Index

As this ebook edition doesn't have fixed pagination, the page numbers below are hyperlinked for reference only, based on the printed edition of this book.

A

access controls 25

Active Directory (AD) 83

active information gathering 80-82

Address Resolution Protocol (ARP) 83, 144

AdGuard Desktop app 226

Advanced Encryption Standard (AES) 143, 265-279

AFLogical OSE 94

AltDNS 78

AMASS 77

Andriller 93

Android

privacy and anonymity, improving on 207, 208

Android Data Extractor Lite 94

Android devices

app tracking, blocking on 209

AndroRAT 93

anonymity 161-165

anonymizers 250

advantages 250

Hide My Ass (HMA) 254

Kproxy 254, 255

ProxySite 255

Zendproxy 251, 252

Anonymouse 252, 253

reference link 252

anti-tracking software 225

features 227-230

options 225-227

application-level attacks 133

Application Programming Interfaces (APIs) 105

applications

preparing, for anonymity 208, 209

app tracking

blocking, by iOS devices 210-212

blocking, on Android devices 209, 210

app tracking transparency (ATT) 214

artifacts

collecting 126

artifacts, that competitors collect

direct web tracking cookies 134

third-party tracking cookies 134

tracking cookies 134

attack

phases 76

attacker

motivation 36, 37

Attack Simulator 100

attack surface, with sensitive data

botnets 46

entry points and bots, creating 42-46

increasing 39-42

zombie 46

authentication 181

definition 156

Authentication, Authorization, and Accounting (AAA) 277

authentication methods

biometric authentication 159

credit bureau-based authentication 157

database-based authentication 157

knowledge-based authentication (KBA) 156

multi-factor authentication (MFA) 156

online authentication 157-159

authorization 159, 181

Avast AntiTrack Premium 227

Azure Active Directory 159

conditional access policies 159

B

baiting 95

balenaEtcher

download link 273

behavior-tracking applications

avoiding 213-215

best practices, cyber anonymity maintenance

connectivity, securing 177

cookies, disabling 172

disposable email addresses, using 176

overexposure, avoiding 176

personnel assistance programs 177

safe network, using 172

secure browser, using 172

secure device, using 172

secure email service, using 175

sensitive or personal information sharing, avoiding 176

stronger password, using 173-175

user secure storage 176

VPN, using 168-172

biometric authentication 159

Bitcoin 287

botnets 46

Brave browser 137, 138, 226

bring your own device (BYOD) 29, 247

broadband connections 184

browser extensions 215-217

functionalities 217-225

browsers

avoiding 213-215

information, compromising 145-150

brute forcing 88

burner phone 239

Business Process Outsourced (BPO) 10

C

cable connections 184

caches

using 268, 269

castle security implementation 45

CCleaner 228

censorship circumvention 267

censorship-circumvention networks 270

Censys

reference link 40

Cerberus 93

chain letters 94

choose your own device (CYOD) 32

Citrix Hypervisor 197

Cliqz 226

closed-circuit television (CCTV) 96

coaxial cables 184

Comma-Separated Value (CSV) file 256

Common User Passwords Profiler (CUPP) 173

compromised credentials 133

computer- and mobile-based social engineering 94

baiting 95

chain letters 94

fake SMS messages 95

hoax letters 94

malicious apps 95

phishing 94

quid pro quo 95

scareware 95

spam messages 94

spear phishing 94

targeted chatting 95

conditional access policies

client apps 160

device platforms 159

filter for devices 160

locations 159

sign-in risk level 159

user risk level 159

connections 183

broadband connections 184

cable connections 184

dial-up connections 183

DSL connections 184

Ethernet 185

fiber connections 184

leased lines 184

mobile broadband 185

Wi-Fi connection 185

connectivity

planning 183

contact numbers

using 235-238

cookies 126

handling 134, 135

credit bureau-based authentication 157

cupp.py 173

download link 173

cyber anonymity 14-18

best practices, for maintenance 168

definition 155, 156

levels 165

mindset, developing 178, 179

cyber exposure index 50

WHOIS records 50-52

cyberspace

email address, exposing 56

privacy 12-14

privacy, layers 12, 13

sensitive information, exposing 54-61

D

dark web 113, 265

data

deleting, before disposal of devices 68-70

database-based authentication 157

data privacy 8

deep web 76

default configurations and passwords 45

device configurations

firewalls, enabling 191

Wi-Fi Protected Setup (WPS) configuration 191

devices

