sherlock email This is a topic that many people are looking for. khurak.net is a channel providing useful information about learning, life, digital marketing and online courses …. it will help you have an overview and solid multi-faceted knowledge . Today, khurak.net would like to introduce to you Hunt Down Social Media Accounts by Usernames Using Sherlock [Tutorial . Following along are instructions in the video below:
“An osint investigation. Discovering a person. The screen name can lead to a lot of of information today. We ll check out a tool called sherlock that hunts down user across a vast variety of websites on this episode a cyber weapons lab during an o cent investigation.
Our goal is to stick together as many potentially disconnected clues as possible into one coherent picture. Now sherlock does. This by allowing us take a single piece of information. A username and expand it into as many different connected accounts as it can find now this can come with their own clues and details like photos.
Audio video and other accounts that might be connected and involve a little bit less security than the ones. We should initially find so sherlock is an amazing tool for being able to expand an investigation into other accounts that we otherwise would have no hope of finding now sherlock can also be used to generate a list of possible accounts based on someone s name and then run doubt when rundown which ones might actually be connected to your target in order to use it you ll just need to have python 3 installed. Which is cross platform and should be able to be run on any computer you re using. If you have any questions on how to install this you can check out the null byte link in the description.
Which has a lot of different troubleshooting in case you run into any errors. Once you have python set up then we re ready to begin to get started with sherlock you can navigate to the github page here at github comm slash sherlock project slash sherlock if you scroll down. You can see the documentation is pretty straightforward. And we ll just need to clone the github repository cd into the directory and then do a pip.
3. Install of requirements text. So let s go ahead and first do the git clone and in my case. It already exists and then we ll cd into sherlock and then ls and we can see all the various things that have been loaded most importantly.
The setup. So here back in the installation you can see the correct syntax is pip. 3. Install tuck our requirements text and we can go ahead and run this.
And it should go ahead and install all the library libraries. That are required for all the various websites that sherlock will be reaching out to in order to see whether or not a user account exists. So here you can see the general usage is python. 3.
Sherlock. Pi and then just the username that we re looking for and we can do some more interesting things like do it through tor or maybe output to the json file..
But for now. We re gonna be straight pretty straightforward and just going after a couple examples as though we were doing an osint investigation and so to start turning over some clues and seeing what we can learn alright so let s get started and now that we are in the folder. And we also have sherlock installed. We can go ahead and run from our example python 3.
Sherlock. Dot. Pi and then we just insert a user name. So who are we going to look up first alright.
So i did a little bit of thinking and based on some feedback from our production assistant. We re going to go first with neil breen. Neil breen is a visionary. Some say legendary producer of videos that have been a great inspiration to our production assistant nick.
So we re going to go ahead and run. It first and see what kind of information. We can pull up on neoprene. So sherlock will go ahead and go to all these different oh.
Some of these are crunchyroll they re all these social media and other sorts of websites that have accounts and it will check to see whether or not a user account exists that matches exactly the one that you ve input now typically somebody will have a favorite screening that they use all over the internet. So this tool is particularly effective at gathering all these into one place. So that we can check them out one by one and see if there s any clues that could help us better identify who this person is so we can already see that there s some information that might not be authentic to this person. I am.
Led to understood that this person is popular on the internet. So this 9gag account is probably probably not them. But if we go back to some other stuff. That s a little bit older.
We can begin to find some things it could be helpful in understanding this person. So let s go ahead and check out this is an older gentleman. So maybe ebay might be a good place to start now taking this url. Let s go ahead and navigate to one that we found while the scan completes and we ll see whether or not we can find some useful information here.
We can see this account was created 2014. And i guess this guy got more popular last year..
So this is probably authentic and we can see some reviews of products that this person looks like they bought now if we scroll down. We can see he ll bring like cat food. He likes this wig. He does not like this blow necklace and we can see some other things he s decorated to house with or that he is generally interested in which could be really interesting depending on what that person is actually buying now unlike services.
Like amazon. Where you just kind of buy things directly. This actually allows you to see all the different things that this person has bought and then left reviews on directly from their screen name. So that allows us to quickly find it from this tool.
Rather than having to dig through a bunch of different various like things through their user profile or maybe dig through. I don t know something else so as we go through it looks like wow. There s a lot of stuff. And the scan is now done so if we type ls again.
