July 2018
Beginner
564 pages
12h 22m
English
In this section, let's see how we can build up an attack strategy against our target, which is a person named Zaid. Before we move ahead, we will organize the workspace so that we can come up with ideas. For our example, we are going to keep only the useful information such as Udemy. We are going to put Zaid, who is our main entity, at the top, and then just click and drag an arrow from the email address so that we know that Zaid is associated with the zaid@isecur1ty.org address. Zaid is associated with the zaid@isecur1ty.org email, which led us to isecur1ty.org. And then we're going to add another arrow from Zaid to his Twitter account, so that we know that this Twitter account is associated with this person, ...