Table of Contents for
Hacking Web Intelligence
Close
Version ebook
/
Retour
Hacking Web Intelligence
by Nutan Kumar Panda
Published by Syngress, 2015
Hacking Web Intelligence
Cover image
Title page
Table of Contents
Copyright
Preface
About the Authors
Acknowledgments
Chapter 1. Foundation: Understanding the Basics
Chapter 2. Open Source Intelligence and Advanced Social Media Search
Chapter 3. Understanding Browsers and Beyond
Chapter 4. Search the Web—Beyond Convention
Chapter 5. Advanced Web Searching
Chapter 6. OSINT Tools and Techniques
Chapter 7. Metadata
Chapter 8. Online Anonymity
Chapter 9. Deepweb: Exploring the Darkest Corners of the Internet
Chapter 10. Data Management and Visualization
Chapter 11. Online Security
Chapter 12. Basics of Social Networks Analysis
Chapter 13. Quick and Dirty Python
Chapter 14. Case Studies and Examples
Chapter 15. Related Topics of Interest
Index
Table of Contents
Cover image
Title page
Table of Contents
Copyright
Preface
About the Authors
Acknowledgments
Chapter 1. Foundation: Understanding the Basics
Introduction
Internet
World Wide Web
Defining the basic terms
Web browsing—behind the scene
Lab environment
Chapter 2. Open Source Intelligence and Advanced Social Media Search
Introduction
Open source intelligence
How we commonly access OSINT
Web 2.0
Social media intelligence
Social network
Advanced search techniques for some specific social media
Web 3.0
Chapter 3. Understanding Browsers and Beyond
Introduction
Browser operations
History of browsers
Browser architecture
Browser features
Raw browsers
Some of the well-known custom browsers
Addons
Bookmark
Threats posed by browsers
Chapter 4. Search the Web—Beyond Convention
Introduction
Chapter 5. Advanced Web Searching
Introduction
Google
Bing
Yahoo
Yandex
Chapter 6. OSINT Tools and Techniques
Introduction
Creepy
TheHarvester
Shodan
Search Diggity
Recon-ng
Yahoo Pipes
Maltego
Chapter 7. Metadata
Introduction
Metadata extraction tools
Impact
Metadata removal/DLP tools
Chapter 8. Online Anonymity
Anonymity
Online anonymity
Why do we need to be anonymous
Ways to be anonymous
Chapter 9. Deepweb: Exploring the Darkest Corners of the Internet
Introduction
Why to use it?
Why not to use it?
Darknet services
Disclaimer
Chapter 10. Data Management and Visualization
Introduction
Data management and analysis tools
Chapter 11. Online Security
Introduction
Malwares
Phishing
Online scams and frauds
Hacking attempts
Weak password
Shoulder surfing
Social engineering
Antivirus
Identify phishing/scams
Update operating system and other applications
Addons for security
Tools for security
Password policy
Precautions against social engineering
Data encryption
Chapter 12. Basics of Social Networks Analysis
Introduction
Gephi
Node attributes
Edge attributes
Chapter 13. Quick and Dirty Python
Introduction
Chapter 14. Case Studies and Examples
Introduction
Case studies
Chapter 15. Related Topics of Interest
Introduction
Cryptography
Data recovery/shredding
Internet Relay Chat
Bitcoin
Index
List of Figures
Figures in Chapter 1
Figure 1.1
Figures in Chapter 2
Figure 2.1
Figure 2.2
Figure 2.3
Figure 2.4
Figure 2.5
Figure 2.6
Figures in Chapter 3
Figure 3.1
Figure 3.2
Figure 3.3
Figure 3.4
Figure 3.5
Figure 3.6
Figures in Chapter 4
Figure 4.1
Figure 4.2
Figure 4.3
Figure 4.4
Figure 4.5
Figure 4.6
Figure 4.7
Figure 4.8
Figure 4.9
Figure 4.10
Figure 4.11
Figure 4.12
Figure 4.13
Figure 4.14
Figure 4.15
Figures in Chapter 5
Figure 5.1
Figure 5.2
Figure 5.3
Figure 5.4
Figure 5.5
Figure 5.6
Figure 5.7
Figure 5.8
Figure 5.9
Figures in Chapter 6
Figure 6.1
Figure 6.2
Figure 6.3
Figure 6.4
Figure 6.5
Figure 6.6
Figure 6.7
Figure 6.8
Figure 6.9
Figure 6.10
Figure 6.11
Figure 6.12
Figure 6.13
Figure 6.14
Figure 6.15
Figure 6.16
Figure 6.17
Figure 6.18
Figure 6.19
Figure 6.20
Figure 6.21
Figure 6.22
Figure 6.23
Figure 6.24
Figure 6.25
Figure 6.26
Figure 6.27
Figure 6.28
Figure 6.29
Figure 6.30
Figures in Chapter 7
Figure 7.1
Figure 7.2
Figure 7.3
Figure 7.4
Figure 7.5
Figure 7.6
Figure 7.7
Figure 7.8
Figure 7.9
Figure 7.10
Figures in Chapter 8
Figure 8.1
Figure 8.2
Figure 8.3
Figure 8.4
Figure 8.5
Figure 8.6
Figure 8.7
Figure 8.8
Figure 8.9
Figure 8.10
Figure 8.11
Figure 8.12
Figure 8.13
Figure 8.14
Figure 8.15
Figure 8.16
Figure 8.17
Figure 8.18
Figures in Chapter 9
Figure 9.1
Figure 9.2
Figure 9.3
Figure 9.4
Figure 9.5
Figure 9.6
Figure 9.7
Figure 9.8
Figure 9.9
Figure 9.10
Figure 9.11
Figure 9.12
Figure 9.13
Figure 9.14
Figure 9.15
Figure 9.16
Figure 9.17
Figure 9.18
Figure 9.19
Figure 9.20
Figure 9.21
Figures in Chapter 10
Figure 10.1
Figure 10.2
Figure 10.3
Figure 10.4
Figure 10.5
Figure 10.6
Figure 10.7
Figure 10.8
Figure 10.9
Figure 10.10
Figures in Chapter 11
Figure 11.1
Figure 11.2
Figure 11.3
Figure 11.4
Figure 11.5
Figures in Chapter 12
Figure 12.1
Figure 12.2
Figure 12.3
Figure 12.4
Figure 12.5
Figures in Chapter 13
Figure 13.1
Figure 13.2
Figure 13.3
Figure 13.4
Figure 13.5
Figure 13.6
Figure 13.7
Figure 13.8
Figure 13.9
Figure 13.10
Figure 13.11
Figures in Chapter 14
Figure 14.1
Figure 14.2
Figure 14.3
Figures in Chapter 15
Figure 15.1
Figure 15.2
Figure 15.3
Figure 15.4
List of Tables
Landmarks
Cover image
Title page
Table of Contents
i
ii
iii
iv
xiii
xiv
xv
xvii
1
2
3
4
5
6
7
8
9
10
11
12
13
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281