Monday, 21 January 2019

FIND HACKED EMAIL ADDRESSES

h8mail

Data breaching in these days have been common. Many of the popular websites are targeted in data breach. This process of data breaching is still continue as many anonymous attackers are using open source tools. There is a popular tool called h8mail which is used to check breach mails.

According ethical hacking researcher of international institute of cyber security h8mail is used in initial phase of penetration testing.

H8mail is an OSINT tool used to search emails and passwords. This tool find breached emails through different sites. This tool uses data breached emails. For showing you we have tested this tool on Kali Linux 2018.4

Before installing tool you must install nodejs and update python in Kali Linux. This tool only works with python3.

  • For installing python type sudo apt-get update
  • Then type sudo apt-get install python3
  • For checking python version type python –version
  • Then type sudo apt-get install nodejs
  • After installing all the above pre-requisites clone h8mail.
  • For cloning type git clone https://github.com/khast3x/h8mail.git
  • Type cd h8mail
  • Type pip install -r requirements.txt
root@kali:/home/iicybersecurity/Downloads/h8mail# pip install -r requirements.txt
 Requirement already satisfied: requests in /usr/lib/python2.7/dist-packages (from -r requirements.txt (line 1)) (2.18.4)
 Collecting python-cli-ui (from -r requirements.txt (line 2))
   Downloading https://files.pythonhosted.org/packages/71/76/4772ff1c2c982c3e5cd75f5e01ae575adb979afc3473d267915de39813f4/python-cli-ui-0.7.4.tar.gz
     Complete output from command python setup.py egg_info:
     Error: Please upgrade to Python3
Command "python setup.py egg_info" failed with error code 1 in /tmp/pip-install-oC2WCX/python-cli-ui/
  • While installing pip if it shows the above error that means you have to upgrade pip in your Linux Distros.
  • For that type sudo apt-get update python3-pip
root@kali:/home/iicybersecurity/Downloads/h8mail# sudo apt-get install python3-pip
 Reading package lists… Done
 Building dependency tree
 Reading state information… Done
 python3-pip is already the newest version (18.1-4).
 The following packages were automatically installed and are no longer required:
   golang-1.10 golang-1.10-doc golang-1.10-go golang-1.10-src golang-src
 Use 'apt autoremove' to remove them.
 0 upgraded, 0 newly installed, 0 to remove and 1554 not upgraded.
  • After upgrading pip, type pip install -r requirements.txt
root@kali:/home/iicybersecurity/Downloads/h8mail# pip3 install -r requirements.txt
 Requirement already satisfied: requests in /usr/lib/python3/dist-packages (from -r requirements.txt (line 1)) (2.18.4)
 Collecting python-cli-ui (from -r requirements.txt (line 2))
   Downloading https://files.pythonhosted.org/packages/fc/32/e63370450c69ccc06aefb8e55926011a7eeb3824787fed8d3d12149b4e09/python_cli_ui-0.7.4-py3-none-any.whl
 Collecting cfscrape (from -r requirements.txt (line 3))
   Downloading https://files.pythonhosted.org/packages/ee/5e/6f36d5305b4c5abe793a7a057003f342300e9b853384a11fee8dc58e6816/cfscrape-1.9.5.tar.gz
 Collecting unidecode (from python-cli-ui->-r requirements.txt (line 2))
   Downloading https://files.pythonhosted.org/packages/31/39/53096f9217b057cb049fe872b7fc7ce799a1a89b76cf917d9639e7a558b5/Unidecode-1.0.23-py2.py3-none-any.whl (237kB)
     100% |████████████████████████████████| 245kB 576kB/s
 Requirement already satisfied: tabulate in /usr/lib/python3/dist-packages (from python-cli-ui->-r requirements.txt (line 2)) (0.8.2)
 Requirement already satisfied: colorama in /usr/lib/python3/dist-packages (from python-cli-ui->-r requirements.txt (line 2)) (0.3.7)
 Building wheels for collected packages: cfscrape
   Running setup.py bdist_wheel for cfscrape … done
   Stored in directory: /root/.cache/pip/wheels/4b/7d/70/32db6ba6ac95be8d24d5563436fc4ffe52f271adb2da153531
 Successfully built cfscrape
 Installing collected packages: unidecode, python-cli-ui, cfscrape
 Successfully installed cfscrape-1.9.5 python-cli-ui-0.7.4 unidecode-1.0.23
  • Then type python3 h8mail.py –help
root@kali:/home/iicybersecurity/Downloads/h8mail# python3 h8mail.py --help
 usage: h8mail.py [-h] -t TARGET_EMAILS [-c CONFIG_FILE] [-o OUTPUT_FILE]
                  [-bc BC_PATH] [-v] [-l] [-k CLI_APIKEYS]

 
Email information and password finding tool 
 
optional arguments:
   -h, --help            show this help message and exit
   -t TARGET_EMAILS, --targets TARGET_EMAILS
                         Either single email, or file (one email per line).
                         REGEXP
   -c CONFIG_FILE, --config CONFIG_FILE
                         Configuration file for API keys
   -o OUTPUT_FILE, --output OUTPUT_FILE
                         File to write output
   -bc BC_PATH, --breachcomp BC_PATH
                         Path to the breachcompilation Torrent.
  
https://ghostbin.com/paste/2cbdn
   -v, --verbose         Show debug information
   -l, --local           Run local actions only
   -k CLI_APIKEYS, --apikey CLI_APIKEYS
                         Pass config options. Format is "K:V,K:V"
  • The above queries are used to gather breached email addresses and passwords.