artifacts 91-93

compromising 138-141

preparing 194-196

dial-up connections 183

dictionary attack 88

Digital Subscriber Line (DSL) connections 184

discretionary access control (DAC) 26, 27

disposable email service providers

list 236

disposable mail

using 235-238

distributed denial-of-service (DDoS) attacks 46

DNS poisoning 121

DNSRecon 78

DNS servers 84

domain mapping 84

DuckDuckGo 225, 226

duckyScript language 93

dumpster diving 95

dynamic chain 263

Dynamic Host Control Protocol (DHCP) 197

E

eavesdropping 96

Electrum 287

email address

exposing 56, 57

email alias

service providers 52

Email Extractor

reference link 56

endpoints 138

endpoint security 138

entry points and bots

creating 42-44

enum4linux tool 86

enumeration 82-86

techniques 83

Ethernet 185

evil twin 99, 121

Exif Purge tool

download link 68

ExpressVPN 279

features 279

reference link 279

F

FakeINFO 66

fake SMS messages 95

Federal Bureau of Investigation (FBI) 14

fiber connections 184

Fifth-Generation (5G) wireless 185

File Transfer Protocol (FTP) 250

firewalls

enabling 191

Five Eyes (FVEY) 175

Fourth-Generation (4G) wireless 185

FoxyProxy

download link 257

free proxy servers 255-259

FTK Imager Lite 93

G

General Data Protection Regulation Act (GDPR) 234

Geonode

reference link 256

Geonode free proxy list

reference link 258

Google 107

Google Advanced Search 111, 112

reference link 111

Google Chrome

third-party cookies, disabling on 135

Google dorks 77, 107-111

Google hacking 77

Google Hacking Database (GHDB) 109

reference link 109

Gophish 99

Graphical User Interface (GUI) 14

guest access 190

H

HexChat 286

Hide My Ass (HMA) 254

hoax letters 94

home network

securing 186, 187

host records 84

human-based social engineering 95

dumpster diving 95

eavesdropping 96

impersonating users 95

piggybacking 96

shoulder surfing 96

Hydra 89

Hypertext Transfer Protocol (HTTP) 250

Hypertext Transfer Protocol Secure (HTTPS) 118, 177

Hyper-V 196

I

Icedrive 176

identity exposure 87, 88

identity theft 20-24

impersonation 20-24

information

categorization 4

Information and Event Management (SIEM) 101

information gathering 76, 77

active information gathering 80-82

passive information gathering 77, 78

Infosec IQ 100

Internet of Things (IoT) 138

Internet Service Providers (ISPs) 12, 55, 59, 134, 183, 250

intrusion detection system (IDS) 45

Intrusion Prevention Systems (IPSs) 45, 101

iOS devices

app tracking, blocking by 210-212

IP addresses 59, 60

extracting, ways 60, 61

using, instead of URL 267

iPhone

privacy and anonymity, improving on 207, 208

J

Java Script Object Notation (JSON) file 256

K

Kali Linux 202

KeePass password manager

example 64

KeePassXC 286

Kernel Virtual Machine (KVM) 197

Knock 78

knowledge-based authentication (KBA) 156

Kodachi 203

Kproxy 254, 255

L

latency 260

leased lines 184

Least-Permission Policy (LPP) 182

level of access 192

administrators of superuser access level 192

protected items access level 192

registered users 192

unregistered or anonymous users 192

levels, cyber anonymity

level 0 – no identification of user 167

level 1 – anonymous identification 166

level 2 – pen-name identification 166

level 3 – latent or potential identification 166

level 4 – usual identification 166

level 5 – super-identification 165

super-anonymous level 168

Lightweight Directory Access Protocol (LDAP) 40, 141

Linux Lite 202

Linux Memory Extractor 94

live boot versions

using 201, 202

live OS 271, 272

Local Area Network (LAN) 185, 276

Local Security Authority (LSA) 139

locanto

URL 72

logless services 281

LSA Subsystem Service (LSASS) 139

M

mail

URL 63

malicious apps 95

Maltego 59, 99, 103-107

malware 45

malware attacks 126

ransomware 133

spyware 131-133

trojans 129-131

viruses 127, 128

worms 128, 129

mandatory access control (MAC) 28

man-in-the-middle attacks (MITM attacks) 121

Medusa 89

image

meta data removing, before sharing 67, 68

Microsoft Edge

third-party cookies, disabling on 136

mirrors

using 268, 269

mobile application management (MAM) 29

mobile broadband 185

mobile device management (MDM) 29

mobile emulators 197

modern IT systems

cloud identities 88

hybrid identities 88

linked identities 88

on-premises identities 88

Monero 287

Mozilla Firefox

third-party cookies, disabling on 136, 137

types 29, 123, 156

Multi Factor Authentication (MFA) 63

MX records 84

MyLastSearch 149

N

National Vulnerability Database (NVD)

