Cyber intelligence. Exploiting public data to attack targets
The paper will explain some methodologies and tools used by researchers and attackers to obtain information from public sources on possible objectives. These techniques can be used to measure the degree of exposure of an objective as well as to design possible attack routes. The digital trace studied comes from the target himself as well as from the information provided by the systems.