H8MAIL USES VARIOUS APIS TO SEARCH FOR BREACHED EMAIL ADDRESSES :-

  • HaveIBeenPwned (https://haveibeenpwned.com/) : This website checks if the email id has been pwned or not. This website collects large no, of databases dumps and paste containing information about all billions of leak accounts.
  • Shodan (https://www.shodan.io/) : Shodan is an search engine for web. This website pings all the available IP address that are currently using the internet.
  • Hunter.io (https://hunter.io/: Hunter is an source of h8mail. In hunter is used to find and verify professional email address. For using these services you have to pay some of the amount in hunter.io
  • Weleakinfo (https://weleakinfo.com/api/public) : Weleakinfo is another breached database search engine.
  • Snusbase (https://snusbase.com/) : Snusbase is a database search engine which collects data of sites that have been hacked. And provide those data to their users. For using these services you have to pay some of the amount in snusbase.

FINDING BREACHED EMAIL ADDRESS :-

  • Type python3 h8mail.py -t puti@reddcoin2.com
  • -t is used to enter target email address.
root@kali:/home/iicybersecurity/Downloads/h8mail# python3 h8mail.py -t puti@reddcoin2.com

.. ..     ;;
     | .. | | .. |     ; h8mail.py ;     | !| |||! |     ;-----------;     !| |_!  Heartfelt Email OSINT
     .||| |.   Use responsibly etc
     | .| |. | ;____________;
     | !! | | !! | ; github.com/khast3x ;
     !! !! ;--------------------;
 
Targets 
 
=> puti@reddcoin2.com 
 
Lookup Status 
 
Result puti@reddcoin2.com 
 
=> not breached ❌
 Target hostname: reddcoin2.com 
 
✓ Done
  • The above query shows, email which has been scanned is not breached of any databases mentioned above.
  • It shows that HIBP (HaveIBeenPwned) could not find email address in any database. Nor its password is available in HIBP database.

FIND BULK EMAIL IDS FOR TESTING:-

  • For getting bulk email addresses. You can use TheHarvester is a popular tool to find mail addresses or details of the employees.
root@kali:/home/iicybersecurity/Downloads# theharvester -d testsites.com -b pgp

 
Warning: Pycurl is not compiled against Openssl. Wfuzz might not work correctly when fuzzing SSL sites. Check Wfuzz's documentation for more information. 

 
*
| || |_   _    /\  /__ _ _ _     | |_  _ __  *
| | '_ \ / _ \  / // / ` | '\ \ / / _ \/ | / _ \ '__| *
| || | | |  / /   / (| | |   \ V /  /__ \ ||  / |    *
__|| ||___| \/ // _,||    _/ ___||/__|_|    *
*
TheHarvester Ver. 2.7.2                                         *
Coded by Christian Martorella                                   *
Edge-Security Research                                          *
cmartorella@edge-security.com                                   * 

 
[-] Starting harvesting process for domain: testsites.com
 
[-] Searching in PGP key server.. 
 
Harvesting results 
 
[+] Emails found: 
mariot.chauvin@testsites.com
 lauren.emms@testsites.com
 danny.daly@testsites.com
 amy.hughes@testsites.com
 jon.norman@testsites.com
 tom.forbes@testsites.com
 niko.kommenda@testsites.com
 sam.jones@testsites.com
 regis.kuckaertz@testsites.com
 hannah.devlin@testsites.com
 joseph.smith@testsites.com
 calum.campbell@testsites.com
 jacob.riggs@testsites.com
 michael.barton@testsites.com
 akash.askoolum@testsites.com
 peter.colley.freelance@testsites.com
 nicolas.long@testsites.com
 alex.hern@testsites.com
 thomas.bonnin@testsites.com
 richard.tynan@testsites.com
 mat.heywood@testsites.com
 nathaniel.bennett@testsites.com
 sally.goble@testsites.com
 jennifer.sivapalan@testsites.com
 michael.safi@testsites.com
 justin.pinner@testsites.com
 jonathan.soul@testsites.com
 jasper.jackson@testsites.com
 oliver.holmes@testsites.com
 hilary.osborne@testsites.com
 rupert.bates@testsites.com
 caelainn.barr@testsites.com
 christopher.lloyd@testsites.com
 susie.coleman@testsites.com
 chris.whitworth@testsites.com
 andi.elsner@testsites.com
 calla.wahlquist@testsites.com
 paul.farrell@testsites.com
 james.gorrie@testsites.com
 simon.bowers@testsites.com
  • The above is the list of the email addresses which can be used in scanning if the above email addresses are breached or not.
  • Save the above list. Type nano emaillist.txt
  • Then copy paste whole email addresses. Then save the list.
  • Type python3 h8mail.py -t /home/iicybersecurity/Downloads/testsites.txt -bc /Downloads/breachcompilation/ -k “snusbase_url: http://snusbase.com ,snusbase_token: 5sxxxxxxxxxxxxxxxxxxxBuXQ”
  • -t is used to enter tartgets.
  • -bc is used to give path for pwned targets.
  • -k is used to enter snusbase API key.
root@kali:/home/iicybersecurity/Downloads/h8mail# python3 h8mail.py -t /home/iicybersecurity/Downloads/testsites.txt -bc /Downloads/breachcompilation/ -k "snusbase_url: http://snusbase.com ,snusbase_token: 5sxxxxxxxxxxxxxxxxxxxBuXQ"

