O'Reilly logo

Securing Social Media in the Enterprise by Henry Dalziel

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 5

Aggregators

This chapter discusses automating certain attacks. Several aggregators are introduced to help with a little bit of heavy lifting.

Keywords

Automation; Snoopy; Maltego

We’ve talked a lot about a very high level methodology and how to execute it, and we’ve gone into a few examples of how you can look at certain things. The topic is really huge.

We also want to talk a little bit about automation, because although it’s possible to do all of this manually and it’s definitely one of the best vectors when you’re starting to learn these things, if you’re doing this work on a regular basis, automating certain attacks is a great force multiplier. We want to look at some measures that will help with a little bit of heavy lifting.

Aggregators ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required