Prologue xxvChapter 1 Getting Started 1Chapter 2 Investigations and Threat Actors 19Part I Network Exploration 43Chapter 3 Manual Network Exploration 45Chapter 4 Looking for Network Activity (Advanced NMAP Techniques) 67Chapter 5 Automated Tools for Network Discovery 83Part II Web Exploration 119Chapter 6 Website Information Gathering 121Chapter 7 Directory Hunting 143Chapter 8 Search Engine Dorks 159Chapter 9 WHOIS 175Chapter 10 Certificate Transparency and Internet Archives 201Chapter 11 Iris by DomainTools 221Part III Digging for Gold 243Chapter 12 Document Metadata 245Chapter 13 Interesting Places to Look 267Chapter 14 Publicly Accessible Data Storage 293Part IV People Hunting 323Chapter 15 Researching People, Images, and Locations 325Chapter 16 Searching Social Media 349Chapter 17 Profile Tracking and Password Reset Clues 377Chapter 18 Passwords, Dumps, and Data Viper 407Chapter 19 Interacting with Threat Actors 433Chapter 20 Cutting through the Disinformation of a 10-Million-Dollar Hack 453Epilogue 483Index 487
ABOUT THE AUTHORVINNY TROIA is a cybersecurity evangelist and hacker with Night Lion Security. He is an acknowledged expert in digital forensics investigations, security strategies, and security breach remediation. Vinny possesses deep knowledge of industry-standard security and compliance controls, is frequently seen providing security expertise on major TV and radio networks, and recently introduced Data Viper, his own threat intelligence and cyber-criminal hunting platform.