Event JSON
{
"id": "cfc01caf6662530932c537f23cc382717de79b5f5a5e49b58dad995ff8f8c0a7",
"pubkey": "58231e2fccb9ae8c94128f34cd7910910ce6980ecbd2f30da456ebfe4878aa7a",
"created_at": 1714145747,
"kind": 1,
"tags": [
[
"t",
"security"
],
[
"t",
"tools"
],
[
"t",
"attack"
],
[
"t",
"privacy"
],
[
"t",
"dns"
],
[
"t",
"certificate"
],
[
"proxy",
"https://fosstodon.org/users/linuxmagazine/statuses/112338255710999019",
"activitypub"
]
],
"content": "Hunting and Gathering: Chris Binnie looks at passive reconnaissance tools attackers use for preliminary research on network assets and the people who use them https://www.linux-magazine.com/Issues/2024/279/Passive-Reconnaissance #security #tools #attack #privacy #DNS #certificate\n\nhttps://cdn.fosstodon.org/media_attachments/files/112/338/248/100/723/814/original/4d767a0f12aa96e0.png",
"sig": "9df3bfcee8f469d4940ef718e3c3a254b5afc59f098a97a9aef3c7e43da25c9be8a3eadc2f25692e7f086edb0bded9e55320c651667acf2744043548b6d2d667"
}