Cargando…

Hacking web intelligence : open source intelligence and web reconnaissance concepts and techniques /

Open source intelligence (OSINT) and web reconnaissance are rich topics for infosec professionals looking for the best ways to sift through the abundance of information widely available online. In many cases, the first stage of any security assessment-that is, reconnaissance-is not given enough atte...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autores principales: Chauhan, Sudhanshu (Autor), Panda, Nutan Kumar (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Waltham, MA : Syngress, an imprint of Elsevier, 2015.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)
Tabla de Contenidos:
  • Front Cover; Hacking Web Intelligence: Open Source Intelligence and Web Reconnaissance Concepts and Techniques; Copyright; Contents; Preface; WHAT THIS BOOK COVERS; HOW DO YOU PRACTICE; TO WHOM THIS BOOK IS FOR; About the Authors; SUDHANSHU CHAUHAN; NUTAN KUMAR PANDA; Acknowledgments; SUDHANSHU CHAUHAN; NUTAN KUMAR PANDA; Chapter 1
  • Foundation: Understanding the Basics; INTRODUCTION; INTERNET; WORLD WIDE WEB; DEFINING THE BASIC TERMS; WEB BROWSING-BEHIND THE SCENE; LAB ENVIRONMENT; Chapter 2
  • Open Source Intelligence and Advanced Social Media Search; INTRODUCTION; OPEN SOURCE INTELLIGENCE.
  • HOW WE COMMONLY ACCESS OSINTWEB 2.0; SOCIAL MEDIA INTELLIGENCE; SOCIAL NETWORK; ADVANCED SEARCH TECHNIQUES FOR SOME SPECIFIC SOCIAL MEDIA; WEB 3.0; Chapter 3
  • Understanding Browsers and Beyond; INTRODUCTION; BROWSER OPERATIONS; HISTORY OF BROWSERS; BROWSER ARCHITECTURE; BROWSER FEATURES; RAW BROWSERS; SOME OF THE WELL-KNOWN CUSTOM BROWSERS; ADDONS; BOOKMARK; THREATS POSED BY BROWSERS; Chapter 4
  • Search the Web-Beyond Convention; INTRODUCTION; Chapter 5
  • Advanced Web Searching; INTRODUCTION; GOOGLE; BING; YAHOO; YANDEX; Chapter 6
  • OSINT Tools and Techniques; INTRODUCTION; CREEPY.
  • THEHARVESTERSHODAN; SEARCH DIGGITY; YAHOO PIPES; MALTEGO; Chapter 7
  • Metadata; INTRODUCTION; METADATA EXTRACTION TOOLS; IMPACT; METADATA REMOVAL/DLP TOOLS; Chapter 8
  • Online Anonymity; ANONYMITY; ONLINE ANONYMITY; WHY DO WE NEED TO BE ANONYMOUS; WAYS TO BE ANONYMOUS; Chapter 9
  • Deepweb: Exploring the Darkest Corners of the Internet; INTRODUCTION; WHY TO USE IT?; WHY NOT TO USE IT?; DARKNET SERVICES; DISCLAIMER; Chapter 10
  • Data Management and Visualization; INTRODUCTION; DATA MANAGEMENT AND ANALYSIS TOOLS; Chapter 11
  • Online Security; INTRODUCTION; MALWARES; PHISHING.
  • ONLINE SCAMS AND FRAUDSHACKING ATTEMPTS; WEAK PASSWORD; SHOULDER SURFING; SOCIAL ENGINEERING; ANTIVIRUS; IDENTIFY PHISHING/SCAMS; UPDATE OPERATING SYSTEM AND OTHER APPLICATIONS; ADDONS FOR SECURITY; TOOLS FOR SECURITY; PASSWORD POLICY; PRECAUTIONS AGAINST SOCIAL ENGINEERING; DATA ENCRYPTION; Chapter 12
  • Basics of Social Networks Analysis; INTRODUCTION; GEPHI; NODE ATTRIBUTES; EDGE ATTRIBUTES; Chapter 13
  • Quick and Dirty Python; INTRODUCTION; Chapter 14
  • Case Studies and Examples; INTRODUCTION; CASE STUDIES; Chapter 15
  • Related Topics of Interest; INTRODUCTION; CRYPTOGRAPHY.
  • DATA RECOVERY/SHREDDINGINTERNET RELAY CHAT; BITCOIN; Index.