We should see a new neal breen. Dot text and we can just nano neal breen. Dot text to get a list of all the stuff that we found all right so. Some of these things are probably people that have jumped on the bandwagon of this guy s name in.
Particular i don t think that githubcom. Neal breen. I don t know that neal breen is a big developer. I could be wrong i don t know.
But some of these other things like for example venmo could be very interesting now by default venmo payments are public meaning. While this particular person might not yield any information. This is still something that could allow us to see who they re paying and who exactly is kind of in this person s circle of influence now. I m sorry christopher proctor.
I m sure you didn t mean to show up on our show. But you shouldn t have stolen. Neal greene s name if you didn t want to appear in searches for him so in this case. It didn t lead to any information.
But in a lot of cases. I ve seen a lot of venmo payments that can teach us a little bit about who the person is interacting with and especially payments are sensitive because they could lead to business information or some other things like identifying members of a company now..
I m gonna not spend too much more time on neal breen. Because i think you get the general understanding. But any one of these could lead to more information and for a typical person who is celebrity or famous on. I guess 9gag and reddit.
Then you could really learn a lot of information about that particular individual now let s pick somebody else and we re gonna pick john mcafee. Let s see what we can find just using sherlock to understand maybe. Which accounts could be tied to him specifically and which ones are probably not legitimately from him so if we go back up to our command. All we really need to do is substitute out the other screening.
We want to look for an official. John mcafee. And this should get to work finding as many different accounts as we can tie to this particular name now already we re seeing some pretty some pretty promising stuff. We can see there s an instagram account google.
I think has been shut down now. But we have an l. Oh. We have a blogspot that sounds great let s check this out.
And see if we have any content so back in our browser window. Unfortunately it looks like this is being redirected somewhere else. Which is very sad. But maybe this new website could actually lead to information if we were actually doing some osint of course.
We could just do provided this as nope. It s not done in a new window. We could just do who is that and then find out you know exactly who registered it whether or not this was tied to mr. Mcafee and we can see the organization is micronesia investment and development corporation.
I m not gonna touch that i don t know what that s about but either way this is a really interesting tool for being able to pull together. These things so we can track down. These leads. One by one and figure out which ones might lead to more information and which ones might be kind of a dead end now obviously something like trading view or other things that could lead to information about finances.
This is all really interesting because for a pen tester or somebody. That s looking for vulnerabilities..
It gives a lot of hope here we go it gives a lot of information about a person s personal life. The things they engage in the interest. They have and generally kind of what they re interested in that gives us a level of understanding of them that may be a typical investigation might not immediately overturn now of course. There are a couple four types of false positives.
It will come up with this and the most common is course a misattribution where somebody is either using that screen name. But not actually that person or otherwise. If it s a celebrity or someone who s more popular you might get a lot of copycats that generally interfere with your results. Now the way that this is written you generally will see a better reliability than some other tools that just check to see whether or not that exists.
But in general this is a great tool for being able to determine whether or not a user s screen name exists all over the internet or if maybe. It s concentrated in a couple of different sites. Now here we finally finished and we ve already just by checking a couple of these seen that we ve found some different accounts that the person s putting out media from so. If you type alice again.
We can see there should now be a official official mcafee. So if we nano official mcafee. We have a short list of all the 12 websites. We were able to find so if you have a screen name for an individual.
This is probably one of the best ways you can quickly check to see where you might be able to dig up more information. And maybe take the next step in your own investigation during an osint investigation the value of tools like sherlock is to pull in lots of different tools from even a single hit if we find an account that has a photo. We can reverse image search it and potentially find other accounts that are linked and if you find a description. We can look for specific instances of the exact same words to find where the person might have copied and pasted the same description of themselves all these things taken together can lead to a dramatic image of a person that might be a little bit more intimate than we would be able to get if we otherwise were just gathering information from just random clues so a username can t a really bridge the gap.
When it comes to understanding a person who they hang out with and which accounts they have accessible for gathering further clues that s all we have for this episode of cyber weapons lab. If you have any questions on setting up sherlock you can check out the article linked in the description. And if you have any ideas for future episodes. You can send me a message on twitter.
Because i d love to ” ..
Thank you for watching all the articles on the topic Hunt Down Social Media Accounts by Usernames Using Sherlock [Tutorial . All shares of khurak.net are very good. We hope you are satisfied with the article. For any questions, please leave a comment below. Hopefully you guys support our website even more.