Reconnaissance for Ethical Hackers by Glen D. Singh
Author:Glen D. Singh
Language: eng
Format: epub
Publisher: Packt
Published: 2023-01-15T00:00:00+00:00
Various online tools are commonly used to help ethical hackers quickly find the social media accounts of people and organizations. For instance, Social Searcher (www.social-searcher.com) enables you to find social media accounts based on mentions (hashtags), users, and trends.
The following snippet shows the results when I search my name on Social Searcher:
Figure 5.31 â Social Searcher
The preceding snippet is a proof-of-concept in which Iâve performed a lookup using my name, and the results show various social media profiles and posts Iâve made in the past. Similarly, an ethical hacker can use this online tool to quickly discover the social media profiles and accounts of a target, whether the target is a person or an organization.
Over the next few subsections, you will learn how to collect data on social media accounts using various tools and techniques.
Download
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Cryptography | Encryption |
Hacking | Network Security |
Privacy & Online Safety | Security Certifications |
Viruses |
Effective Threat Investigation for SOC Analysts by Yahia Mostafa;(6601)
Practical Memory Forensics by Svetlana Ostrovskaya & Oleg Skulkin(6325)
Machine Learning Security Principles by John Paul Mueller(6292)
Attacking and Exploiting Modern Web Applications by Simone Onofri & Donato Onofri(5969)
Operationalizing Threat Intelligence by Kyle Wilhoit & Joseph Opacki(5929)
Solidity Programming Essentials by Ritesh Modi(4054)
Microsoft 365 Security, Compliance, and Identity Administration by Peter Rising(3694)
Operationalizing Threat Intelligence by Joseph Opacki Kyle Wilhoit(3422)
Mastering Python for Networking and Security by José Manuel Ortega(3358)
Future Crimes by Marc Goodman(3351)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3337)
Blockchain Basics by Daniel Drescher(3306)
Learn Computer Forensics - Second Edition by William Oettinger(3182)
Incident Response with Threat Intelligence by Roberto Martínez(2910)
Mobile App Reverse Engineering by Abhinav Mishra(2889)
Mastering Bitcoin: Programming the Open Blockchain by Andreas M. Antonopoulos(2873)
The Code Book by Simon Singh(2832)
From CIA to APT: An Introduction to Cyber Security by Edward G. Amoroso & Matthew E. Amoroso(2785)
Building a Next-Gen SOC with IBM QRadar: Accelerate your security operations and detect cyber threats effectively by Ashish M Kothekar(2785)
