1 00:00:00,320 --> 00:00:05,900 In a previous section, I showed you how you can gather information about a username by using What's 2 00:00:05,900 --> 00:00:07,940 My Name and Blackbird. 3 00:00:08,150 --> 00:00:14,900 Now there is a tool called Sherlock that you can install it on your Linux machine that will check whether 4 00:00:14,930 --> 00:00:19,100 a username has been used on hundreds of websites. 5 00:00:19,430 --> 00:00:25,670 Now some search results are false positive, which means that you might get a link, but once you open 6 00:00:25,670 --> 00:00:27,530 it you will not find any account. 7 00:00:28,010 --> 00:00:30,200 And installing this tool is very simple. 8 00:00:30,200 --> 00:00:34,910 All you have to do is to type apt install and then Sherlock. 9 00:00:35,990 --> 00:00:42,080 So you want to go to your Trace Labs Linux machine, and then you want to open the terminal as root 10 00:00:42,080 --> 00:00:44,150 by clicking on this icon. 11 00:00:44,540 --> 00:00:47,990 And then I'm going to type Osint as my password. 12 00:00:47,990 --> 00:00:55,790 And before I install any tool I always have to run the command apt update to update Kali Linux repositories. 13 00:00:57,140 --> 00:01:03,590 And after this I'm going to install the tool by typing apt install and then Sherlock, and then hit 14 00:01:03,590 --> 00:01:04,400 enter. 15 00:01:04,460 --> 00:01:07,040 And now the tool has been installed. 16 00:01:07,550 --> 00:01:14,660 And then I'm going to move to my desktop by typing CD home, Osint desktop like this. 17 00:01:15,080 --> 00:01:21,410 And now I'm in desktop, and now I'm going to run the tool by typing Sherlock, and then the username 18 00:01:21,410 --> 00:01:28,190 that I would like to search for, for example Rishi Kabra 132I can add additional username, for example 19 00:01:28,190 --> 00:01:30,770 underscore rk 132. 20 00:01:30,770 --> 00:01:36,800 And I would like to print only found results by typing print found. 21 00:01:36,830 --> 00:01:38,660 And then I'm going to hit enter. 22 00:01:38,660 --> 00:01:43,100 And now it's going to search for this username across hundreds of websites. 23 00:01:43,100 --> 00:01:47,780 And once the search is done a txt file will be generated on my desktop. 24 00:01:49,250 --> 00:01:55,400 So here are the accounts that has been found for Rishi Kabra 132 we can see that we have a. 25 00:01:55,400 --> 00:01:57,110 TXT file on our desktop. 26 00:01:57,110 --> 00:02:00,870 We can open it and see all the found accounts. 27 00:02:00,960 --> 00:02:07,080 Now I already know that Rishi Cobra has a Hackerrank account, a Gravatar account and a GitHub account. 28 00:02:07,080 --> 00:02:12,870 But Rishi Cobra does not have an account on this website or on this website. 29 00:02:12,870 --> 00:02:16,980 And this is why I told you that some search results are false positives. 30 00:02:16,980 --> 00:02:23,970 So if I copied the first link and visit it, I can see that there is no search results. 31 00:02:23,970 --> 00:02:26,430 So I can't see Rishi Cobra account. 32 00:02:27,420 --> 00:02:29,400 So I'm going to close this file. 33 00:02:30,120 --> 00:02:34,530 And now it's checking to see if this username has been registered on any website. 34 00:02:34,530 --> 00:02:41,460 And this is why I always recommend using more than one tool, because as you can see, it wasn't able 35 00:02:41,460 --> 00:02:43,320 to find Rishi Cobra Twitter account. 36 00:02:43,320 --> 00:02:47,040 It only found accounts that Rishi Cobra does not have. 37 00:02:47,370 --> 00:02:49,260 And here is the second txt file. 38 00:02:49,260 --> 00:02:53,010 You can obviously upload these txt files to your usernames. 39 00:02:53,010 --> 00:02:58,950 Note that we have created before, just so that you can have all the information in one place.