Cargando…

Hacking web intelligence : open source intelligence and web reconnaissance concepts and techniques /

Open source intelligence (OSINT) and web reconnaissance are rich topics for infosec professionals looking for the best ways to sift through the abundance of information widely available online. In many cases, the first stage of any security assessment-that is, reconnaissance-is not given enough atte...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autores principales: Chauhan, Sudhanshu (Autor), Panda, Nutan Kumar (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Waltham, MA : Syngress, an imprint of Elsevier, 2015.
Temas:
Acceso en línea:Texto completo
Texto completo

MARC

LEADER 00000cam a2200000 i 4500
001 EBOOKCENTRAL_ocn907467285
003 OCoLC
005 20240329122006.0
006 m o d
007 cr cnu|||unuuu
008 150416s2015 maua o 001 0 eng d
040 |a N$T  |b eng  |e rda  |e pn  |c N$T  |d N$T  |d OPELS  |d E7B  |d YDXCP  |d UMI  |d IDEBK  |d CDX  |d COO  |d DEBBG  |d EBLCP  |d B24X7  |d OCLCF  |d IDB  |d Z5A  |d VGM  |d LIV  |d OCLCQ  |d MERUC  |d OCLCQ  |d UPM  |d WRM  |d U3W  |d D6H  |d CEF  |d OCLCQ  |d CUY  |d LOA  |d G3B  |d CNCEN  |d S8J  |d ICG  |d K6U  |d COCUF  |d CNNOR  |d VT2  |d DCT  |d UKMGB  |d OCLCQ  |d SFB  |d VLY  |d HS0  |d LVT  |d S2H  |d OCLCO  |d OCLCQ  |d OCLCO 
015 |a GBB552821  |2 bnb 
016 7 |a 017166213  |2 Uk 
019 |a 908073540  |a 909802687  |a 915731918  |a 1117872723  |a 1125089872  |a 1162228914  |a 1227641720  |a 1229313938  |a 1287177805 
020 |a 9780128019122  |q (electronic bk.) 
020 |a 0128019123  |q (electronic bk.) 
020 |a 0128018674 
020 |a 9780128018675 
020 |z 9780128018675 
029 1 |a AU@  |b 000054965735 
029 1 |a CHBIS  |b 010547806 
029 1 |a CHNEW  |b 001012846 
029 1 |a CHVBK  |b 341780138 
029 1 |a DEBBG  |b BV042683448 
029 1 |a DEBSZ  |b 446586528 
029 1 |a GBVCP  |b 82592667X 
029 1 |a NZ1  |b 16241451 
029 1 |a UKMGB  |b 017166213 
035 |a (OCoLC)907467285  |z (OCoLC)908073540  |z (OCoLC)909802687  |z (OCoLC)915731918  |z (OCoLC)1117872723  |z (OCoLC)1125089872  |z (OCoLC)1162228914  |z (OCoLC)1227641720  |z (OCoLC)1229313938  |z (OCoLC)1287177805 
037 |a CL0500000592  |b Safari Books Online 
050 4 |a TK5105.888 
072 7 |a COM  |x 013000  |2 bisacsh 
072 7 |a COM  |x 014000  |2 bisacsh 
072 7 |a COM  |x 018000  |2 bisacsh 
072 7 |a COM  |x 067000  |2 bisacsh 
072 7 |a COM  |x 032000  |2 bisacsh 
072 7 |a COM  |x 037000  |2 bisacsh 
072 7 |a COM  |x 052000  |2 bisacsh 
082 0 4 |a 004.678  |2 23 
049 |a UAMI 
100 1 |a Chauhan, Sudhanshu,  |e author. 
245 1 0 |a Hacking web intelligence :  |b open source intelligence and web reconnaissance concepts and techniques /  |c Sudhanshu Chauhan, Nutan Kumar Panda. 
264 1 |a Waltham, MA :  |b Syngress, an imprint of Elsevier,  |c 2015. 
264 4 |c ©2015 
300 |a 1 online resource :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
500 |a Includes index. 
588 0 |a Vendor-supplied metadata. 
520 |a Open source intelligence (OSINT) and web reconnaissance are rich topics for infosec professionals looking for the best ways to sift through the abundance of information widely available online. In many cases, the first stage of any security assessment-that is, reconnaissance-is not given enough attention by security professionals, hackers, and penetration testers. Often, the information openly present is as critical as the confidential data. Hacking Web Intelligence shows you how to dig into the Web and uncover the information many don't even know exists. The book takes a holistic approach that is not only about using tools to find information online but also how to link all the information and transform it into presentable and actionable intelligence. You will also learn how to secure your information online to prevent it being discovered by these reconnaissance methods. Hacking Web Intelligence is an in-depth technical reference covering the methods and techniques you need to unearth open source information from the Internet and utilize it for the purpose of targeted attack during a security assessment. This book will introduce you to many new and leading-edge reconnaissance, information gathering, and open source intelligence methods and techniques, including metadata extraction tools, advanced search engines, advanced browsers, power searching methods, online anonymity tools such as TOR and i2p, OSINT tools such as Maltego, Shodan, Creepy, SearchDiggity, Recon-ng, Social Network Analysis (SNA), Darkweb/Deepweb, data visualization, and much more. 
