Hunting Cyber Criminals (Record no. 359783)
[ view plain ]
| 000 -LEADER | |
|---|---|
| fixed length control field | 03044 a2200157 4500 |
| 005 - DATE AND TIME OF LATEST TRANSACTION | |
| control field | 20241010124406.0 |
| 008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
| fixed length control field | 241010b |||||||| |||| 00| 0 eng d |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
| International Standard Book Number | 9781119540922 |
| 041 ## - LANGUAGE CODE | |
| Language code of text/sound track or separate title | English |
| 100 ## - MAIN ENTRY--PERSONAL NAME | |
| Author | Troia V. |
| 245 ## - TITLE STATEMENT | |
| Title | Hunting Cyber Criminals |
| Remainder of title | A Hacker's Guide To Online Intelligence Gathering Tools And Techniques |
| 260 ## - PUBLICATION, DISTRIBUTION, ETC. | |
| Name of publisher, distributor, etc. | John Wiley and Sons |
| Date of publication, distribution, etc. | 2020 |
| 300 ## - PHYSICAL DESCRIPTION | |
| Extent | 503 |
| 520 ## - SUMMARY, ETC. | |
| Summary, etc. | Table of contents<br/>Cover<br/>Prologue<br/>My Story<br/>CHAPTER 1: Getting Started<br/>Why This Book Is Different<br/>What You Need to Know<br/>Important Resources<br/>Cryptocurrencies 101<br/>Summary<br/>CHAPTER 2: Investigations and Threat Actors<br/>The Path of an Investigator<br/>The Dark Overlord<br/>Summary<br/>Part I: Network Exploration<br/>CHAPTER 3: Manual Network Exploration<br/>Asset Discovery<br/>Phishing Domains and Typosquatting<br/>Summary<br/>CHAPTER 4: Looking for Network Activity (Advanced NMAP Techniques)<br/>Getting Started<br/>Working against Firewalls and IDS<br/>Summary<br/>CHAPTER 5: Automated Tools for Network Discovery<br/>SpiderFoot<br/>SpiderFoot HX (Premium)<br/>Intrigue.io<br/>Recon‐NG<br/>Summary<br/>Part II: Web Exploration<br/>CHAPTER 6: Website Information Gathering<br/>BuiltWith<br/>Webapp Information Gatherer (WIG)<br/>CMSMap<br/>WPScan<br/>Summary<br/>CHAPTER 7: Directory Hunting<br/>Dirhunt<br/>Wfuzz<br/>Photon<br/>Intrigue.io<br/>Summary<br/>CHAPTER 8: Search Engine Dorks<br/>Essential Search Dorks<br/>Automated Dorking Tools<br/>Summary<br/>CHAPTER 9: WHOIS<br/>WHOIS<br/>Whoisology<br/>DomainTools<br/>Summary<br/>CHAPTER 10: Certificate Transparency and Internet Archives<br/>Certificate Transparency<br/>Wayback Machine and Search Engine Archives<br/>Summary<br/>CHAPTER 11: Iris by DomainTools<br/>The Basics of Iris<br/>Guided Pivots<br/>Bringing It All Together<br/>Summary<br/>Part III: Digging for Gold<br/>CHAPTER 12: Document Metadata<br/>Exiftool<br/>Metagoofil<br/>Recon‐NG Metadata Modules<br/>Intrigue.io<br/>FOCA<br/>Summary<br/>CHAPTER 13: Interesting Places to Look<br/>TheHarvester<br/>Paste Sites<br/>Forums<br/>Code Repositories<br/>Wiki Sites<br/>Summary<br/>CHAPTER 14: Publicly Accessible Data Storage<br/>The Exactis Leak and Shodan<br/>CloudStorageFinder<br/>NoSQL Databases<br/>NoScrape<br/>Summary<br/>Part IV: People Hunting<br/>CHAPTER 15: Researching People, Images, and Locations<br/>PIPL<br/>Public Records and Background Checks<br/>Image Searching<br/>Cree.py and Geolocation<br/>IP Address Tracking<br/>Summary<br/>CHAPTER 16: Searching Social Media<br/>OSINT.rest<br/>Skiptracer<br/>Userrecon<br/>Reddit Investigator<br/>Summary<br/>CHAPTER 17: Profile Tracking and Password Reset Clues<br/>Where to Start (with TDO)?<br/>Building a Profile Matrix<br/>Social Engineering<br/>Using Password Reset Clues<br/>Summary<br/>CHAPTER 18: Passwords, Dumps, and Data Viper<br/>Using Passwords<br/>Acquiring Your Data<br/>Data Viper<br/>Summary<br/>CHAPTER 19: Interacting with Threat Actors<br/>Drawing Them Out of the Shadows<br/>Who Is WhitePacket?<br/>YoungBugsThug<br/>Establishing a Flow of Information<br/>Summary<br/>CHAPTER 20: Cutting through the Disinformation of a 10‐Million‐Dollar Hack<br/>GnosticPlayers<br/>GnosticPlayers' Posts<br/>Making Contact<br/>Bringing It All Together<br/>What Really Happened?<br/>Summary<br/>Epilogue<br/>In Closing, Thank You!<br/>Index |
| 942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
| Koha item type | Books |
| Withdrawn status | Lost status | Source of classification or shelving scheme | Damaged status | Not for loan | Home library | Current library | Date acquired | Vendor | Net Price | Total Checkouts | Full call number | Barcode | Date last seen | Date last checked out | Actual Price | Bill Date | Koha item type |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Dewey Decimal Classification | Cummins College of Engineering for Women Pune | Cummins College of Engineering for Women Pune | 08/10/2024 | 149 | 2929.79 | 1 | 005.8 TRO | CCEP-BK-67480 | 04/11/2024 | 26/10/2024 | 3662.24 | 08/10/2024 | Books |