Who this book is for
This book is designed for ethical hackers, penetration testers, law enforcement, and cybersecurity professionals who want to build a solid foundation and gain a better understanding of how reconnaissance-based attacks threaten organizations and their assets. Ethical hackers and penetration testers will find this book very useful when gathering and analyzing intelligence to gain insights into how a real threat actor will be able to compromise their targets.
In addition, law enforcement and ethical hackers can use the knowledge found within this book to find persons of interest and understand how organizations are leaking data that led to a cyber-attack. Furthermore, cybersecurity professionals will find this book useful in identifying the attack surface of their organizations and discovering exposed and vulnerable assets on their network, while understanding the behavior of adversaries.