505 0 |a Front Cover; Hacking Web Intelligence: Open Source Intelligence and Web Reconnaissance Concepts and Techniques; Copyright; Contents; Preface; WHAT THIS BOOK COVERS; HOW DO YOU PRACTICE; TO WHOM THIS BOOK IS FOR; About the Authors; SUDHANSHU CHAUHAN; NUTAN KUMAR PANDA; Acknowledgments; SUDHANSHU CHAUHAN; NUTAN KUMAR PANDA; Chapter 1 -- Foundation: Understanding the Basics; INTRODUCTION; INTERNET; WORLD WIDE WEB; DEFINING THE BASIC TERMS; WEB BROWSING-BEHIND THE SCENE; LAB ENVIRONMENT; Chapter 2 -- Open Source Intelligence and Advanced Social Media Search; INTRODUCTION; OPEN SOURCE INTELLIGENCE. 
505 8 |a HOW WE COMMONLY ACCESS OSINTWEB 2.0; SOCIAL MEDIA INTELLIGENCE; SOCIAL NETWORK; ADVANCED SEARCH TECHNIQUES FOR SOME SPECIFIC SOCIAL MEDIA; WEB 3.0; Chapter 3 -- Understanding Browsers and Beyond; INTRODUCTION; BROWSER OPERATIONS; HISTORY OF BROWSERS; BROWSER ARCHITECTURE; BROWSER FEATURES; RAW BROWSERS; SOME OF THE WELL-KNOWN CUSTOM BROWSERS; ADDONS; BOOKMARK; THREATS POSED BY BROWSERS; Chapter 4 -- Search the Web-Beyond Convention; INTRODUCTION; Chapter 5 -- Advanced Web Searching; INTRODUCTION; GOOGLE; BING; YAHOO; YANDEX; Chapter 6 -- OSINT Tools and Techniques; INTRODUCTION; CREEPY. 
505 8 |a THEHARVESTERSHODAN; SEARCH DIGGITY; YAHOO PIPES; MALTEGO; Chapter 7 -- Metadata; INTRODUCTION; METADATA EXTRACTION TOOLS; IMPACT; METADATA REMOVAL/DLP TOOLS; Chapter 8 -- Online Anonymity; ANONYMITY; ONLINE ANONYMITY; WHY DO WE NEED TO BE ANONYMOUS; WAYS TO BE ANONYMOUS; Chapter 9 -- Deepweb: Exploring the Darkest Corners of the Internet; INTRODUCTION; WHY TO USE IT?; WHY NOT TO USE IT?; DARKNET SERVICES; DISCLAIMER; Chapter 10 -- Data Management and Visualization; INTRODUCTION; DATA MANAGEMENT AND ANALYSIS TOOLS; Chapter 11 -- Online Security; INTRODUCTION; MALWARES; PHISHING. 
505 8 |a ONLINE SCAMS AND FRAUDSHACKING ATTEMPTS; WEAK PASSWORD; SHOULDER SURFING; SOCIAL ENGINEERING; ANTIVIRUS; IDENTIFY PHISHING/SCAMS; UPDATE OPERATING SYSTEM AND OTHER APPLICATIONS; ADDONS FOR SECURITY; TOOLS FOR SECURITY; PASSWORD POLICY; PRECAUTIONS AGAINST SOCIAL ENGINEERING; DATA ENCRYPTION; Chapter 12 -- Basics of Social Networks Analysis; INTRODUCTION; GEPHI; NODE ATTRIBUTES; EDGE ATTRIBUTES; Chapter 13 -- Quick and Dirty Python; INTRODUCTION; Chapter 14 -- Case Studies and Examples; INTRODUCTION; CASE STUDIES; Chapter 15 -- Related Topics of Interest; INTRODUCTION; CRYPTOGRAPHY. 
505 8 |a DATA RECOVERY/SHREDDINGINTERNET RELAY CHAT; BITCOIN; Index. 
546 |a English. 
590 |a ProQuest Ebook Central  |b Ebook Central Academic Complete 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a World Wide Web. 
650 0 |a Open source intelligence. 
650 0 |a Computer networks  |x Security measures. 
650 6 |a Web. 
650 6 |a Renseignements de sources ouvertes. 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures. 
650 7 |a World Wide Web.  |2 aat 
650 7 |a COMPUTERS  |x Computer Literacy.  |2 bisacsh 
650 7 |a COMPUTERS  |x Computer Science.  |2 bisacsh 
650 7 |a COMPUTERS  |x Data Processing.  |2 bisacsh 
650 7 |a COMPUTERS  |x Hardware  |x General.  |2 bisacsh 
650 7 |a COMPUTERS  |x Information Technology.  |2 bisacsh 
650 7 |a COMPUTERS  |x Machine Theory.  |2 bisacsh 
650 7 |a COMPUTERS  |x Reference.  |2 bisacsh 
650 7 |a Computer networks  |x Security measures  |2 fast 
650 7 |a Open source intelligence  |2 fast 
650 7 |a World Wide Web  |2 fast 
700 1 |a Panda, Nutan Kumar,  |e author. 
776 0 8 |i Print version:  |a Chauhan, Sudhanshu.  |t Hacking web intelligence : open source intelligence and web reconnaissance concepts and techniques.  |d Amsterdam, [Netherlands] : Syngress, ©2015  |h xvii, 281 pages  |z 9780128018675 
856 4 0 |u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=2025500  |z Texto completo 
856 4 0 |u https://learning.oreilly.com/library/view/~/9780128018675/?ar  |z Texto completo 
938 |a Books 24x7  |b B247  |n bks00088814 
938 |a Coutts Information Services  |b COUT  |n 31427963 
938 |a EBL - Ebook Library  |b EBLB  |n EBL2025500 
938 |a ebrary  |b EBRY  |n ebr11043523 
938 |a EBSCOhost  |b EBSC  |n 979488 
938 |a ProQuest MyiLibrary Digital eBook Collection  |b IDEB  |n cis31427963 
938 |a YBP Library Services  |b YANK  |n 12384137 
994 |a 92  |b IZTAP