Amazon cover image
Image from Amazon.com
Image from Coce

Hunting cyber criminals : a hacker's guide to online intelligence gathering tools and techniques / Vinny Troia.

By: Material type: TextTextPublisher: Indianapolis, Indiana : John Wiley & Sons, Inc., 2020Description: xxxi, 503 pages : illustrations ; 24 cmContent type:
  • text
Media type:
  • unmediated
Carrier type:
  • volume
ISBN:
  • 9781119540922
Subject(s): DDC classification:
  • 363.25968 T745h
LOC classification:
  • HV8079.C65
Contents:
Getting started -- Investigations and threat actors -- Network exploration -- Manual network exploration -- Looking for network activity (Advanced NMAP techniques) -- Automated tools for network discovery -- Web exploration -- Website information gathering -- Directory hunting -- Search engine dorks -- WHOIS -- Certificate transparency and internet archives -- Iris by domain tools -- Digging for gold -- Document metadata -- Interesting places to look -- Publicly accessible data storage -- People hunting -- Researching people, images, and locations -- Searching social media -- Profile tracking and password reset clues -- Passwords, dumps and data viper -- Interacting with threat actors -- Cutting through the disinformation of a 10-million-dollar hack.
Tags from this library: No tags from this library for this title. Log in to add tags.
Holdings
Item type Current library Shelving location Call number Copy number Status Date due Barcode
Books Books Main Library-Nabua Circulation Section CIR 363.25968 T745h 2020 (Browse shelf(Opens below)) 1-2 Available 025271
Books Books Main Library-Nabua Circulation Section CIR 363.25968 T745h 2020 (Browse shelf(Opens below)) 2-2 Available 028018

Includes index.

Getting started -- Investigations and threat actors -- Network exploration -- Manual network exploration -- Looking for network activity (Advanced NMAP techniques) -- Automated tools for network discovery -- Web exploration -- Website information gathering -- Directory hunting -- Search engine dorks -- WHOIS -- Certificate transparency and internet archives -- Iris by domain tools -- Digging for gold -- Document metadata -- Interesting places to look -- Publicly accessible data storage -- People hunting -- Researching people, images, and locations -- Searching social media -- Profile tracking and password reset clues -- Passwords, dumps and data viper -- Interacting with threat actors -- Cutting through the disinformation of a 10-million-dollar hack.

There are no comments on this title.

to post a comment.