Main Topics
This article discusses the use of tools that can help gather information about a target for exploitation or other purposes, such as finding all social media accounts belonging to the target.
The author shares the article for learning purposes only and takes no responsibility for any misuse of the information provided.
finduser
One of the tools mentioned is “finduser,” which helps find various usernames from a target’s social media. The installation process involves cloning the tool from GitHub and running it in the command line. The output provides information about the target on different platforms, which can be used for further mitigation according to specific needs.
Finduser installation
~$ git clone https://github.com/mishakorzik/UserFinder
~$ cd finduser
~$ bash finduser
Then this is the result
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
| santricyber@santricyber:~/UserFinder$ bash UserFinder.sh
__ __ ______ _______ ______ _______ ___ __ _ ______ _______ ______
| | | || || || _ | | || || | | || | | || _ |
| | | || ____|| ___|| | || | ___|| || |_| || _ || ___|| | ||
| |_| || |____ | |___ | |_||_ | |___ | || || | | || |___ | |_||_
| ||____ || ___|| __ | | ___|| || _ || |_| || ___|| __ |
| | ____| || |___ | | | | | | | || | | || || |___ | | | |
|_______||______||_______||___| |_| |___| |___||_| |__||______| |_______||___| |_|
.:.:;.. UserFinder v1.0 Developer: misha korzhik ..;:.:.
[>] Input Username: santricyber
[>] Checking username santricyber on global info-stealer:
[+] No result found
[>] Checking username santricyber on social networks:
[+] Instagram: Found! https://www.instagram.com/santricyber
[+] Facebook: Found! https://www.facebook.com/santricyber
[+] Twitter: Found! https://www.twitter.com/santricyber
[+] YouTube: Not Found!
[+] Blogger: Found! https://santricyber.blogspot.com
[+] GooglePlus: Found! https://plus.google.com/+santricyber/posts
[+] Reddit: Found! https://www.reddit.com/user/santricyber
[+] Wordpress: Found! https://santricyber.wordpress.com
[+] Pinterest: Found! https://www.pinterest.com/santricyber
[+] Github: Found! https://www.github.com/santricyber
[+] Tumblr: Not Found!
[+] Flickr: Found! https://www.flickr.com/photos/santricyber
[+] Steam: Not Found!
[+] Vimeo: Not Found!
[+] SoundCloud: Found! https://soundcloud.com/santricyber
[+] Disqus: Found! https://disqus.com/santricyber
[+] Medium: Found! https://medium.com/@santricyber
[+] DeviantART: Not Found!
[+] VK: Found! https://vk.com/santricyber
[+] About.me: Not Found!
[+] Spotify: Not Found!
[+] MixCloud: Not Found!
[+] Scribd: Found! https://www.scribd.com/santricyber
[+] Badoo: Not Found!
[+] Patreon: Not Found!
[+] BitBucket: Found! https://bitbucket.org/santricyber
[+] CashMe: Found! https://cash.me/santricyber
[+] Behance: Found! https://www.behance.net/santricyber
[+] GoodReads: Not Found!
[+] Instructables: Found! https://www.instructables.com/member/santricyber
[+] Keybase: Found! https://keybase.io/santricyber
[+] Kongregate: Not Found!
[+] LiveJournal: Not Found!
[+] AngelList: Found! https://angel.co/santricyber
[+] last.fm: Not Found!
[+] Dribbble: Not Found!
[+] Codecademy: Not Found!
[+] Gravatar: Found! https://en.gravatar.com/santricyber
[+] Pastebin: Found! https://pastebin.com/u/santricyber
[+] Foursquare: Found! https://foursquare.com/santricyber
[+] Roblox: Found! https://foursquare.com/santricyber
[+] Gumroad: Found! https://www.gumroad.com/santricyber
[+] Newgrounds: Not Found!
[+] Wattpad: Found! https://www.wattpad.com/user/santricyber
[+] Canva: Found! https://www.canva.com/santricyber
[+] CreativeMarket: Found! https://creativemarket.com/santricyber
[+] Trakt: Not Found!
