Other Sellers on Amazon
Download the free Kindle app and start reading Kindle books instantly on your smartphone, tablet or computer – no Kindle device required. Learn more
Read instantly on your browser with Kindle Cloud Reader.
Using your mobile phone camera, scan the code below and download the Kindle app.
Enter your mobile phone or email address
By pressing ‘Send link’, you agree to Amazon's Conditions of Use.
You consent to receive an automated text message from or on behalf of Amazon about the Kindle App at your mobile number above. Consent is not a condition of any purchase. Message and data rates may apply.
Follow the Author
Hunting Cyber Criminals: A Hacker's Guide to Online Intelligence Gathering Tools and Techniques Paperback – Illustrated, 24 January 2020
Enhance your purchase
Frequently bought together
From the Publisher
ABOUT THE AUTHOR
VINNY TROIA is a cybersecurity evangelist and hacker with Night Lion Security. He is an acknowledged expert in digital forensics investigations, security strategies, and security breach remediation. Vinny possesses deep knowledge of industry-standard security and compliance controls, is frequently seen providing security expertise on major TV and radio networks, and recently introduced Data Viper, his own threat intelligence and cyber-criminal hunting platform.
From the Inside Flap
THE ART AND SCIENCE OF TRACKING CYBERCRIME TO ITS SOURCE
When your organization falls victim to cybercrime, you need to be ready to fight back. The burden of investigating digital security breaches often falls to organizations themselves, so developing a robust toolkit that enables you to track down criminals is essential. Hunting Cyber Criminals is filled with proven techniques to research the source of illicit network traffic, extract intelligence from publicly available web sources, and hunt the individuals who would do harm to your organization.
With easy-to-follow examples Hunting Cyber Criminals provides vital guidance on investigating cybersecurity incidents. It shows how, even starting from just a single IP address, you can embark on an investigative journey to uncover the information you need to shore up your defenses, involve law enforcement, and shut down hackers for good. Learn from Vinny Troia's unique methodology and the practical techniques used to investigate and identify members of the cyber terrorist group known as The Dark Overlord. Beyond the author's own expertise, you'll benefit from guest comments by fellow industry experts: Alex Heid, Bob Diachenko, Cat Murdoch, Chris Hadnagy, Chris Roberts, John Strand, Jonathan Cran, Leslie Carhart, Nick Furneux, Rob Fuller, Troy Hunt, and William Martin.
For cybersecurity and business professionals involved in developing cyber incident response strategies, this compendium of the latest tools, techniques, and resources will prove indispensable. Cybercrime is a reality, not just a possibility, in today's business environments. Readiness to respond starts here.
- Learn about the latest cybercrime investigation tools
- Uncover clues to identify and track hackers anywhere
- Use network discovery to follow unwanted network traffic
- Search web databases to gather intelligence and leads
- Use social media to identify probable perpetrators
- Master complex web scenarios and advanced search techniques
- Employ expert tips and tricks in your own investigations
ABOUT NIGHT LION SECURITY
Night Lion Security provides network, website, and IT security consulting, services. The company specializes in advanced penetration testing and IT risk management.
- Publisher : Wiley; 1st edition (24 January 2020)
- Language : English
- Paperback : 544 pages
- ISBN-10 : 1119540925
- ISBN-13 : 978-1119540922
- Dimensions : 18.54 x 3.05 x 22.86 cm
- Best Sellers Rank: 35,523 in Books (See Top 100 in Books)
- Customer Reviews:
About the author
Review this product
Top reviews from other countries
Vinny’s computer skills are self-taught and it shows during various tools descriptions. Listings are usually left with no explanations or only shallow ones. Sometimes, a given tool is run multiple times with different settings and all the reader gets is a notice that results changed, without a hypothesis why that happened. Perhaps it is all intentional to show the author’s interests in results and not in processes behind them, making the book allegedly easier to digest, but for me it was a bit off-putting. One example of such an oversimplification is a comment on searching for “similar” hash values. Similar hashes don’t prove anything, you need exact matches! Writing about “the same” hashes would take the same space and be factually correct.
The story is not really engaging. Perhaps it would be for someone with insider’s knowledge; to me it was a hodge-podge of random remarks and chat transcripts. But hey, maybe its jaggedness correctly illustrates the work of an OSINT investigator, juggling multiple forum handles and identities, trying to remember who lied to him about what. I have a strong conviction, though, that the book would be equally legible with even less details presented. Also, the author too often shows disregard towards threat actors which I find unprofessional.
I believe the book gives a good impression on Vinny’s work style and ethics, but - having little background in cybersecurity intelligence in general - I am curious if it pertains to other specialists in the area. The lecture gave me a mental image of an investigator frantically collating data from multiple tools (most of them paid), with not so much a method but rather a perseverance to parse it all. Perhaps it is the only way; what I know is that this book could do much better.
Reviewed in the United States on 13 March 2020