Summary
During this chapter, you learned how images contain a lot of data that can be leveraged by adversaries to identify the location of a target and their whereabouts. In addition, you gained the skills to extract EXIF data from images and use it with global mapping systems to identify a target’s geo-location at the time the picture was taken. Furthermore, you learned how to collect and analyze intelligence on people and search data breaches to identify user credentials for gaining access to a target’s account, system, or network.
Lastly, you learned about the importance of performing wireless SIGINT as an ethical hacker and gained the hands-on skills for constructing a mobile wireless SIGINT infrastructure for war-driving, war-walking, and war-flying.
I hope this chapter has been informative and helpful for your journey in the cybersecurity industry. In the next chapter, Working with Active Reconnaissance, you will learn how to determine open ports and running...