The skills and tools for collecting, verifying and correlating information from different types of systems is an essential skill when tracking down hackers. This book explores Open Source Intelligence Gathering (OSINT) inside out from multiple perspectives, including those of hackers and seasoned intelligence experts. OSINT refers to the techniques and tools required to harvest publicly available data concerning a person or an organization. With several years of experience of tracking hackers with OSINT, the author whips up a classical plot-line involving a hunt for a threat actor. While taking the audience through the thrilling investigative drama, the author immerses the audience with in-depth knowledge of state-of-the-art OSINT tools and techniques. Technical users will want a basic understanding of the Linux command line in order to follow the examples. But a person with no Linux or programming experience can still gain a lot from this book through the commentaries.
This book's unique digital investigation proposition is a combination of story-telling, tutorials, and case studies. The book explores digital investigation from multiple angles:
Through the eyes of the author who has several years of experience in the subject. Through the mind of the hacker who collects massive amounts of data from multiple online sources to identify targets as well as ways to hit the targets. Through the eyes of industry leaders. This book is ideal for:
Investigation professionals, forensic analysts, and CISO/CIO and other executives wanting to understand the mindset of a hacker and how seemingly harmless information can be used to target their organization.
Security analysts, forensic investigators, and SOC teams looking for new approaches on digital investigations from the perspective of collecting and parsing publicly available information.
CISOs and defense teams will find this book useful because it takes the perspective of infiltrating an organization from the mindset of a hacker. The commentary provided by outside experts will also provide them with ideas to further protect their organization's data.
Last month, I reviewed Tribe of Hackers Security Leaders: Tribal Knowledge from the Best in Cybersecurity Leadership, and referenced the classic hacking series Hacking Exposed: Network Security Secrets & Solutions by Stuart McClure, Joel Scambray and George Kurtz.
Obviously, there has been a tremendous amount of change in the past 20 years of hacking tools and techniques. In Hunting Cyber Criminals: A Hacker's Guide to Online Intelligence Gathering Tools and Techniques, Vinny Troia has written a splendid guide on hacking, with a focus on its investigative techniques.
Troia is well-known in the security world and has a habit of finding massive sets of highly confidential data in highly unsecured locations. From All American Entertainment to Exactis and others, Troia has found large buckets of unsecured data in the cloud.
The book goes through not only a vast amount of hacking tools, but it also details how to use them to perform a thorough investigation. The goal is not to simply download the most tools and run them; instead, it is to use them in a structured manner to perform effective intelligence gathering and investigations.
Troia also details his mission to discover the real-life identity of The Dark Overlord (TDO). TDO was an international hacker group that targeted high-profile targets and threatened to release embarrassing data and pictures of the victims unless they were paid. If the victims didn't pay, TDO put the data up for sale and also shared it via numerous forums.
As I write this, there are tens of thousands of brilliant scientists working to find a cure for COVID-19. But there might be just as many attackers attempting to use COVID-19 as a means to launch attacks. From phishing emails, malicious COVID-19 information websites with malware and more, hackers are using the current crisis to further their goals.
For those who have been a victim of such attacks, the book shows numerous ways and details many tools to discover clues to identify who the attackers were.
From a more proactive perspective, the book shows the many ways in which to test systems, identify data flow, test web applications and more to ensure that vulnerabilities are fixed before they can be exploited.
Rather than rely on him alone, Troia includes many expert tips from industry luminaries such as Chris Roberts, Troy Hunt, Chris Hadnagy and others. With these tips, the experts show how to more effectively use the specific tools, and avoid many of the pitfalls they first ran into.
I have always disliked webinars and articles with titles such as To Beat a Hacker, You Have to Think Like a Hacker and How to Think Like a Hacker. The truth is that most people simply do not know how to think like a hacker. That is not their fault; they also don’t know how to think like a neurosurgeon or civil engineer. With that, Hunting Cyber Criminals, in fact, does a great job of showing how it is possible to think like a hacker, except a white hat in this case. And you want to do that to make sure you do not become a victim of a black hat.
A useful guide to using OSINT tools and techniques to investigate threat actors, explaining how to collect data about files and people from networks and websites. The book is structured around the dramatic story of Troia's multi-year investigation into The Dark Overlord (TDO) threat actor group, and the book includes chat excerpts and screenshots. The many tools are a mix of free and paid, and Troia says you generally get what you pay for. He's a big fan of Maltego, but doesn't cover it in this book because he says there are so many other books that cover it.
This isn't a book for beginners; Troia expects you to keep up without giving much explanation for novices.
Cryptocurrency data to research • Number of transactions • Value received over time • Current value • Date of 1st transaction • Date of last transaction • Transaction patterns
Certificate Transparency and Internet Archives Certificate Transparency makes TLS certs publicly viewable. You can find subdomains and related domains.
Iris by DomainTools DomainTools Iris (paid): most comprehensive historical domain registration search tool, full threat intelligence and investigation platform focused on providing context on threats with domain registration and passive DNS data.
To more accurately geolocate IP addresses, do a traceroute on the IP address of the target, take the IP address of the last routing hop, and geolocate that IP address instead.
Profile Tracking and Password Reset Clues To track threat actor, create a spreadsheet with 3 sheets/tabs: accounts (website accounts), verifications (password reset and verification question information), dumps (data from password dumps and other hacked data).
Passwords, Dumps, and Data Viper https://snusbase.com: thousands of data dumps of major sites