Alexandre Dulaunoy<p>I had the pleasure of presenting at <a href="https://infosec.exchange/tags/FIRSTCTI25" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>FIRSTCTI25</span></a> in Berlin:</p><p>"The Art of Pivoting – How You Can Discover More from Adversaries with Existing Information."</p><p>The talk explored how unconventional indicators, like cookie names, QR codes, HTTP headers (HHHash), DOM structures, and reused Google Analytics IDs, can reveal surprising links across threat actor infrastructure and behavior.</p><p>We also shared real-world insights from our crawling and analysis with AIL, including:</p><ul><li>How “weak” indicators can gain strength through composite correlation</li><li>Unexpected metadata reuse across Tor services and social platforms</li><li>How AIL enables more creative and effective pivoting workflows</li></ul><p>🔗 Slides <a href="https://www.ail-project.org/assets/img/slides/the-art-of-pivoting.pdf" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">ail-project.org/assets/img/sli</span><span class="invisible">des/the-art-of-pivoting.pdf</span></a></p><p><a href="https://infosec.exchange/tags/threatintel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>threatintel</span></a> <a href="https://infosec.exchange/tags/threatintelligence" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>threatintelligence</span></a> <a href="https://infosec.exchange/tags/cti" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cti</span></a> <a href="https://infosec.exchange/tags/opensource" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>opensource</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/darkweb" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>darkweb</span></a> </p><p><span class="h-card" translate="no"><a href="https://misp-community.org/@misp" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>misp</span></a></span> <span class="h-card" translate="no"><a href="https://infosec.exchange/@ail_project" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>ail_project</span></a></span> <span class="h-card" translate="no"><a href="https://social.circl.lu/@circl" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>circl</span></a></span> </p><p>Thanks to <span class="h-card" translate="no"><a href="https://infosec.exchange/@terrtia" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>terrtia</span></a></span> for the crazy discussions around correlations!</p>