Emails and Usernames

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
or

Already have an account? Sign In »

Time
1 hour 56 minutes
Difficulty
Beginner
CEU/CPE
2
Video Transcription
00:00
Welcome back
00:01
in the last video we brushed on social networks and some recommendations for your further studies in the OHS in context. And in this lesson, we will cover the O's in part concerning emails and user names.
00:14
Here, you will learn how to find the correct email format. Learn Is the email valid or not? And which email provider is involved concerning user names? I will mention a few of my favorite search websites,
00:28
if possible. It is always easier to search for a person when you have their email address. Because if your target has a well known or a common name like John Smith okay, maybe that this is a bad example. But it is possible,
00:41
then your research can get very aggravating. One of the tools I like is hunter that I owe. And usually the free search feature will be good enough for your research.
00:53
After you have found an email, it would be nice to know, Does it actually work?
00:58
Is it valid or not?
01:00
There are also a few good sources. Resource is out there, and I have to say that some of them give you false results. If you check a well known free email provider. But I would always recommend one which I like. It's called True Male that I owe. And based on my work, I found that it is reliable. But that can always change.
01:19
Sometimes it is good to know which email provider is behind your targets email, because based on that info for an example, you can assume their exposure may be better to say. Are they more prone to phishing attacks?
01:33
It is not the same. If your target is using exchange online or a share hosted email with far less protection,
01:40
I will show you how you can find out that information in a few steps.
01:46
Bring up your terminal and we will use the N s look up command to see the DNS records.
01:53
So type anise. Look up,
01:55
press enter,
01:57
then to set the configuration
02:00
type set
02:01
space que
02:04
equals M X
02:06
and press enter.
02:07
After that, type the targets domain that you're interested in. Let's check my domain.
02:14
I will type
02:15
da bourbon dot net d o b a r d a n. That
02:22
net.
02:23
This means good day in creation
02:27
and presented. And as you can see, I use an Exchange Microsoft Exchange system,
02:31
and that's it
02:34
regarding the user names. Although there are at least a dozen services out there that provide this feature of checking the user name availability, I will mention two of them named Checker and no one dot com.
02:47
This is the thing. When you haven't user name, you will be able to acquire much more data on the target. In the end, there is another perfect model of thinking called assumptions. We all know where they could lead us, but sometimes actually know, since more than often they can lead to a low hanging fruit.
03:07
The main reason is because we are human and humans think alike. You can always make an assumption off the email format. Type it up in the search engine. Maybe use some advanced search operators to be more efficient and see where death might take you.
03:22
In this video, we went over some of the ocean tools and techniques regarding emails and user names, and in the next lesson, we will go over leaks and data bridges. So see you there
Up Next
Open Source Intelligence (OSINT) Fundamentals

In this Open Source Intelligence (OSINT) Fundamentals training course, you will gain fundamental knowledge about OSINT, who uses it, and the ethical implications of using it. Upon completion, students will have a solid understanding of OSINT.

Instructed By