Hacking Web Intelligence: Open Source Intelligence and Web Reconnaissance Concepts and Techniques (Paperback)
Sudhanshu Chauhan, Nutan Kumar Panda
- 出版商: Syngress Media
- 出版日期: 2015-04-23
- 定價: $2,100
- 售價: 8.0 折 $1,680
- 語言: 英文
- 頁數: 300
- 裝訂: Paperback
- ISBN: 0128018674
- ISBN-13: 9780128018675
-
相關分類:
駭客 Hack
立即出貨 (庫存 < 3)
買這商品的人也買了...
-
$650$507 -
$580$493 -
$590$502 -
$520$411 -
$650$585 -
$450$351 -
$360$306 -
$480$374 -
$80$76 -
$450$356 -
$550$468 -
$680$537 -
$320$288 -
$580$493 -
$450$356 -
$490$417 -
$550$435 -
$680$578 -
$680$537 -
$380$300 -
$390$332 -
$460$359 -
$580$493 -
$360$284 -
$390$332
相關主題
商品描述
Open source intelligence (OSINT) and web reconnaissance are rich topics for infosec professionals looking for the best ways to sift through the abundance of information widely available online. In many cases, the first stage of any security assessment―that is, reconnaissance―is not given enough attention by security professionals, hackers, and penetration testers. Often, the information openly present is as critical as the confidential data.
Hacking Web Intelligence shows you how to dig into the Web and uncover the information many don't even know exists. The book takes a holistic approach that is not only about using tools to find information online but also how to link all the information and transform it into presentable and actionable intelligence. You will also learn how to secure your information online to prevent it being discovered by these reconnaissance methods.
Hacking Web Intelligence is an in-depth technical reference covering the methods and techniques you need to unearth open source information from the Internet and utilize it for the purpose of targeted attack during a security assessment. This book will introduce you to many new and leading-edge reconnaissance, information gathering, and open source intelligence methods and techniques, including metadata extraction tools, advanced search engines, advanced browsers, power searching methods, online anonymity tools such as TOR and i2p, OSINT tools such as Maltego, Shodan, Creepy, SearchDiggity, Recon-ng, Social Network Analysis (SNA), Darkweb/Deepweb, data visualization, and much more.
- Provides a holistic approach to OSINT and Web recon, showing you how to fit all the data together into actionable intelligence
- Focuses on hands-on tools such as TOR, i2p, Maltego, Shodan, Creepy, SearchDiggity, Recon-ng, FOCA, EXIF, Metagoofil, MAT, and many more
- Covers key technical topics such as metadata searching, advanced browsers and power searching, online anonymity, Darkweb / Deepweb, Social Network Analysis (SNA), and how to manage, analyze, and visualize the data you gather
- Includes hands-on technical examples and case studies, as well as a Python chapter that shows you how to create your own information-gathering tools and modify existing APIs
商品描述(中文翻譯)
開放源代碼情報(OSINT)和網絡偵查是資訊安全專業人員尋找在網絡上廣泛可用的大量信息的最佳方法。在許多情況下,任何安全評估的第一階段,即偵查,並未受到足夠的重視,這一點對於安全專業人員、駭客和滲透測試人員來說都是如此。通常,公開存在的信息與機密數據一樣重要。
《網絡情報入侵》向您展示如何深入研究網絡並發現許多人甚至不知道存在的信息。本書採用了一種全面的方法,不僅關於使用工具在線尋找信息,還關於如何將所有信息聯繫起來並將其轉化為可呈現和可操作的情報。您還將學習如何保護您的信息,以防止它被這些偵查方法發現。
《網絡情報入侵》是一本深入的技術參考書,介紹了您在安全評估期間從互聯網中發掘開放源代碼信息所需的方法和技術。本書將向您介紹許多新的和領先的偵查、信息收集和開放源代碼情報方法和技術,包括元數據提取工具、高級搜索引擎、高級瀏覽器、強大的搜索方法、在線匿名工具(如TOR和i2p)、OSINT工具(如Maltego、Shodan、Creepy、SearchDiggity、Recon-ng)、社交網絡分析(SNA)、暗網/深網、數據可視化等等。
本書的特點包括:
- 提供了一種全面的OSINT和網絡偵查方法,向您展示如何將所有數據整合成可操作的情報
- 重點介紹了TOR、i2p、Maltego、Shodan、Creepy、SearchDiggity、Recon-ng、FOCA、EXIF、Metagoofil、MAT等實用工具
- 涵蓋了元數據搜索、高級瀏覽器和強大的搜索、在線匿名、暗網/深網、社交網絡分析(SNA)等關鍵技術主題,以及如何管理、分析和可視化您收集的數據
- 包括實用的技術示例和案例研究,以及一個Python章節,向您展示如何創建自己的信息收集工具和修改現有的API。