In the last video, we brushed on social networks and some recommendations for your further studies in the US and context, And in this lesson, we will cover the ocean part concerning emails and user names.
Here you will learn how to find the correct email format learning. Is the email valid or not? And which email provider is involved concerning user names? I will mention a few of my favorite search websites,
if possible. It is always easier to search for a person when you have their email address. Because if your target has a well known or common name like John Smith okay, maybe that this is a bad example. But it is possible,
then your research can get very grating. One of the tools I like is hunter that I owe immune Italy. The free search feature will be good enough for your research
after you have found an email. It would be nice to know, Does it actually work?
Is the developed or not?
There are also a few good sources. Resource is out there, and I have to say that some of them give you false results. If you check a well known free male provider. But I would over recommend one which I like. It's called True Male that I owe. And based on my work, I found that it is reliable, but there can always change.
Sometimes it is good to know which email provider is behind your targets email, because based on bad info for an example, you can assume their exposure may be better to say. Are they more prone to phishing attacks?
It is not the same. If your target is using exchange online or a share hosted email with far less protection,
I will show you how you can find out bad information In a few steps,
bring up your terminal and we will use the N s look up command to see the DNS records.
So type anise. Look up,
then to set the configuration
after that type D targets that remain that you're interested in. Let's check my domain.
de bourbon .net d o B a r the a n that
This means good day in creation
and press enter. And as you can see, I use an exchange Microsoft Exchange system,
regarding the user names. Although there at least a dozen services out there that provide this feature of checking the user name availability, I will mention two of them named Checker and known dot com.
This is the thing. When you haven't user name, you will be able to acquire much more data on the target. In the end, there is another perfect model of thinking called assumptions. We all know where they could lead us, but sometimes actually know, since more than often they can lead to a low hanging fruit.
The main reason is because we are human and humans think alike. You can always make an assumption of the email format, type it up in the search engine, maybe use some advanced search operators to be more efficient and see where that might take you.
In this video, we went over some of the ocean tools and techniques regarding e mails and user names, and in the next lesson, we will go over leaks and data breaches. So see you there