News Feed
  • DrugHub has agreed to fully refund all users who lost money in the SuperMarket exit scam.  
  • Retro Market has gone offline. Circumstances of the closure unknown.  
  • SuperMarket has closed following an exit scam by one of the admins.  
  • The admin of Incognito Market, Pharoah, has been arrested by the FBI several months after exit scamming.  
  • Silk RoadTorhoo mini logo
  • darknet markets list
  • Popular P2P exchange LocalMonero has announced it is closing.  

Study Thy Enemy : OpSec | Torhoo darknet markets

https://www.forensicfocus.com/

This is a forum dedicated to forensic technology. We are basically an antiforensic sub so I thought I would post this here and we can gather some resources to keep up the latest happenings in forensic technology. We all cannot be online all the time checking new things so I just thought that I would post this if anyone else ever wanted to do research as well.

Visit https://torhoo.cc/go.php?u=TDJRdllXNTBhV1p2Y21WdWMybGpjdz09# for more info :)
/u/TheBlackPope
4 points
6 years ago
I like this idea. Thank you.
/u/TheBlackPope
3 points
6 years ago
Fuck me! 2 People agreed with me. That's never happened before, let alone on the same day!!!
/u/notruco420
1 points
6 years ago
I agree with /u/TheBlackPope
/u/MushroomSexParty
1 points
6 years ago
I also concur with /u/TheBlackPope
/u/AZERTY
3 points
6 years ago
I recommend reading indictments thoroughly + Wikipedia entries on busts + all linked news articles. OSINT can give lots of insight into capabilities, and appropriate opsec measures.
/u/CartelNorteAfrica
2 points
6 years ago
1 year ago they was using bluetoot to send someting who was rewritting tails, it was in the graphic card of the computer or everywhere where there is place.

It was recording wifi info, passeword, etc etc

We had to change many times our laptops, working without phone TV key cars etc, using DVD-R to avoid re-writting

By eliminating all the bluetoot, we've been able to download a legit image and burn it on DVD-R to make sure it stay legit

I'm not very good to explain it as english is not my language and the tech savy guy is El Patron, I will ask him to update my post

So becarful guys with USB sticks you might download a legit image ... but will it stay legit (you can easily see if you are infected by verify your image daily, once a week (depend how paranoiac you are )

La Jefa
/u/wekhiu48 📢
2 points
6 years ago
Thank you :) Bluetooth or any wireless communication can often have more security problems than it is worth. USB firmware can also be manipulated such as 'badUSB'. These are constantly evolving threats and have to remain vigilante. :)
/u/wekhiu48 📢
1 points
6 years ago
Another good site is reddit.com/r/computerforensics
/u/Avengerhacks
1 points
6 years ago
You wanna study the enemy, good beginner step would be to learn how to use the 'signature' software to run a stylographic analysis, that's the most effective way LE usually find their targets, signature is a quite good way to learn the basics, then there is more advanced software. I'd say with 95% certainty that most administrators were caught using this technique, then there is always room for exploits and other kinks to finish it off.
/u/wekhiu48 📢
2 points
6 years ago
where can this software be found?
/u/notruco420
1 points
6 years ago
Yes, I would like to know as well please.
/u/Avengerhacks
2 points
6 years ago
You can google it, it's a open source software so shouldn't be too difficult to find.
/u/CartelNorteAfrica
1 points
6 years ago
You are right, vendors staff etc HAVE to always update their knowledge cause LEA are way more tech savvy than in 2011 and they have now "geek squad"

La Jefa
/u/AZERTY
1 points
6 years ago
you think most vendors are found via stylometry?

any sources?

i think it's usually more technical ways, though stylometry can help them identify a "big fish" (someone who's eluded multiple busts and they would like to focus on)
/u/Avengerhacks
1 points
6 years ago
I've got no sources because I don't check about vendor busts. But I can say with 95% certainty that this is the technique law enforcement use to bust administrators from the ground, once they have identified the target they can move on to other techniques to gather information. People on darkweb think they can hide behind relays, that's true to some extent, but using stylometric analysis is by far the best way to gather intelligence on a target without compromising a marketplace.
/u/AZERTY
1 points
6 years ago
>I've got no sources because I don't check about vendor busts. But I can say with 95% certainty

That's an impressive certainty for someone who has done zero research Mr. Dunning Kruger:

https://en.m.wikipedia.org/wiki/Dunning-Kruger_effect
/u/Avengerhacks
1 points
6 years ago
Why would I care about vendor busts? It's not as interesting, it's easier to use stylography to identify vendors combined with other methods such as ordering and checking the envelopes for traces and possibly trace where it originated. But vendors who have been around for long should know by now how to not make the mistakes to associate any of their lifestyle from clearweb/social media with darkweb.
/u/donkeysquad
1 points
6 years ago
'not make the mistakes to associate any of their lifestyle from clearweb/social media with darkweb.'
DAM RITE SON ADD ME ON INSTAGRAM @DARKNETDADDY99
/u/Avengerhacks
1 points
6 years ago
kkkkkkkk
/u/AZERTY
1 points
6 years ago
why go off the onion onto a site that seems to want js to fully work?
/u/wekhiu48 📢
1 points
6 years ago
we have a subreddit called https://torhoo.cc/go.php?u=TDJRdllXNTBhV1p2Y21WdWMybGpjdz09# now :) thanks