URL 35

Near-Field Communication (NFC) 193

NetBIOS cache 86

network

accessing, by attackers 141-144

cloned session 144, 145

network capturing 12

Network Mapper (Nmap) 262

network name 190

New Technology File System (NTFS) files 26

non-discretionary access control (RBAC) 28

NordVPN 279

features 280

reference link 279

O

offline password cracking 89-91

One Time Password (OTP) 58, 122, 176, 237

online authentication 157-159

online password cracking 88, 89

OnonShare 286

Open Handset Alliance 195

open-source intelligence (OSINT) 61, 76, 103

Open Virtual Appliance 284

OpenVPN 277

open Wi-Fi 117

risks 118-121

risks, minimizing with 122, 123

open Wi-Fi connectivity 117

open Wi-Fi networks 116

operating systems

boot option 15

P

Parrot Security 202

passive information gathering 77, 78

passphrase generation

references 174

password attacks 45

password cracking

offline password cracking 89-91

online password cracking 88, 89

password managers 63

Patator 89

pCloud 176

Peppermint OS 202

personal information 4

disclosing, risks 61-66

versus sensitive information 4

Personally Identifiable Information (PII) 4, 60, 65, 123

phishing attacks 94, 124, 133

phishing sites 124

physical access 91

physical controls 32-34

piggybacking 96

point-to-site VPNs 276

portable applications 243-245

potentially unwanted programs (PUPs) 228

Preinstallation Environment (PE) 16

Pretty Good Privacy (PGP) encryption 53

privacy 162-164

Private Internet Access (PIA) 280

reference link 280

PrivateVPN 280

features 280

reference link 280

procedural controls 31, 32

Proton

reference link 63

Proxifier 260-262

download link 260

proxy 250

ProxyChains 250, 259, 262-264

capabilities 262

modes 263

ProxyHam 186

proxy servers 270

ProxySite 255

Psiphon 271

download link 270

public IP address

URL 169

Public Switching Telephone Network (PSTN) 183

Puppy Linux 202

Q

QEMU 197

Qubes OS 203, 275, 276

download link 275

quid pro quo 95

R

random chain 263

RapidTables

reference link 268

raw data

creating, sensitive information 11, 12

Read-Only Memory (ROM) 189

recovered vulnerability

exploit 35, 36

Red Hat Virtualization 197

relays 266

remote access tool (RAT) 39

Remote Desktop Protocol (RDP) 40

Research in Motion (RIM) 195

Reverse Image Search 112

reference link 112

rogue access point 121

role-based access control (RBAC) 28-31

S

scareware 95

scope of access 181-183

searchable internet 113, 265

secure messaging apps

encryption 232-235

encryption, versions 232

using 230-232

Security Account Manager (SAM) 126, 139

sensitive information 4

forms 4-11

raw data, creating 11

versus personal information 4

Separation of Duties (SoD) 182

Sequencial Alignment Map (SAM) file 90

Service Set Identifiers (SSIDs) 99, 190

session hijacking attacks 133

shoulder surfing 96

Simple Phishing Toolkit 100

Single Sign-On (SSO) 181

site-to-site VPN 276

skokka

URL 72

sniffing 90

social engineering 94

computer- and mobile-based social engineering 94

human-based social engineering 95

social engineering attacks

preventing 100, 101

Social-Engineer Toolkit (SET) 96

social media 71

