Ryan Benson (@_ryanbenson) 's Twitter Profile
Ryan Benson

@_ryanbenson

I do digital forensics and work on open source DFIR tools @Google. I kinda like web browsers, too. Not on Twitter often anymore, reach me at ryan 'at' dfir.blog

ID: 30110948

linkhttps://dfir.blog calendar_today10-04-2009 00:40:53

1,1K Tweet

4,4K Followers

267 Following

unfurl🌿 (@unfurl_link) 's Twitter Profile Photo

Hi #OSINTSummit folks! 👋 Unfurl is a free, open source tool that you can use to "expand" complicated URLs and find interesting things inside them, like: 🕓 timestamps 🗜️ compressed strings 🔎 search params 🔀 shortlinks Check it out at unfurl.link! #DFIR #OSINT

Jamie Dicken (@jamie_dicken) 's Twitter Profile Photo

<Thread> Today on the way to school, I accidentally deep-dived on threat modeling, attacker math, risk acceptance, password management, and ethics with my kids (6 and 4 years old). 6YO started with a simple question: how do we prevent our car from getting stolen? 1/x

Chris Sanders 🔎 🧠 (@chrissanders88) 's Twitter Profile Photo

For analysts, a few questions related to web browser-forensics... First, how often do you reach for web browser-related forensic evidence in the investigations you work?

Ryan Benson (@_ryanbenson) 's Twitter Profile Photo

On browser forensics in #DFIR: In news.sophos.com/en-us/2022/04/…, just from the URL we can see the attackers installed Chrome the week of 2021-11-01. So much interesting stuff in URLs! Unfurl 🔗: dfir.blog/unfurl/?url=hX… h/t Phill Moore for the article and lots of nice Google research

On browser forensics in #DFIR:

In news.sophos.com/en-us/2022/04/…, just from the URL we can see the attackers installed Chrome the week of 2021-11-01. So much interesting stuff in URLs!

Unfurl 🔗: dfir.blog/unfurl/?url=hX…

h/t <a href="/phillmoore/">Phill Moore</a> for the article and lots of nice Google research
Daily OSINT (@dailyosint) 's Twitter Profile Photo

If you need to pull out all the data in complicated URLs, Try the excellent Unfurl tool to extract and visualize each bit in the URLs. dfir.blog/unfurl/ github.com/obsidianforens… Ryan Benson #OSINT #DFIR #BlueTeam #ThreatIntel #intelligence #ThreatHunting #infosec

If you need to pull out all the data in complicated URLs,

Try the excellent Unfurl tool to extract and visualize each bit in the URLs.

dfir.blog/unfurl/

github.com/obsidianforens…

<a href="/_RyanBenson/">Ryan Benson</a>

#OSINT #DFIR #BlueTeam #ThreatIntel #intelligence #ThreatHunting #infosec
Ryan Benson (@_ryanbenson) 's Twitter Profile Photo

IP address in the URL? Sure, why not. You never know what you'll find in a URL (until you look 👀). 🔗dfir.blog/unfurl/?url=ht… #DFIR #OSINT

IP address in the URL? Sure, why not. 

You never know what you'll find in a URL (until you look 👀).

🔗dfir.blog/unfurl/?url=ht…

#DFIR #OSINT
Micah (@webbreacher) 's Twitter Profile Photo

Have a long URL to decode? Use dfir.blog/unfurl/. It decodes parameters & values in the URL. Ex: I used Amazon & ran a search, copied URL, pasted into Unfurl. It broke the URL down & revealed "qid" param (2) is a time stamp and a date (3). #osint #cyber #tools

Have a long URL to decode? Use dfir.blog/unfurl/. It decodes parameters &amp; values in the URL. Ex: I used Amazon &amp; ran a search, copied URL, pasted into Unfurl. It broke the URL down &amp; revealed "qid" param (2) is a time stamp and a date (3).

#osint #cyber #tools
Ryan Benson (@_ryanbenson) 's Twitter Profile Photo

Apparently TikTok uses the same ID scheme for job postings as it does for videos? Random, but kind of interesting.🤷‍♂️ Example: dfir.blog/unfurl/?url=ht… More info on TikTok timestamps: dfir.blog/tinkering-with… #DFIR #TikTok #OSINT

Apparently TikTok uses the same ID scheme for job postings as it does for videos? Random, but kind of interesting.🤷‍♂️

Example: dfir.blog/unfurl/?url=ht…

More info on TikTok timestamps: dfir.blog/tinkering-with…

#DFIR #TikTok #OSINT
Ryan Benson (@_ryanbenson) 's Twitter Profile Photo

Nice little tidbit here about decoding #LinkedIn profile ids from URLs, then using their sequential nature to estimate profile creation time. I see an unfurl🌿 update in the future! #DFIR #OSINT

Chris Sanders 🔎 🧠 (@chrissanders88) 's Twitter Profile Photo

A key mindset to grasp as you transition from junior analyst to a more experienced level is that you won't have all the answers, but you can ask the right questions and know where to start looking for the answers.

Alexandre Dulaunoy @adulau@infosec.exchange (@adulau) 's Twitter Profile Photo

We are reviewing our MISP (@[email protected]) warning lists and we are looking for a maintained list of hosts which are domain parking. Do you know someone doing such thing? or should we start to build one from scratch? #threatintelligence

Ryan Benson (@_ryanbenson) 's Twitter Profile Photo

With all the uncertainty @Twitter, I've seen more people talking about alternatives like #Mastodon. Like tweets, Mastodon IDs have embedded timestamps in them, and Unfurl can parse them: 🔗dfir.blog/unfurl/?url=ht… #DFIR #OSINT

With all the uncertainty @Twitter, I've seen more people talking about alternatives like #Mastodon. 

Like tweets, Mastodon IDs have embedded timestamps in them, and Unfurl can parse them:
🔗dfir.blog/unfurl/?url=ht…

#DFIR #OSINT
Ryan Benson (@_ryanbenson) 's Twitter Profile Photo

There's a new Unfurl release! v2022.11 adds: 🔹Parsing #Twitter "s" values - all 71 of them! 🔹Timestamps from #Mastodon IDs 🔹Decoding #LinkedIn identifiers 🔹Expanding #Substack redirect links 🔹Parsing common tracking parameters Blog: dfir.blog/unfurl-parsing… #DFIR #OSINT