Table of Contents

Cover image

Title page

Copyright

Preface

About the Authors

Acknowledgments

Chapter 1. Foundation: Understanding the Basics

Introduction

Internet

World Wide Web

Defining the basic terms

Web browsing—behind the scene

Lab environment

Chapter 2. Open Source Intelligence and Advanced Social Media Search

Introduction

Open source intelligence

How we commonly access OSINT

Web 2.0

Social media intelligence

Social network

Advanced search techniques for some specific social media

Web 3.0

Chapter 3. Understanding Browsers and Beyond

Introduction

Browser operations

History of browsers

Browser architecture

Browser features

Raw browsers

Some of the well-known custom browsers

Addons

Bookmark

Threats posed by browsers

Chapter 4. Search the Web—Beyond Convention

Introduction

Chapter 5. Advanced Web Searching

Introduction

Google

Bing

Yahoo

Yandex

Chapter 6. OSINT Tools and Techniques

Introduction

Creepy

TheHarvester

Shodan

Search Diggity

Recon-ng

Yahoo Pipes

Maltego

Chapter 7. Metadata

Introduction

Metadata extraction tools

Impact

Metadata removal/DLP tools

Chapter 8. Online Anonymity

Anonymity

Online anonymity

Why do we need to be anonymous

Ways to be anonymous

Chapter 9. Deepweb: Exploring the Darkest Corners of the Internet

Introduction

Why to use it?

Why not to use it?

Darknet services

Disclaimer

Chapter 10. Data Management and Visualization

Introduction

Data management and analysis tools

Chapter 11. Online Security

Introduction

Malwares

Phishing

Online scams and frauds

Hacking attempts

Weak password

Shoulder surfing

Social engineering

Antivirus

Identify phishing/scams

Update operating system and other applications

Addons for security

Tools for security

Password policy

Precautions against social engineering

Data encryption

Chapter 12. Basics of Social Networks Analysis

Introduction

Gephi

Node attributes

Edge attributes

Chapter 13. Quick and Dirty Python

Introduction

Chapter 14. Case Studies and Examples

Introduction

Case studies

Chapter 15. Related Topics of Interest

Introduction

Cryptography

Data recovery/shredding

Internet Relay Chat

Bitcoin

Index