[+] 500px: Found! https://500px.com/santricyber
[+] Buzzfeed: Not Found!
[+] TripAdvisor: Found! https://tripadvisor.com/members/santricyber
[+] HubPages: Not Found!
[+] Contently: Found! https://santricyber.contently.com
[+] Houzz: Found! https://houzz.com/user/santricyber
[+] blip.fm: Found! https://blip.fm/santricyber
[+] Wikipedia: Found! https://www.wikipedia.org/wiki/User:santricyber
[+] HackerNews: Not Found!
[+] CodeMentor: Not Found!
[+] ReverbNation: Not Found!
[+] Designspiration: Not Found!
[+] Bandcamp: Not Found!
[+] ColourLovers: Found! https://www.colourlovers.com/love/santricyber
[+] IFTTT: Not Found!
[+] Ebay: Found! https://www.ebay.com/usr/santricyber
[+] Slack: Not Found!
[+] OkCupid: Not Found!
[+] Trip: Found! https://www.trip.skyscanner.com/user/santricyber
[+] Ello: Found! https://ello.co/santricyber
[+] Tracky: Not Found!
[+] Tripit: Found! https://www.tripit.com/people/santricyber#/profile/basic-info
[+] Basecamp: Not Found!
[+] Saved:
|
From the above results we get a lot of information about targets on several platforms which we can then do further mitigation, of course we use according to what we need from these assets.
Bug Bounty Helper
Another tool recommended for finding information about a target is a website called “Bug Bounty Helper.” This website is useful for testing website vulnerabilities. It provides a list of vulnerabilities and information that can be obtained from the target website, such as exposed configuration files, database files, login pages, SQL errors, and more. The author also shares some additional web references for doing open-source intelligence (OSINT) activities, including websites for analyzing data, checking phone number owners, Twitter engineering, social engineering, image search, and username verification.
1
| https://dorks.faisalahmed.me/
|
by using this website there are several things that we can get from the target website that we will test the level of vulnerability, including:
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
|
π Directory listing vulnerabilities
π Exposed Configuration files
π Exposed Database files
π Find WordPress
π Exposed log files
π Backup and old files
π Login pages
π SQL errors
π Publicly exposed documents
π phpinfo()
π Finding Backdoors
π Install / Setup files
π Open Redirects
π Apache STRUTS RCE
π Find Pastebin entries
π Employees on LINKEDIN
π .htaccess sensitive files
π Find Subdomains
π Find Sub-Subdomains
π Find WordPress #2
π Find WordPress [Wayback Machine]
π Search in GITHUB
π Search in OpenBugBounty
π Search in Reddit
π Test CrossDomain
π Check in ThreatCrowd
π Find .SWF file (Google)
π Find .SWF file (Yandex)
π Search SWF in WayBack Machine
π Search in WayBack Machine #2
π Search in WayBack Machine #3
π Search in WayBack Machine [List/All]
π Check in crt.sh
π Check in CENSYS [IP4] | [DOMAINS] | [CERTS]
π Search in SHODAN
|
Then for extras I have some web references for doing OSINT that are quite helpful
1
2
3
4
5
6
7
8
9
| https://inteltechniques.com/menu.html /analisa data menggunakan website ini
https://www.truecaller.com/ cek nama pemilik nomor telepon
https://inteltechniques.com/menu.html
https://socialbearing.com/ twitter engineering
https://codeofaninja.com/tools/ social engineering
https://www.tineye.com
https://knowem.com/
https://checkusernames.com/ cek username
OSINT https://osintframework.com/
|
Overall, the article aims to provide readers with tools and resources that can aid in gathering information about targets for cybersecurity purposes. It offers insights into techniques like finding usernames on social media platforms and identifying website vulnerabilities. The author encourages responsible use of the information and hopes that the article will contribute to learning about cyber security.
hope this article helps us to learn cyber security!