000 | 06918cam a2200721Ii 4500 | ||
---|---|---|---|
001 | ocn907467285 | ||
003 | OCoLC | ||
005 | 20190328114811.0 | ||
006 | m o d | ||
007 | cr cnu|||unuuu | ||
008 | 150416s2015 maua o 001 0 eng d | ||
010 | _a 2015933572 | ||
040 |
_aN$T _beng _erda _epn _cN$T _dN$T _dOPELS _dE7B _dYDXCP _dUMI _dIDEBK _dCDX _dCOO _dDEBBG _dEBLCP _dB24X7 _dOCLCF _dIDB _dZ5A _dVGM _dLIV _dOCLCQ _dMERUC _dOCLCQ _dUPM _dWRM _dU3W _dD6H _dCEF _dOCLCQ _dCUY _dLOA _dG3B _dCNCEN _dS8J _dICG _dK6U _dCOCUF _dCNNOR _dVT2 |
||
019 |
_a908073540 _a909802687 _a915731918 |
||
020 |
_a9780128019122 _q(electronic bk.) |
||
020 |
_a0128019123 _q(electronic bk.) |
||
020 | _a0128018674 | ||
020 | _a9780128018675 | ||
020 | _z9780128018675 | ||
035 |
_a(OCoLC)907467285 _z(OCoLC)908073540 _z(OCoLC)909802687 _z(OCoLC)915731918 |
||
050 | 4 | _aTK5105.888 | |
072 | 7 |
_aCOM _x013000 _2bisacsh |
|
072 | 7 |
_aCOM _x014000 _2bisacsh |
|
072 | 7 |
_aCOM _x018000 _2bisacsh |
|
072 | 7 |
_aCOM _x067000 _2bisacsh |
|
072 | 7 |
_aCOM _x032000 _2bisacsh |
|
072 | 7 |
_aCOM _x037000 _2bisacsh |
|
072 | 7 |
_aCOM _x052000 _2bisacsh |
|
082 | 0 | 4 |
_a004.678 _223 |
100 | 1 |
_aChauhan, Sudhanshu, _eauthor. |
|
245 | 1 | 0 |
_aHacking web intelligence : open source intelligence and web reconnaissance concepts and techniques / _h[electronic resource] _cSudhanshu Chauhan, Nutan Kumar Panda. |
264 | 1 |
_aWaltham, MA : _bSyngress, an imprint of Elsevier, _c2015. |
|
264 | 4 | _c�2015 | |
300 |
_a1 online resource : _billustrations |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
500 | _aIncludes index. | ||
588 | 0 | _aVendor-supplied metadata. | |
520 | _aOpen source intelligence (OSINT) and web reconnaissance are rich topics for infosec professionals looking for the best ways to sift through the abundance of information widely available online. In many cases, the first stage of any security assessment-that is, reconnaissance-is not given enough attention by security professionals, hackers, and penetration testers. Often, the information openly present is as critical as the confidential data. Hacking Web Intelligence shows you how to dig into the Web and uncover the information many don't even know exists. The book takes a holistic approach that is not only about using tools to find information online but also how to link all the information and transform it into presentable and actionable intelligence. You will also learn how to secure your information online to prevent it being discovered by these reconnaissance methods. Hacking Web Intelligence is an in-depth technical reference covering the methods and techniques you need to unearth open source information from the Internet and utilize it for the purpose of targeted attack during a security assessment. This book will introduce you to many new and leading-edge reconnaissance, information gathering, and open source intelligence methods and techniques, including metadata extraction tools, advanced search engines, advanced browsers, power searching methods, online anonymity tools such as TOR and i2p, OSINT tools such as Maltego, Shodan, Creepy, SearchDiggity, Recon-ng, Social Network Analysis (SNA), Darkweb/Deepweb, data visualization, and much more. | ||
