We value your privacy. We use cookies to enhance your browsing experience, serve personalized content, and analyze our traffic. By clicking "Accept", you consent to our use of cookies. Read More
In this blog post, I will be introducing online resources that can be used to investigate Phishing sites. In Collecting the Phishing Samples, I will cover how Phishing samples can be collected from online databases. In Domain/IP/URL Analysis, I will be covering how the domains, IPs, and URLs can be analyzed using online services and WHOIS information. In Sandbox Analysis, I will be covering how on
OSINTã¨ã¯ OSINT (Open-Source Intelligence) ã¨ã¯ãã¤ã³ã¿ã¼ãããä¸ã«å ¬ã«ã¢ã¯ã»ã¹å¯è½ãªæ å ±ãåéã»åæãããã¨ãæãã¾ãããµã¤ãã¼ã»ãã¥ãªãã£ã®åéã§ã¯ç¹ã«éè¦ãªå½¹å²ãæ ããæ å ±åéããè å¨ã®è©ä¾¡ã»å¯¾çã¾ã§ã®æ¥åããµãã¼ããã¾ããç¹ã«ãLinuxã³ãã³ããGoogleæ¤ç´¢ã使ã£ãæ å ±åéã¯OSINTã«ããã¦éè¦ãªææ³ã®ã²ã¨ã¤ã§ãã LangChainã¨ã¯ langchainã¯ãLLMã¨å¤é¨ãªã½ã¼ã¹ï¼ãã¼ã¿ã½ã¼ã¹ãè¨èªå¦çç³»çï¼ãçµã¿åãããã¢ããªã±ã¼ã·ã§ã³ã®éçºæ¯æ´ãç®çã¨ãã¦Harrison ChaseãããéçºããPythonã©ã¤ãã©ãªã§ããlangchainã使ããã¨ã§ãOSINTã«ããã¦äººéãæä½æ¥ã§è¡ãã¿ã¹ã¯ãèªååãããã¨ãã§ãã¾ãã ä¾ãã°ããµã¤ãã¼è å¨ã«é¢é£ããæ å ±ãåéãããå ´åãlangchainã使ã£ã¦èªç¶è¨èªããLinuxã³ãã³
ãªãªã¼ã¹ãé害æ å ±ãªã©ã®ãµã¼ãã¹ã®ãç¥ãã
ææ°ã®äººæ°ã¨ã³ããªã¼ã®é ä¿¡
å¦çãå®è¡ä¸ã§ã
j次ã®ããã¯ãã¼ã¯
kåã®ããã¯ãã¼ã¯
lãã¨ã§èªã
eã³ã¡ã³ãä¸è¦§ãéã
oãã¼ã¸ãéã
{{#tags}}- {{label}}
{{/tags}}