Amazon cover image
Image from Amazon.com
Image from Google Jackets

Hunting Cyber Criminals A Hacker's Guide To Online Intelligence Gathering Tools And Techniques

By: Language: English Publication details: John Wiley and Sons 2020Description: 503ISBN:
  • 9781119540922
Summary: Table of contents Cover Prologue My Story CHAPTER 1: Getting Started Why This Book Is Different What You Need to Know Important Resources Cryptocurrencies 101 Summary CHAPTER 2: Investigations and Threat Actors The Path of an Investigator The Dark Overlord Summary Part I: Network Exploration CHAPTER 3: Manual Network Exploration Asset Discovery Phishing Domains and Typosquatting Summary CHAPTER 4: Looking for Network Activity (Advanced NMAP Techniques) Getting Started Working against Firewalls and IDS Summary CHAPTER 5: Automated Tools for Network Discovery SpiderFoot SpiderFoot HX (Premium) Intrigue.io Recon‐NG Summary Part II: Web Exploration CHAPTER 6: Website Information Gathering BuiltWith Webapp Information Gatherer (WIG) CMSMap WPScan Summary CHAPTER 7: Directory Hunting Dirhunt Wfuzz Photon Intrigue.io Summary CHAPTER 8: Search Engine Dorks Essential Search Dorks Automated Dorking Tools Summary CHAPTER 9: WHOIS WHOIS Whoisology DomainTools Summary CHAPTER 10: Certificate Transparency and Internet Archives Certificate Transparency Wayback Machine and Search Engine Archives Summary CHAPTER 11: Iris by DomainTools The Basics of Iris Guided Pivots Bringing It All Together Summary Part III: Digging for Gold CHAPTER 12: Document Metadata Exiftool Metagoofil Recon‐NG Metadata Modules Intrigue.io FOCA Summary CHAPTER 13: Interesting Places to Look TheHarvester Paste Sites Forums Code Repositories Wiki Sites Summary CHAPTER 14: Publicly Accessible Data Storage The Exactis Leak and Shodan CloudStorageFinder NoSQL Databases NoScrape Summary Part IV: People Hunting CHAPTER 15: Researching People, Images, and Locations PIPL Public Records and Background Checks Image Searching Cree.py and Geolocation IP Address Tracking Summary CHAPTER 16: Searching Social Media OSINT.rest Skiptracer Userrecon Reddit Investigator Summary CHAPTER 17: Profile Tracking and Password Reset Clues Where to Start (with TDO)? Building a Profile Matrix Social Engineering Using Password Reset Clues Summary CHAPTER 18: Passwords, Dumps, and Data Viper Using Passwords Acquiring Your Data Data Viper Summary CHAPTER 19: Interacting with Threat Actors Drawing Them Out of the Shadows Who Is WhitePacket? YoungBugsThug Establishing a Flow of Information Summary CHAPTER 20: Cutting through the Disinformation of a 10‐Million‐Dollar Hack GnosticPlayers GnosticPlayers' Posts Making Contact Bringing It All Together What Really Happened? Summary Epilogue In Closing, Thank You! Index
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Call number Status Barcode
Books Cummins College of Engineering for Women Pune 005.8 TRO (Browse shelf(Opens below)) Available (not for issue) CCEP-BK-67480

Table of contents
Cover
Prologue
My Story
CHAPTER 1: Getting Started
Why This Book Is Different
What You Need to Know
Important Resources
Cryptocurrencies 101
Summary
CHAPTER 2: Investigations and Threat Actors
The Path of an Investigator
The Dark Overlord
Summary
Part I: Network Exploration
CHAPTER 3: Manual Network Exploration
Asset Discovery
Phishing Domains and Typosquatting
Summary
CHAPTER 4: Looking for Network Activity (Advanced NMAP Techniques)
Getting Started
Working against Firewalls and IDS
Summary
CHAPTER 5: Automated Tools for Network Discovery
SpiderFoot
SpiderFoot HX (Premium)
Intrigue.io
Recon‐NG
Summary
Part II: Web Exploration
CHAPTER 6: Website Information Gathering
BuiltWith
Webapp Information Gatherer (WIG)
CMSMap
WPScan
Summary
CHAPTER 7: Directory Hunting
Dirhunt
Wfuzz
Photon
Intrigue.io
Summary
CHAPTER 8: Search Engine Dorks
Essential Search Dorks
Automated Dorking Tools
Summary
CHAPTER 9: WHOIS
WHOIS
Whoisology
DomainTools
Summary
CHAPTER 10: Certificate Transparency and Internet Archives
Certificate Transparency
Wayback Machine and Search Engine Archives
Summary
CHAPTER 11: Iris by DomainTools
The Basics of Iris
Guided Pivots
Bringing It All Together
Summary
Part III: Digging for Gold
CHAPTER 12: Document Metadata
Exiftool
Metagoofil
Recon‐NG Metadata Modules
Intrigue.io
FOCA
Summary
CHAPTER 13: Interesting Places to Look
TheHarvester
Paste Sites
Forums
Code Repositories
Wiki Sites
Summary
CHAPTER 14: Publicly Accessible Data Storage
The Exactis Leak and Shodan
CloudStorageFinder
NoSQL Databases
NoScrape
Summary
Part IV: People Hunting
CHAPTER 15: Researching People, Images, and Locations
PIPL
Public Records and Background Checks
Image Searching
Cree.py and Geolocation
IP Address Tracking
Summary
CHAPTER 16: Searching Social Media
OSINT.rest
Skiptracer
Userrecon
Reddit Investigator
Summary
CHAPTER 17: Profile Tracking and Password Reset Clues
Where to Start (with TDO)?
Building a Profile Matrix
Social Engineering
Using Password Reset Clues
Summary
CHAPTER 18: Passwords, Dumps, and Data Viper
Using Passwords
Acquiring Your Data
Data Viper
Summary
CHAPTER 19: Interacting with Threat Actors
Drawing Them Out of the Shadows
Who Is WhitePacket?
YoungBugsThug
Establishing a Flow of Information
Summary
CHAPTER 20: Cutting through the Disinformation of a 10‐Million‐Dollar Hack
GnosticPlayers
GnosticPlayers' Posts
Making Contact
Bringing It All Together
What Really Happened?
Summary
Epilogue
In Closing, Thank You!
Index

There are no comments on this title.

to post a comment.