This article discusses the use of tools that can help gather information about a target for exploitation or other purposes, such as finding all social media accounts belonging to the target
Main Topics
This article discusses the use of tools that can help gather information about a target for exploitation or other purposes, such as finding all social media accounts belonging to the target.
The author shares the article for learning purposes only and takes no responsibility for any misuse of the information provided.
finduser
One of the tools mentioned is βfinduser,β which helps find various usernames from a targetβs social media. The installation process involves cloning the tool from GitHub and running it in the command line. The output provides information about the target on different platforms, which can be used for further mitigation according to specific needs.
From the above results we get a lot of information about targets on several platforms which we can then do further mitigation, of course we use according to what we need from these assets.
Bug Bounty Helper
Another tool recommended for finding information about a target is a website called βBug Bounty Helper.β This website is useful for testing website vulnerabilities. It provides a list of vulnerabilities and information that can be obtained from the target website, such as exposed configuration files, database files, login pages, SQL errors, and more. The author also shares some additional web references for doing open-source intelligence (OSINT) activities, including websites for analyzing data, checking phone number owners, Twitter engineering, social engineering, image search, and username verification.
1
https://dorks.faisalahmed.me/
by using this website there are several things that we can get from the target website that we will test the level of vulnerability, including:
Overall, the article aims to provide readers with tools and resources that can aid in gathering information about targets for cybersecurity purposes. It offers insights into techniques like finding usernames on social media platforms and identifying website vulnerabilities. The author encourages responsible use of the information and hopes that the article will contribute to learning about cyber security.
hope this article helps us to learn cyber security!