505 | 0 | _aFront Cover; Hacking Web Intelligence: Open Source Intelligence and Web Reconnaissance Concepts and Techniques; Copyright; Contents; Preface; WHAT THIS BOOK COVERS; HOW DO YOU PRACTICE; TO WHOM THIS BOOK IS FOR; About the Authors; SUDHANSHU CHAUHAN; NUTAN KUMAR PANDA; Acknowledgments; SUDHANSHU CHAUHAN; NUTAN KUMAR PANDA; Chapter 1 -- Foundation: Understanding the Basics; INTRODUCTION; INTERNET; WORLD WIDE WEB; DEFINING THE BASIC TERMS; WEB BROWSING-BEHIND THE SCENE; LAB ENVIRONMENT; Chapter 2 -- Open Source Intelligence and Advanced Social Media Search; INTRODUCTION; OPEN SOURCE INTELLIGENCE. | |
505 | 8 | _aHOW WE COMMONLY ACCESS OSINTWEB 2.0; SOCIAL MEDIA INTELLIGENCE; SOCIAL NETWORK; ADVANCED SEARCH TECHNIQUES FOR SOME SPECIFIC SOCIAL MEDIA; WEB 3.0; Chapter 3 -- Understanding Browsers and Beyond; INTRODUCTION; BROWSER OPERATIONS; HISTORY OF BROWSERS; BROWSER ARCHITECTURE; BROWSER FEATURES; RAW BROWSERS; SOME OF THE WELL-KNOWN CUSTOM BROWSERS; ADDONS; BOOKMARK; THREATS POSED BY BROWSERS; Chapter 4 -- Search the Web-Beyond Convention; INTRODUCTION; Chapter 5 -- Advanced Web Searching; INTRODUCTION; GOOGLE; BING; YAHOO; YANDEX; Chapter 6 -- OSINT Tools and Techniques; INTRODUCTION; CREEPY. | |
505 | 8 | _aTHEHARVESTERSHODAN; SEARCH DIGGITY; YAHOO PIPES; MALTEGO; Chapter 7 -- Metadata; INTRODUCTION; METADATA EXTRACTION TOOLS; IMPACT; METADATA REMOVAL/DLP TOOLS; Chapter 8 -- Online Anonymity; ANONYMITY; ONLINE ANONYMITY; WHY DO WE NEED TO BE ANONYMOUS; WAYS TO BE ANONYMOUS; Chapter 9 -- Deepweb: Exploring the Darkest Corners of the Internet; INTRODUCTION; WHY TO USE IT?; WHY NOT TO USE IT?; DARKNET SERVICES; DISCLAIMER; Chapter 10 -- Data Management and Visualization; INTRODUCTION; DATA MANAGEMENT AND ANALYSIS TOOLS; Chapter 11 -- Online Security; INTRODUCTION; MALWARES; PHISHING. | |
505 | 8 | _aONLINE SCAMS AND FRAUDSHACKING ATTEMPTS; WEAK PASSWORD; SHOULDER SURFING; SOCIAL ENGINEERING; ANTIVIRUS; IDENTIFY PHISHING/SCAMS; UPDATE OPERATING SYSTEM AND OTHER APPLICATIONS; ADDONS FOR SECURITY; TOOLS FOR SECURITY; PASSWORD POLICY; PRECAUTIONS AGAINST SOCIAL ENGINEERING; DATA ENCRYPTION; Chapter 12 -- Basics of Social Networks Analysis; INTRODUCTION; GEPHI; NODE ATTRIBUTES; EDGE ATTRIBUTES; Chapter 13 -- Quick and Dirty Python; INTRODUCTION; Chapter 14 -- Case Studies and Examples; INTRODUCTION; CASE STUDIES; Chapter 15 -- Related Topics of Interest; INTRODUCTION; CRYPTOGRAPHY. | |
505 | 8 | _aDATA RECOVERY/SHREDDINGINTERNET RELAY CHAT; BITCOIN; Index. | |
650 | 0 | _aWorld Wide Web. | |
650 | 0 | _aOpen source intelligence. | |
650 | 0 |
_aComputer networks _xSecurity measures. |
|
650 | 7 |
_aCOMPUTERS _xComputer Literacy. _2bisacsh |
|
650 | 7 |
_aCOMPUTERS _xComputer Science. _2bisacsh |
|
650 | 7 |
_aCOMPUTERS _xData Processing. _2bisacsh |
|
650 | 7 |
_aCOMPUTERS _xHardware _xGeneral. _2bisacsh |
|
650 | 7 |
_aCOMPUTERS _xInformation Technology. _2bisacsh |
|
650 | 7 |
_aCOMPUTERS _xMachine Theory. _2bisacsh |
|
650 | 7 |
_aCOMPUTERS _xReference. _2bisacsh |
|
650 | 7 |
_aComputer networks _xSecurity measures. _2fast _0(OCoLC)fst00872341 |
|
650 | 7 |
_aOpen source intelligence. _2fast _0(OCoLC)fst01739916 |
|
650 | 7 |
_aWorld Wide Web. _2fast _0(OCoLC)fst01181326 |
|
655 | 4 | _aElectronic books. | |
700 | 1 |
_aPanda, Nutan Kumar, _eauthor. |
|
776 | 0 | 8 |
_iPrint version: _aChauhan, Sudhanshu. _tHacking web intelligence : open source intelligence and web reconnaissance concepts and techniques. _dAmsterdam, [Netherlands] : Syngress, �2015 _hxvii, 281 pages _z9780128018675 |
856 | 4 | 0 |
_3ScienceDirect _uhttp://www.sciencedirect.com/science/book/9780128018675 |
999 |
_c247073 _d247073 |