Organizational Infrastructure Intelligence
As more systems and networks are connecting to the internet, there’s a lot more data and information publicly available to everyone around the world. Sometimes, organizations leak data about their assets and network infrastructure without realizing it, and this enables threat actors to strategically collect and analyze those data leaks to plan their future attacks on a target. As an aspiring ethical hacker, it’s important to understand the Tactics, Techniques, and Procedures (TTPs) that are commonly used by threat actors, and how such knowledge can be used to help organizations safeguard their infrastructure and reduce their attack surface to prevent a real hacker from compromising their systems and networks.
During the course of this chapter, you will learn how to use various online and offline tools to harvest data from the internet using Open Source Intelligence (OSINT) techniques to identify the infrastructure of an organization...