Part IVPeople Hunting
In This Part
- Chapter 15: Researching People, Images, and Locations
- Chapter 16: Searching Social Media
- Chapter 17: Profile Tracking and Password Reset Clues
- Chapter 18: Passwords, Dumps, and Data Viper
- Chapter 19: Interacting with Threat Actors
- Chapter 20: Cutting through the Disinformation of a 10‐Million‐Dollar Hack
This section focuses on the art of investigating people. The next few chapters will cover a wide array of technologies and techniques that range from simple social media research to leveraging information contained in breached databases. Throughout this section, I will also cover building a “tracking matrix,” which will help keep your information organized and, if done properly, will also help you organize your research in a way that will help you visually spot clues faster.
What better way to start this section than with a tip from the “Human Hacker”?
Get Hunting Cyber Criminals now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.