1 00:00:00,060 --> 00:00:00,930 Welcome back, everyone. 2 00:00:01,530 --> 00:00:04,230 This is the lecture on finding Emin's. 3 00:00:04,860 --> 00:00:05,210 All right. 4 00:00:05,490 --> 00:00:15,410 So we have discussed the last lecture that the most effective way of finding your target or maybe two 5 00:00:15,730 --> 00:00:20,280 to get information about the target is the part of preordering Facebook. 6 00:00:20,760 --> 00:00:30,930 Now, in order to send the malicious payload by by the by the delivery method, the best approach is 7 00:00:30,930 --> 00:00:33,630 to make use of pushing it. 8 00:00:33,630 --> 00:00:33,920 Right. 9 00:00:34,530 --> 00:00:42,000 But if you talk about if you talk about home users, they might be making use of public email like Gmail, 10 00:00:42,000 --> 00:00:43,790 Hotmail, Yahoo! 11 00:00:43,950 --> 00:00:44,610 Or other stuff. 12 00:00:45,210 --> 00:00:49,980 But, oh, here we are talking about larger devices, businesses. 13 00:00:50,010 --> 00:00:53,150 Right, because that's where the attackers are after. 14 00:00:53,320 --> 00:00:53,570 Right. 15 00:00:53,940 --> 00:01:01,670 So so here how how how someone can find somebody's business e-mail. 16 00:01:02,130 --> 00:01:03,860 Is this difficult? 17 00:01:04,530 --> 00:01:05,580 I would say not. 18 00:01:05,820 --> 00:01:14,220 If you have some idea about tools or maybe some, you know, some if you are ready to pay some amount 19 00:01:14,220 --> 00:01:14,580 as well. 20 00:01:14,940 --> 00:01:18,570 But let's find out if you want to get some emails. 21 00:01:18,570 --> 00:01:25,270 And, you know, as a part of free access, can you really get the dogged business human? 22 00:01:25,410 --> 00:01:28,770 I'm talking about the business, even like the media where all of this stuff. 23 00:01:28,770 --> 00:01:28,990 Right. 24 00:01:29,520 --> 00:01:38,290 So there are two major things that signal Hiero and all of the purpose of these tools are for it. 25 00:01:38,730 --> 00:01:40,800 I mean, is for the business purpose. 26 00:01:41,220 --> 00:01:43,560 But hackers are the black hat. 27 00:01:43,560 --> 00:01:47,730 Guys can also make use of it for the malicious activity as well. 28 00:01:47,880 --> 00:01:49,500 I'll show you how that green looks. 29 00:01:49,770 --> 00:01:58,410 And this would really be helpful for, I think, hackers to understand how how the how the bad guys 30 00:01:58,770 --> 00:02:01,230 get somebodies business email address. 31 00:02:01,240 --> 00:02:01,550 Right. 32 00:02:01,920 --> 00:02:08,730 And there are many other ways, of course, by maybe calling these cell stealing or Atahuallpa, because 33 00:02:08,730 --> 00:02:15,530 the these are the most exposed folks, those who talk to the unknown people very often. 34 00:02:15,540 --> 00:02:15,780 Right. 35 00:02:16,230 --> 00:02:18,950 So let's go to the browser once. 36 00:02:19,500 --> 00:02:25,800 Let me show you in the browser code that looks like if I go to the browser, you can make use of Hunter. 37 00:02:26,250 --> 00:02:27,870 Sorry, Hunter. 38 00:02:28,480 --> 00:02:31,580 Yeah, and I'm on the Hundert. 39 00:02:31,620 --> 00:02:32,790 I'll page at this moment. 40 00:02:33,540 --> 00:02:40,390 Let's say you want to target to anybody, anybody into in the company that's left. 41 00:02:40,410 --> 00:02:42,300 But let's say an example of Testino. 42 00:02:42,630 --> 00:02:44,110 I want to target somebody. 43 00:02:44,160 --> 00:02:44,970 That's what I'm sorry. 44 00:02:44,970 --> 00:02:47,760 Just like Destler dot com. 45 00:02:47,760 --> 00:02:48,120 Right. 