Gather Victim Identity Information (T1589)
Before launching a phishing campaign or password spray, you need accurate targets. "Spray and Pray" is noisy and gets you caught. This phase focuses on building a High-Fidelity Target List of real employees, their roles, and their likely email formats.
1. Email Format Discovery
First, determine the corporate email pattern (e.g., firstname.lastname@company.com vs f.lastname@company.com).
Tools
- Hunter.io: The industry standard. Even the free tier gives you the pattern and a few valid emails.
- Phonebook.cz: Aggressive scraping of emails.
- Clearbit Connect: Browser extension to find emails associated with domains.
Manual Validation
If you have a suspected email, validators like mailtester.com or simple SMTP interactions (VRFY/RCPT TO) can confirm existence without sending mail. Warning: Frequent RCPT TO checks can be logged and blocked.
2. Employee Harvesting (LinkedIn OSINT)
LinkedIn is the gold mine for Red Teamers. We want to identify specific roles:
- High Value Targets (Whaling): C-Suite, Finance Directors (Wire fraud scenarios).
- IT/DevOps: Have admin access, but are more paranoid.
- Sales/HR: Accustomed to opening attachments from strangers. Primary Targets.
Automated Harvesting: CrossLinked
CrossLinked scrapes LinkedIn via search engines (Google/Bing) to avoid detecting your bot on LinkedIn directly.
# Scrape employees for 'Target Company' in format {first}.{last}@target.com
python3 crosslinked.py -f '{first}.{last}@target.com' -t 'Target Company'
Manual Dorking
Use Google Dorks to find profiles without tools:
site:linkedin.com/in/ "Target Company" "HR Manager"
site:linkedin.com/in/ "Target Company" "IT Administrator"
3. Credential Breach Lookup
Users reuse passwords. If jane.doe@target.com used Summer2023! on LinkedIn in 2012, she might use Winter2024! on the corporate VPN today.
DeHashed / IntelX
These services (paid) index billions of leaked credentials.
- Search for
@target.com. - Export all found plaintext passwords.
- Analysis: Look for patterns.
Company123!: Weak policy.F1rstname!: Personalized.- Hash types: NTLM hashes can be cracked; Bcrypt takes longer.
WeLeakInfo (Historical)
Note: Many such sites are seized. Stick to legitimate intel providers or local copies of breaches (Collection #1-5, RockYou2021).
4. Advanced: Metadata Analysis (FOCA)
Download public documents (PDFs, DOCX) from the company website. Metadata often contains:
- Usernames:
author: jsmith-> Login format confirmed. - Software Version:
Microsoft Office 365-> Phishing lur context. - Printer Paths: Internal naming conventions (
\\CORP-PRN-01\).
Tool: FOCA (Fingerprinting Organizations with Collected Archives)
- Point FOCA at
www.target.com. - It spiders for
.pdf,.doc,.xls. - Extracts metadata and builds a network map of internal users/servers.
OpSec Tips
- Sock Puppets: NEVER view LinkedIn profiles from your personal account. They will see "John Smith viewed your profile". Create fake, realistic personas aged over months.
- Traffic Hygiene: Use residential proxies for scraping. Datacenter IPs (AWS/DigitalOcean) are blocked by LinkedIn/Google instantly.