LEADER 04851nam 2200661 450 001 9910788136303321 005 20200520144314.0 035 $a(CKB)2670000000609567 035 $a(EBL)2025500 035 $a(SSID)ssj0001537686 035 $a(PQKBManifestationID)11819544 035 $a(PQKBTitleCode)TC0001537686 035 $a(PQKBWorkID)11519047 035 $a(PQKB)11374666 035 $a(Au-PeEL)EBL2025500 035 $a(CaPaEBR)ebr11043523 035 $a(CaONFJC)MIL769137 035 $a(OCoLC)907467285 035 $a(CaSebORM)9780128018675 035 $a(MiAaPQ)EBC2025500 035 $a(PPN)198677960 035 $a(EXLCZ)992670000000609567 100 $a20150425h20152015 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aHacking web intelligence $eopen source intelligence and web reconnaissance concepts and techniques /$fSudhanshu Chauhan, Nutan Kumar Panda 205 $a1st edition 210 1$aAmsterdam, [Netherlands] :$cSyngress,$d2015. 210 4$dİ2015 215 $a1 online resource (301 p.) 300 $aIncludes index. 311 $a0-12-801867-4 311 $a0-12-801912-3 327 $aFront Cover; Hacking Web Intelligence: Open Source Intelligence and Web Reconnaissance Concepts and Techniques; Copyright; Contents; Preface; WHAT THIS BOOK COVERS; HOW DO YOU PRACTICE; TO WHOM THIS BOOK IS FOR; About the Authors; SUDHANSHU CHAUHAN; NUTAN KUMAR PANDA; Acknowledgments; SUDHANSHU CHAUHAN; NUTAN KUMAR PANDA; Chapter 1 - Foundation: Understanding the Basics; INTRODUCTION; INTERNET; WORLD WIDE WEB; DEFINING THE BASIC TERMS; WEB BROWSING-BEHIND THE SCENE; LAB ENVIRONMENT; Chapter 2 - Open Source Intelligence and Advanced Social Media Search; INTRODUCTION; OPEN SOURCE INTELLIGENCE 327 $aHOW WE COMMONLY ACCESS OSINTWEB 2.0; SOCIAL MEDIA INTELLIGENCE; SOCIAL NETWORK; ADVANCED SEARCH TECHNIQUES FOR SOME SPECIFIC SOCIAL MEDIA; WEB 3.0; Chapter 3 - Understanding Browsers and Beyond; INTRODUCTION; BROWSER OPERATIONS; HISTORY OF BROWSERS; BROWSER ARCHITECTURE; BROWSER FEATURES; RAW BROWSERS; SOME OF THE WELL-KNOWN CUSTOM BROWSERS; ADDONS; BOOKMARK; THREATS POSED BY BROWSERS; Chapter 4 - Search the Web-Beyond Convention; INTRODUCTION; Chapter 5 - Advanced Web Searching; INTRODUCTION; GOOGLE; BING; YAHOO; YANDEX; Chapter 6 - OSINT Tools and Techniques; INTRODUCTION; CREEPY 327 $aTHEHARVESTERSHODAN; SEARCH DIGGITY; YAHOO PIPES; MALTEGO; Chapter 7 - Metadata; INTRODUCTION; METADATA EXTRACTION TOOLS; IMPACT; METADATA REMOVAL/DLP TOOLS; Chapter 8 - Online Anonymity; ANONYMITY; ONLINE ANONYMITY; WHY DO WE NEED TO BE ANONYMOUS; WAYS TO BE ANONYMOUS; Chapter 9 - Deepweb: Exploring the Darkest Corners of the Internet; INTRODUCTION; WHY TO USE IT?; WHY NOT TO USE IT?; DARKNET SERVICES; DISCLAIMER; Chapter 10 - Data Management and Visualization; INTRODUCTION; DATA MANAGEMENT AND ANALYSIS TOOLS; Chapter 11 - Online Security; INTRODUCTION; MALWARES; PHISHING 327 $aONLINE SCAMS AND FRAUDSHACKING ATTEMPTS; WEAK PASSWORD; SHOULDER SURFING; SOCIAL ENGINEERING; ANTIVIRUS; IDENTIFY PHISHING/SCAMS; UPDATE OPERATING SYSTEM AND OTHER APPLICATIONS; ADDONS FOR SECURITY; TOOLS FOR SECURITY; PASSWORD POLICY; PRECAUTIONS AGAINST SOCIAL ENGINEERING; DATA ENCRYPTION; Chapter 12 - Basics of Social Networks Analysis; INTRODUCTION; GEPHI; NODE ATTRIBUTES; EDGE ATTRIBUTES; Chapter 13 - Quick and Dirty Python; INTRODUCTION; Chapter 14 - Case Studies and Examples; INTRODUCTION; CASE STUDIES; Chapter 15 - Related Topics of Interest; INTRODUCTION; CRYPTOGRAPHY 327 $aDATA RECOVERY/SHREDDINGINTERNET RELAY CHAT; BITCOIN; Index 330 $aOpen source intelligence (OSINT) and web reconnaissance are rich topics for infosec professionals looking for the best ways to sift through the abundance of information widely available online. In many cases, the first stage of any security assessment-that is, reconnaissance-is not given enough attention by security professionals, hackers, and penetration testers. Often, the information openly present is as critical as the confidential data. Hacking Web Intelligence shows you how to dig into the Web and uncover the information many don't even know exists. The book takes a holistic approach 606 $aComputer networks$xSecurity measures 606 $aWorld Wide Web 606 $aOpen source intelligence 615 0$aComputer networks$xSecurity measures. 615 0$aWorld Wide Web. 615 0$aOpen source intelligence. 676 $a005.8 700 $aChauhan$b Sudhanshu$0883906 702 $aPanda$b Nutan Kumar 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910788136303321 996 $aHacking web intelligence$91974061 997 $aUNINA