
Overview
- Teaches users how to utilize OSINT resources to gather/search information online
- Contains comprehensive coverage of the "underground Internet world" that is still considered vague for many Internet users
- Written in straightforward language—can also be used as a teaching guide or to complement current OSINT instruction
Access this book
Tax calculation will be finalised at checkout
Other ways to access
About this book
The author includes many OSINT resources that can be used by intelligence agencies as well as by enterprises to monitor trends on a global level, identify risks, and gather competitor intelligence so more effective decisions can be made. You will discover techniques, methods, and tools that are equally used by hackers and penetration testers to gather intelligence about a specific target online. And you will be aware of how OSINT resources can be used in conducting social engineering attacks.
Open Source Intelligence Methods and Tools takes a practical approach and lists hundreds of OSINT resources that can be used to gather intelligence from online public sources. The book also covers how to anonymize your digital identity online so you can conduct your searching activities without revealing your identity.
What You’ll Learn
- Identify intelligence needs and leverage a broad range of tools and sources to improve data collection, analysis, and decision making in your organization
- Use OSINT resources to protect individuals and enterprises by discovering data that is online, exposed, and sensitive and hide the data before it is revealed by outside attackers
- Gather corporate intelligence about business competitors and predict future marketdirections
- Conduct advanced searches to gather intelligence from social media sites such as Facebook and Twitter
- Understand the different layers that make up the Internet and how to search within the invisible web which contains both the deep and the dark webs
Who This Book Is For
Penetration testers, digital forensics investigators, intelligence services, military, law enforcement, UN agencies, and for-profit/non-profit enterprises
Similar content being viewed by others
Keywords
Table of contents (9 chapters)
Authors and Affiliations
About the authors
Rami Hijazi holds a master's degree in information technology (information security) from the University of Liverpool. He works for Mericler, Inc., an education and corporate training firm in Toronto, Canada. Rami is an experienced IT professional who lectures on a wide array of topics, including object-oriented programming, Java, e-commerce, agile development, database design, and data handling analysis. He also works as an information security consultant, where he is involved in the design of encryption systems and wireless networks, intrusion detection and data breach tracking, and planning and development advice for IT departments concerned with contingency planning.
Bibliographic Information
Book Title: Open Source Intelligence Methods and Tools
Book Subtitle: A Practical Guide to Online Intelligence
Authors: Nihad A. Hassan, Rami Hijazi
DOI: https://doi.org/10.1007/978-1-4842-3213-2
Publisher: Apress Berkeley, CA
eBook Packages: Professional and Applied Computing, Apress Access Books, Professional and Applied Computing (R0)
Copyright Information: Nihad A. Hassan, Rami Hijazi 2018
Softcover ISBN: 978-1-4842-3212-5Published: 01 July 2018
eBook ISBN: 978-1-4842-3213-2Published: 30 June 2018
Edition Number: 1
Number of Pages: XXIII, 354
Number of Illustrations: 144 b/w illustrations
Topics: Security