책 이미지

책 정보
· 분류 : 외국도서 > 컴퓨터 > 네트워킹 > 보안
· ISBN : 9781394357277
· 쪽수 : 448쪽
· 출판일 : 2025-09-30
목차
Foreword xix
Introduction xxi
What Does This Book Cover? xxi
Introducing the Guest Experts xxiv
Part I Underground Field Guide 1
Chapter 1 Where We Left Off 3
Where to Start? 3
Summary 10
Chapter 2 A Cybercrime Economy of Stolen Data 11
The Stolen Account Black Market 11
Infostealers 18
Stolen Account Markets 21
The Com aka Scattered Spider 25
Summary 28
Chapter 3 Dark Market Forums 29
Data Marketplaces 29
Verifying and Validating Your Data 41
Summary 46
Chapter 4 Publicly and Commercially Available Information 47
Defining PAI and CAI 48
Data Acquisition and Oversight 50
Open vs. Closed Networks 54
Dark Web Data 58
Please Secure Your Data 71
Summary 72
Part II Open-Source Intelligence 73
Chapter 5 OSINT 101 75
Open-Source Intelligence 77
The Battle for OSINT 82
A System Under Pressure: The 36-Star Memo 89
Funding and Governance 91
OSINT as a Core Discipline 94
Summary 96
Chapter 6 OSINT for National Security 97
A Strategic Shift Toward OSINT 98
Forward Momentum 101
OSINT’s Way Forward 108
Streamlining OSINT Efforts 111
Summary 116
Chapter 7 The Future of OSINT 117
Reimagining OSINT 119
A Path Forward 122
HPSCI OSINT Subcommittee 136
Summary 139
Chapter 8 Investigations 141
An OSINT Primer 142
Hunting Cyber Criminals: Cracked.io Edition 148
Summary 156
Chapter 9 OSINT for Human Trafficking 157
Child Sexual Abuse Material 158
Fighting Human Trafficking 161
Identifying ArtBBS 166
Searching for a Trafficked Child 171
Summary 174
Part III Working with Information 175
Chapter 10 Validation as Tradecraft 177
Disinformation 178
Data Validation 181
ETL Automation 195
Summary 196
Chapter 11 Dark Web Data Processing 197
Working with HBL Data 197
Cleaning CSV Files 201
Data Structure and Formatting 205
Processing Headers 213
Summary 220
Chapter 12 Data Loading and Extraction 221
ClickHouse 221
Aleph 239
Summary 242
Chapter 13 Data Analysis and AI 245
Asking Your First Question 246
Identifying Patterns (of Life) 249
Citations 261
Summary 264
Chapter 14 Gathering Human Intelligence 265
HUMINT 266
Crafting a Persona 277
Summary 290
Part IV Snowflake 291
Chapter 15 Setting the Stage 293
John Binns (aka irdev) 294
April 16, 2024 299
Connor Riley Moucka 306
Summary 310
Chapter 16 The First Few Victims 311
The Arrest Document 311
Victim-2 (Telecom) 312
Victim-5 (The Bank) 319
Victim-4 (Entertainment) 322
Summary 332
Chapter 17 Intrusion Analysis 333
Discovering Snowflake 333
Maintaining Persistent Access 339
EPAM and Initial Entry Point 346
Origin of the Stolen Credentials 355
Summary 360
Chapter 18 Breach Timelines and Disclosures 361
Victim Breach Timeline 362
June 28: Ticketek 380
Breach Disclosures 382
Summary 386
Chapter 19 Identifying Moucka 387
Catist’s Ego and Immaturity 388
Hunting Catist 392
Catist’s Arrest 395
Identifying Catist 397
Being Grey 400
Chapter 20 Epilogue 401
Loose Ends 401
Thank You! 402
Index 405