potential scams, identifying 74

scams 72

solutions, to minimize risks 73

usage, concerns 71

Social Searcher

URL 11

Social Security Number (SSN) 62

spam messages 94

spear phishing 94, 124, 133

strict chain 263

strong Wi-Fi password

configuring 188-190

SubBrute 78

Subgraph OS 203

Sublist3r 77

SUPERAntiSpyware 228-230

SuperPhisher 100

surface internet 265

sync 176

T

Tails 203, 272-275

benefits 272

download link 272

options, to connect to Tor 274

targeted chatting 95

technical controls 25

access controls 25

discretionary access control 26, 27

mandatory access control 28-31

TheHarvester 41

The Onion Router (Tor) 227, 264, 286

the tip of the iceberg 265

Third-Generation (3G) wireless 185

third-party cookies

disabling, on Google Chrome 135

disabling, on Microsoft Edge 136

disabling, on Mozilla Firefox 136, 137

Thunderbird 286

Time to Live (TTL) value 16

tools, for launching social engineering attacks

Maltego 99

Social-Engineer Toolkit (SET) 96-99

Wifiphisher 99

Tor proxy 264-266

Trusted Platform Module (TPM) 172

Two-Factor Authentication (2FA) 54, 156

TXT records 84

U

Ultimate Boot CD (UBCD) 16

unsecured cameras

risks 70

untroubled.org password generator 175

URL 174

URL encoding 268

USB Rubber Ducky 93

User Event Behavior Analysis (UEBA) 101

Uvrx File Search 114

Uvrx Health Search 116

Uvrx Social Search 113-116

V

virtual applications 245-247

using 241-243

VirtualBox 196

download link 284

Virtual Desktop 245-247

virtualization options

Citrix Hypervisor 197

Hyper-V 196

Kernel Virtual Machine (KVM) 197

mobile emulators 197

QEMU 197

Red Hat Virtualization 197

VirtualBox 196

VMware Fusion 197

VMware Workstation 197

VMware Workstation Player 197

virtual machines 196

creating 200

default gateway, configuring in NAT settings 199, 200

DHCP configuration 199

using 241-243

Virtual Network Editor 197, 198

virtual numbers 239-241

Virtual Private Network (VPN) 15, 29, 122, 161

VLC 287

VMware Fusion 197

VMware Workstation 197

VMware Workstation Player 197

voice over internet protocol (VOIP) 241

VPN solutions 270, 276-278

benefits 277

point-to-site VPN 276

site-to-site VPN 276

vulnerabilities

creating 37-39

creating, to compromise systems 34

vulnerable system 34, 35

VyprDNS 278

VyprVPN 278

reference link 278

W

Wappalyzer technology profiler 82

Wayback Machine 79, 80, 269, 270

URL 79, 269

web application

capabilities 193, 194

Website Attack Vectors 98

WHOIS

personnel information, removing from 67

WHOIS lookup 79

WHOIS records 50-52

email addresses 52, 53

mobile numbers 53, 54

Whonix-Gateway 284-286

Whonix OS 203, 282-287

download link 282

features 283, 284

Whonix-Workstation 284-286

Wi-Fi connection 185

Wi-Fi cracking tools 142

Wifiphisher 99

Wi-Fi Protected Access 2 (WPA2) 143

Wi-Fi Protected Access (WPA) 143

Wi-Fi Protected Setup (WPS) 191

Windows 10

privacy and anonymity, improving on 204-207

Wired Equivalent Privacy (WEP) 143

Wireshark 44

WPScan 85, 86

X

XP Psiphon 270

Z

Zendproxy 251, 252

zero days 39

zero-trust 45

implementation 161

zombie 46

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.217.248.255