Hacking: The Next Generation P1
To successfully execute an attack against an organization, the attacker must first perform
reconnaissance to gather as much intelligence about the organization as possible.
Many traditional methods for gaining intelligence about targets still work today, such
as dumpster diving, querying public databases, and querying search engines. However,
new methods that rely on gathering information from technologies such as social networking
applications are becoming more commonplace. In this chapter, we will discuss
the traditional methods as well as how the new generation of attackers is able to abuse
new technologies to gather information....