{"id":1924,"date":"2021-04-30T21:10:04","date_gmt":"2021-04-30T21:10:04","guid":{"rendered":"https:\/\/osintme.com\/?p=1924"},"modified":"2021-04-30T21:15:33","modified_gmt":"2021-04-30T21:15:33","slug":"my-recently-read-osint-security-books-recommendations","status":"publish","type":"post","link":"https:\/\/osintme.com\/index.php\/2021\/04\/30\/my-recently-read-osint-security-books-recommendations\/","title":{"rendered":"My recently read OSINT &#038; security books &#8211; recommendations"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"1924\" class=\"elementor elementor-1924\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-05f0091 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"05f0091\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-0bf3821\" data-id=\"0bf3821\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7f57270 elementor-widget elementor-widget-text-editor\" data-id=\"7f57270\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><em>\u201cI love the smell of book ink in the morning.\u201d<\/em><\/p><p><span class=\"quote-author-name\">&#8211; Umberto Eco<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-07a7b84 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"07a7b84\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-9fd7023\" data-id=\"9fd7023\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-b67fc8d elementor-widget elementor-widget-text-editor\" data-id=\"b67fc8d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The best way to learn open source intelligence gathering and to practice cyber security is hands on &#8211; few can argue with that.<\/p><p>But every practical training will need even a small element of theoretical grounding &#8211; as much as I personally prefer to keep that to the absolutely necessary minimum.<\/p><p>Self study can be a very effective (and cheap) way of learning, especially if you identify good resources, created by reputable experts.<\/p><p>Here are some of my personal recommendations for books that I recently found useful for learning OSINT and cyber security stuff:<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-0ade302 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"0ade302\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-23c9589\" data-id=\"23c9589\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-542e8cf elementor-widget elementor-widget-text-editor\" data-id=\"542e8cf\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li><strong>Open Source Intelligence Techniques<\/strong> by Michael Bazzell &#8211; considered by many the gold standard in OSINT. It&#8217;s heavy reading (literally, the book is massive, hundreds of pages) but it contains a variety of useful resources on multiple aspects of OSINT. The focus is not only on finding and preserving online evidence, but Bazzell (ex-FBI investigator) also puts emphasis on operational security and digital privacy.<\/li><\/ul><p>\u00a0<\/p><ul><li><strong>Cybersecurity Blue Team Toolkit<\/strong> by Nadean H Tanner &#8211; a reference manual that contains instructions on fundamental open source and free tools such as ping, tracert, PuTTY, pathping and more. One important caveat &#8211; while a lot of the material is very relevant and solid, some of the content in this book is already outdated and it badly needs an update.<\/li><\/ul><p>\u00a0<\/p><ul><li><strong>Operator Handbook<\/strong> by Joshua Picolet &#8211; a better and a more up to date version of the above resource, by a different author. It combines red team and blue team knowledge and areas of focus, with OSINT being a rather small section. This is a great resource on many topics, from malware, forensics, to networks and detailed techniques of incident response.<\/li><\/ul><p>\u00a0<\/p><ul><li><strong>Nowhere to Hide<\/strong> by Daniel Huang &#8211; released only 3 months after the Capitol Riots in the US, this book details some OSINT and investigative techniques used by the FBI to identify the suspects involved in storming the Capitol. The book details 36 actual real case studies and discusses the methodology applied that allowed the FBI secure criminal charges.<\/li><\/ul><p>\u00a0<\/p><ul><li><strong>Investigating Cryptocurrencies<\/strong> by Nick Furneaux &#8211; written for LE investigators or those in similar roles in the private sector, this book will teach you plenty of what you need to know about blockchain technologies and investigating digital assets. Ample examples and links, coupled with some great advice on how to trace movements of funds on what many people call Finance 2.0 decentralized networks.<\/li><\/ul><p>\u00a0<\/p><ul><li><strong>Practical Cyber Intelligence<\/strong> by Wilson Bautista &#8211; the &#8220;practical&#8221; part in the title might be an over-statement, yet this book has some useful nuggets of information on the functioning of cyber defense operation teams, threat intelligence, and IT operations in a corporate environment. Contains some operational models and frameworks, ideal for somebody who needs to learn high level information on how these things are structured and what purpose they serve.<\/li><\/ul><p>\u00a0<\/p><ul><li><strong>OSINT for the Staffing World!<\/strong> by Dean Da Costa &#8211; last and the least, I was not sure whether to include this in the recommendations due to the book&#8217;s poor formatting and evident lack of proof reading. Still, it contains useful lists of tools and links to OSINT resources. It is primarily aimed at recruiters, but can be helpful to people sourcing information just about anywhere.<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-3ae2584 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"3ae2584\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-8434190\" data-id=\"8434190\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1a717d4 elementor-widget elementor-widget-text-editor\" data-id=\"1a717d4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>* * *<\/p><p>So this is it. Short and sweet this week, due to other projects happening in the background.<\/p><p><strong>PS.<\/strong> I was asked to list some currently available online OSINT courses &#8211; I promise that when I find some time, I will do a deep dive into what is currently on offer out there and come back with some recommendations in the weeks to come.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Listing some of the books on OSINT and cyber security that I recently read.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"neve_meta_sidebar":"","neve_meta_container":"","neve_meta_enable_content_width":"","neve_meta_content_width":0,"neve_meta_title_alignment":"","neve_meta_author_avatar":"","neve_post_elements_order":"","neve_meta_disable_header":"","neve_meta_disable_footer":"","neve_meta_disable_title":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[18],"tags":[133,83,87],"class_list":["post-1924","post","type-post","status-publish","format-standard","hentry","category-digital-privacy-security","tag-books","tag-manuals","tag-training"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/osintme.com\/index.php\/wp-json\/wp\/v2\/posts\/1924","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/osintme.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/osintme.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/osintme.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/osintme.com\/index.php\/wp-json\/wp\/v2\/comments?post=1924"}],"version-history":[{"count":16,"href":"https:\/\/osintme.com\/index.php\/wp-json\/wp\/v2\/posts\/1924\/revisions"}],"predecessor-version":[{"id":1940,"href":"https:\/\/osintme.com\/index.php\/wp-json\/wp\/v2\/posts\/1924\/revisions\/1940"}],"wp:attachment":[{"href":"https:\/\/osintme.com\/index.php\/wp-json\/wp\/v2\/media?parent=1924"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/osintme.com\/index.php\/wp-json\/wp\/v2\/categories?post=1924"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/osintme.com\/index.php\/wp-json\/wp\/v2\/tags?post=1924"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}