Time
2 hours 26 minutes
Difficulty
Beginner
CEU/CPE
2

Video Transcription

00:00
Welcome back
00:01
In the last video, we brushed on social networks and some recommendations for your further studies in the US and context, And in this lesson, we will cover the ocean part concerning emails and user names.
00:14
Here you will learn how to find the correct email format learning. Is the email valid or not? And which email provider is involved concerning user names? I will mention a few of my favorite search websites,
00:28
if possible. It is always easier to search for a person when you have their email address. Because if your target has a well known or common name like John Smith okay, maybe that this is a bad example. But it is possible,
00:41
then your research can get very grating. One of the tools I like is hunter that I owe immune Italy. The free search feature will be good enough for your research
00:53
after you have found an email. It would be nice to know, Does it actually work?
00:58
Is the developed or not?
01:00
There are also a few good sources. Resource is out there, and I have to say that some of them give you false results. If you check a well known free male provider. But I would over recommend one which I like. It's called True Male that I owe. And based on my work, I found that it is reliable, but there can always change.
01:19
Sometimes it is good to know which email provider is behind your targets email, because based on bad info for an example, you can assume their exposure may be better to say. Are they more prone to phishing attacks?
01:33
It is not the same. If your target is using exchange online or a share hosted email with far less protection,
01:40
I will show you how you can find out bad information In a few steps,
01:46
bring up your terminal and we will use the N s look up command to see the DNS records.
01:53
So type anise. Look up,
01:55
press enter,
01:57
then to set the configuration
02:00
type set
02:01
space que
02:04
equals M X
02:06
and press enter
02:07
after that type D targets that remain that you're interested in. Let's check my domain.
02:14
I will type
02:15
de bourbon .net d o B a r the a n that
02:22
net.
02:23
This means good day in creation
02:27
and press enter. And as you can see, I use an exchange Microsoft Exchange system,
02:31
and that's it
02:34
regarding the user names. Although there at least a dozen services out there that provide this feature of checking the user name availability, I will mention two of them named Checker and known dot com.
02:47
This is the thing. When you haven't user name, you will be able to acquire much more data on the target. In the end, there is another perfect model of thinking called assumptions. We all know where they could lead us, but sometimes actually know, since more than often they can lead to a low hanging fruit.
03:07
The main reason is because we are human and humans think alike. You can always make an assumption of the email format, type it up in the search engine, maybe use some advanced search operators to be more efficient and see where that might take you.
03:22
In this video, we went over some of the ocean tools and techniques regarding e mails and user names, and in the next lesson, we will go over leaks and data breaches. So see you there

Up Next

Open Source Intelligence (OSINT) Fundamentals

In this Open Source Intelligence (OSINT) Fundamentals training course, you will gain fundamental knowledge about OSINT, who uses it, and the ethical implications of using it. Upon completion, students will have a solid understanding of OSINT.

Instructed By

Instructor Profile Image
Tino Sokic
CEO at DobarDan
Instructor