Learning Page

Start with why

Knowledge Hub


Outcome

We value knowledge sharing and prioritise skill upscaling. Your education is important to us. We encourage you to share and discuss the key concepts and tools featured. Please do reach out with any questions and suggestions for posts. If you are able to share your expertise, we would greatly appreciate your efforts. Stay in touch with your community, watch this space... We grow together.

In an evolving technological landscape, the curious mind prevails. But, not alone. We cannot track everything, contribute and learn with us.

Featured Posts

Cryptocurrency Investigation Case Study

2023

Blockchain Development and Analytics

Summary:

Upon purchasing an Evolved Ape NFT. The project quickly raised our suspicions. Due to a lack of due dilligence from the community, we dug deeper and found traces of metadata exposing malicious intent. We partnered with Solidity developers in house, and reverse engineered the smart contracts to identify key wallets of interest. Eventually Action Fraud and Binance were brought in. By working with Authorities, we were able to freeze over £3 million in funds and publicy exppose the identity of the fraudsters.

Key Tools:

Skills:

Documentation:

Appendix:

Links:

News Article: https://www.artnews.com/art-news/news/evolved-apes-nft-scheme-fraud-fbi-1234709334/

Conclusion:

Corporate Investigation Case Study

2022

OSINT and Reconnaissance

Senior Executives tasked us with investigating a target. We were involved in investigating competitors and stakeholders using publicly available information. We found many interesting findings and mispractices. Linking personal endeavours to their businesses and building a topology of the inter-connected pieces. What started with initial reconnaissance and physical site visits, to using extensive toolkits to discover connections and mind-mapping findings for documentation report writing. It quickly become a large scale project that incorporated many different skillsets that we were able to showcase for our clients.

Key Tools:

Skills:

Documentation:

Appendix:

Links:

News Article:

Conclusion:

Personal CyberSecurity (Anti-Dox Effort)

2021

Cybersecurity

When a good friend came to us in need of help to evade bad actors. We were able to provide protection and a strategy to avoid further exposure. Using our data hygiene plan we removed traces as well as secured their endpoints. Setting up remote networks and cloud services for their home lab and assisting with equipment set up, as well as inter-personal habits and cleansing historical activity.

Key Tools:

Skills:

Documentation:

Appendix:

Links:

News Article:

Conclusion:

Education & Certificates

Coming Soon...

Links

unsplash.com/@reddfrancisco