.. ..     ;;
     | .. | | .. |     ; h8mail.py ;     | !| |||! |     ;-----------;     !| |_!  Heartfelt Email OSINT
     .||| |.   Use responsibly etc
     | .| |. | ;____________;
     | !! | | !! | ; github.com/khast3x ;
     !! !! ;--------------------;
 
Targets 
mariot.chauvin@testsites.com
  lauren.emms@testsites.com
  danny.daly@testsites.com
  amy.hughes@testsites.com
  jon.norman@testsites.com
  tom.forbes@testsites.com
  niko.kommenda@testsites.com
  sam.jones@testsites.com
  regis.kuckaertz@testsites.com
  hannah.devlin@testsites.com
  joseph.smith@testsites.com
  calum.campbell@testsites.com
  jacob.riggs@testsites.com
  michael.barton@testsites.com
  akash.askoolum@testsites.com
  peter.colley.freelance@testsites.com
  nicolas.long@testsites.com
  alex.hern@testsites.com
  thomas.bonnin@testsites.com
  richard.tynan@testsites.com
  mat.heywood@testsites.com
  nathaniel.bennett@testsites.com
  sally.goble@testsites.com
  jennifer.sivapalan@testsites.com
  michael.safi@testsites.com
  justin.pinner@testsites.com
  jonathan.soul@testsites.com
  jasper.jackson@testsites.com
  oliver.holmes@testsites.com
  hilary.osborne@testsites.com
  rupert.bates@testsites.com
  caelainn.barr@testsites.com
  christopher.lloyd@testsites.com
  susie.coleman@testsites.com
  chris.whitworth@testsites.com
  andi.elsner@testsites.com
  calla.wahlquist@testsites.com
  paul.farrell@testsites.com
  james.gorrie@testsites.com
  simon.bowers@testsites.commariot.chauvin@testsites.com
  lauren.emms@testsites.com
  danny.daly@testsites.com
  amy.hughes@testsites.com
  jon.norman@testsites.com
  tom.forbes@testsites.com
  niko.kommenda@testsites.com
  sam.jones@testsites.com
  regis.kuckaertz@testsites.com
  hannah.devlin@testsites.com
  joseph.smith@testsites.com
  calum.campbell@testsites.com
  jacob.riggs@testsites.com
  michael.barton@testsites.com
  akash.askoolum@testsites.com
  peter.colley.freelance@testsites.com
  nicolas.long@testsites.com
  alex.hern@testsites.com
  thomas.bonnin@testsites.com
  richard.tynan@testsites.com
  mat.heywood@testsites.com
  nathaniel.bennett@testsites.com
  sally.goble@testsites.com
  jennifer.sivapalan@testsites.com
  michael.safi@testsites.com
  justin.pinner@testsites.com
  jonathan.soul@testsites.com
  jasper.jackson@testsites.com
  oliver.holmes@testsites.com
  hilary.osborne@testsites.com
  rupert.bates@testsites.com
  caelainn.barr@testsites.com
  christopher.lloyd@testsites.com
  susie.coleman@testsites.com
  chris.whitworth@testsites.com
  andi.elsner@testsites.com
  calla.wahlquist@testsites.com
  paul.farrell@testsites.com
  james.gorrie@testsites.com
  simon.bowers@testsites.com
 
=========== SNIPPED =================
  • The above query shows that above email addresses has not been in data breach in HIBP.
  • If you see snusbase error, it means you have to purchase their services to search in their database.

USING SINGLE QUERY :-

  • Type python3 h8mail.py -t targets.txt -c config.ini -o pwned_targets.csv
  • -t is used to select target file. You have to create target.txt file.
  • -c is used to select config file where APIs has been entered.
  • -o is used where data will be saved in .csv form.
root@kali:/home/iicybersecurity/Downloads/h8mail#  
python3 h8mail.py -t targets.txt -c config.ini -o pwned_targets.csv 
 tuckerkaren2000@yahoo.com
 tuckersadie@yahoo.com
 tucko100@yahoo.com
 tucktunes@yahoo.com
 tucsonclint2008@yahoo.com
 tucu.ionut@yahoo.com

 Lookup Status
 ======== SNIPPED ===============
  • If the email addresses has been pwned data breach.
  • This information can be used in other hacking activities.

0 comments:

Post a Comment