TY - GEN AU - Troia V. TI - Hunting Cyber Criminals: A Hacker's Guide To Online Intelligence Gathering Tools And Techniques SN - 9781119540922 PY - 2020/// PB - John Wiley and Sons N2 - Table of contents Cover Prologue My Story CHAPTER 1: Getting Started Why This Book Is Different What You Need to Know Important Resources Cryptocurrencies 101 Summary CHAPTER 2: Investigations and Threat Actors The Path of an Investigator The Dark Overlord Summary Part I: Network Exploration CHAPTER 3: Manual Network Exploration Asset Discovery Phishing Domains and Typosquatting Summary CHAPTER 4: Looking for Network Activity (Advanced NMAP Techniques) Getting Started Working against Firewalls and IDS Summary CHAPTER 5: Automated Tools for Network Discovery SpiderFoot SpiderFoot HX (Premium) Intrigue.io Recon‐NG Summary Part II: Web Exploration CHAPTER 6: Website Information Gathering BuiltWith Webapp Information Gatherer (WIG) CMSMap WPScan Summary CHAPTER 7: Directory Hunting Dirhunt Wfuzz Photon Intrigue.io Summary CHAPTER 8: Search Engine Dorks Essential Search Dorks Automated Dorking Tools Summary CHAPTER 9: WHOIS WHOIS Whoisology DomainTools Summary CHAPTER 10: Certificate Transparency and Internet Archives Certificate Transparency Wayback Machine and Search Engine Archives Summary CHAPTER 11: Iris by DomainTools The Basics of Iris Guided Pivots Bringing It All Together Summary Part III: Digging for Gold CHAPTER 12: Document Metadata Exiftool Metagoofil Recon‐NG Metadata Modules Intrigue.io FOCA Summary CHAPTER 13: Interesting Places to Look TheHarvester Paste Sites Forums Code Repositories Wiki Sites Summary CHAPTER 14: Publicly Accessible Data Storage The Exactis Leak and Shodan CloudStorageFinder NoSQL Databases NoScrape Summary Part IV: People Hunting CHAPTER 15: Researching People, Images, and Locations PIPL Public Records and Background Checks Image Searching Cree.py and Geolocation IP Address Tracking Summary CHAPTER 16: Searching Social Media OSINT.rest Skiptracer Userrecon Reddit Investigator Summary CHAPTER 17: Profile Tracking and Password Reset Clues Where to Start (with TDO)? Building a Profile Matrix Social Engineering Using Password Reset Clues Summary CHAPTER 18: Passwords, Dumps, and Data Viper Using Passwords Acquiring Your Data Data Viper Summary CHAPTER 19: Interacting with Threat Actors Drawing Them Out of the Shadows Who Is WhitePacket? YoungBugsThug Establishing a Flow of Information Summary CHAPTER 20: Cutting through the Disinformation of a 10‐Million‐Dollar Hack GnosticPlayers GnosticPlayers' Posts Making Contact Bringing It All Together What Really Happened? Summary Epilogue In Closing, Thank You! Index ER -