Web Forensics Lab // Knowledge Base
OSINT & Forensics
Encyclopedia
Authoritative definitions and analyst guides for digital forensics concepts, attack vectors, and investigative methodologies.
Attack Vectors
Doxxing
The act of researching and publicly exposing private information about an individual without consent, typically to harass or intimidate.
SIM Swapping
A social-engineering attack where a fraudster convinces a mobile carrier to transfer a victim's phone number to a SIM card under their control.
Whaling
A highly targeted phishing attack directed at senior executives or high-net-worth individuals, designed to authorise fraudulent transactions or data breaches.
Spear Phishing
A targeted phishing attack using personalised information about the victim to dramatically increase the likelihood of deception.
Man-in-the-Middle Attack (MITM)
An attack in which an adversary secretly intercepts and potentially alters communications between two parties who believe they are communicating directly.
Credential Stuffing
An automated attack in which stolen username/password pairs from one breach are tested against multiple other services at scale.
Account Takeover (ATO)
The unauthorised access to an online account by a malicious actor, typically using stolen credentials, phishing, or SIM swapping.
Investigative Techniques
OSINT Aggregation
The systematic collection and synthesis of publicly available information from multiple sources to build a comprehensive intelligence picture of a target.
Dark Web Monitoring
The continuous surveillance of dark web forums, marketplaces, and paste sites for mentions of a monitored entity's assets, credentials, or personal data.
Endpoint Forensics
The forensic examination of a device — laptop, phone, or server — to identify evidence of compromise, exfiltration, or malicious activity.
Digital Hygiene
Legal & Evidence
Need Expert Assistance?
Our forensic analysts apply every technique documented here in live investigations.
Start a Case →