46 00:02:48,300 --> 00:02:54,210 The moment you put that, you see it's that is that possibly great? 47 00:02:54,750 --> 00:03:02,020 You get to see all the business email addresses of employees working with Destler. 48 00:03:02,510 --> 00:03:03,180 All right. 49 00:03:03,510 --> 00:03:10,980 So you might see some of the hidden email addresses that you can get it once once you sign up. 50 00:03:11,370 --> 00:03:16,800 If you look at the pricing model, you might get for free searches for free. 51 00:03:16,950 --> 00:03:17,290 Right. 52 00:03:17,580 --> 00:03:22,040 So if you're looking for then to be a bit of a demilitarise, you can get it for free. 53 00:03:22,950 --> 00:03:24,390 So that's for one company. 54 00:03:24,390 --> 00:03:28,410 Let's say, for example, you want to get it for some other companies as well. 55 00:03:28,410 --> 00:03:30,470 You can, of course, do that at any moment of time. 56 00:03:30,990 --> 00:03:31,440 Sorry. 57 00:03:31,560 --> 00:03:33,790 You can, of course, do it as you wish. 58 00:03:33,830 --> 00:03:35,310 Let's say you want to go for Twitter. 59 00:03:36,000 --> 00:03:43,260 So, producer, what are you what are the folks you can target but you can target to these many people? 60 00:03:43,440 --> 00:03:47,610 The email addresses are available so you can think about it. 61 00:03:47,610 --> 00:03:51,920 How how this is this is being available to the door and then you get it. 62 00:03:52,410 --> 00:03:59,640 They make use of publicly available information, maybe based on maybe they have posted their email 63 00:03:59,640 --> 00:04:08,310 address to any marketing PR activity or any any sort of marketing campaign or service information or 64 00:04:08,310 --> 00:04:09,420 their generation. 65 00:04:09,420 --> 00:04:11,540 Matsuzawa, to that's how they get it. 66 00:04:12,390 --> 00:04:21,360 These these companies are doing their business for the purpose of lead generation, serving as a legitimate 67 00:04:21,420 --> 00:04:21,810 service. 68 00:04:21,930 --> 00:04:22,170 Right. 69 00:04:22,800 --> 00:04:26,940 But hackers are the bad guys can make use for nasty vocalised. 70 00:04:26,940 --> 00:04:27,170 Right. 71 00:04:27,780 --> 00:04:31,200 Similar where you can make use of another tool called signal hire. 72 00:04:31,740 --> 00:04:35,550 You can go there and you can you're going to install their browser extension. 73 00:04:35,850 --> 00:04:43,380 And the moment you go to any LinkedIn account you can once you have this extension and you log into 74 00:04:43,380 --> 00:04:50,250 any LinkedIn account and you just have to click on those browser and you get their business email address. 75 00:04:50,250 --> 00:04:50,470 Right. 76 00:04:50,970 --> 00:04:52,140 So it's that easy. 77 00:04:52,230 --> 00:04:55,530 You can go through the the way you have. 78 00:04:55,540 --> 00:04:59,780 You can go to any any person that say I can search for myself. 79 00:04:59,930 --> 00:05:02,000 Rossini's Gupta. 80 00:05:04,260 --> 00:05:10,930 All right, so I'm already on my iPhone, but I can search on my Godet just on the top, I can click 81 00:05:10,930 --> 00:05:15,970 on my plug in and I did get the business email address of the target person. 82 00:05:16,660 --> 00:05:25,300 So that's the one way of finding the business e-mail address on target in the in the real world. 83 00:05:25,530 --> 00:05:27,700 OK, I hope this was useful. 84 00:05:28,030 --> 00:05:30,010 And we you in the next one. 85 00:05:30,070 --> 00:05:30,550 Thank you.