Harvesting email addresses for OSINT [FREE COURSE CONTENT]

(826 views)

In this video from our OSINT for Hackers online course by Atul Tiwari you will learn how to use the Harvester in combination with Shodan to collect email addresses for intelligence gathering. It's a routine task every hacker should be able to perform, so if you are unsure on how to proceed, this tutorial will help you out. Jump in and enjoy! 



In the age of social networking where people post everything about themselves over the insecure internet, it becomes easy to hunt for or harvest information with the help of open source intelligence gathering. The only thing we are required is to use is the right set of mind with the right set of open source tools.

We can get almost everything, from credit card numbers to social security numbers, personal data, complete profiles of any person, vulnerable and misconfigured servers, private or internal IP addresses of an organization, passwords for admin panel, geo-location of IP addresses; more than 80 percent of the desired information can be obtained using only OSINT (Open Source Intelligence gathering).

This course is focused only on OSINT tools that are free to use. We have used numerous such tools that act as a silver bullet in terms of accessing public sources. In module 1, starting with DNS enumeration, getting useful URLs, IP and host finder, we will dive into harvesting email addresses anonymously and finding information about an email. Google dork or Google hacking database will play a crucial role in finding the complete information about anything deeply. Netcraft, web archives, and cached data will complete this module with outstanding command over all the topics discussed. You can start OSINT straight from here.

The exercises of the module focus on: 

  • Harvesting email addresses
  • Using Google dorks to find hidden data
  • Searching for cached data
  • Using Automater
  • Gathering DNS records

[custom-related-posts title="Other courses by Atul" none_text="None found" order_by="title" order="ASC"]

April 25, 2022
Subscribe
Notify of
guest
1 Comment
Newest
Oldest Most Voted
Inline Feedbacks
View all comments
Dreycko
3 years ago

Excelente curso este es el pilar para realizar un buen trabajo de seguridad informática   

© HAKIN9 MEDIA SP. Z O.O. SP. K. 2023
What certifications or qualifications do you hold?
Max. file size: 150 MB.
What level of experience should the ideal candidate have?
What certifications or qualifications are preferred?

Download Free eBook

Step 1 of 4

Name(Required)

We’re committed to your privacy. Hakin9 uses the information you provide to us to contact you about our relevant content, products, and services. You may unsubscribe from these communications at any time. For more information, check out our Privacy Policy.