs. For example, threat intelligence teams, analysts at the SOC, incident response teams, investigators, cyber investigators, prosecutors, and many others. It is a very versatile tool for a range of very different users. In my experience, Maltego is an important and useful addition to other OSINT investigation tools and methods. How to optimize Maltego for OSINT Investigations with Maltego Transforms
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |