KALI LINUX OSINT 2025: Master Open Source Intelligence with High Performance Tools - Couverture souple

Rodrigues, Diego

 
9798266096769: KALI LINUX OSINT 2025: Master Open Source Intelligence with High Performance Tools

Synopsis

KALI LINUX OSINT 2025 Master Open Source Intelligence with High-Performance Tools

This book is intended for students and professionals who want to master open source intelligence and digital investigations with Kali Linux, exploring techniques, tools, and applications focused on current demands in cybersecurity, forensic analysis, and incident response. The 2025 edition brings practical updates and new content compared to the 2024 edition, expanding the focus on automation, social network analysis, scraping, dark web, metadata, geolocation, and integration of data collection workflows for real-world use in corporate environments, forensic investigations, and threat monitoring.

Going beyond the Kali Linux ecosystem, this guide includes indispensable tools and resources for OSINT professionals, forming a complete operational arsenal for advanced investigations.

You will learn to:

• Configure and optimize Kali Linux for OSINT

• Collect and analyze data from social networks and the dark web

• Use Maltego, theHarvester, SpiderFoot, Recon-ng, Shodan

• Perform web scraping, automation, and API integration

• Extract and analyze metadata from files and images

• Monitor threats, profiles, domains, IPs, and digital assets

• Automate data collection, validation, and reporting workflows

• Integrate anonymity, proxy, Tor, and operational security techniques

• Apply OSINT in corporate, competitive, and incident response investigations

By the end, you will be ready to implement modern OSINT solutions and advance your professional performance in threat analysis, digital forensics, and security intelligence.

kali linux, osint, digital investigation, data collection, cybersecurity, forensic analysis, automation, dark web, social networks, metadata, shodan, maltego, spiderfoot, recon-ng, web scraping, threat monitoring, forensics, anonymity, security intelligence

Les informations fournies dans la section « Synopsis » peuvent faire référence à une autre édition de ce titre.