September 2021
Intermediate to advanced
376 pages
9h 25m
English
No thief, however skillful, can rob one of knowledge, and that is why knowledge is the best and safest treasure to acquire.
—L. Frank Baum, The Lost Princess of Oz

The more you know about a victim, the more effectively you can influence their behavior. For example, a victim is more likely to click a phishing email if it’s sent by someone they know. In this chapter, we’ll explore some of the tools and techniques hackers use to learn about their victims. These tools search and catalog relevant publicly available information from the internet. You’ll use these tools to identify devices on the public internet that contain vulnerabilities ...