Email Address Harvesting
Harvesting email addresses is a common part of any external penetration test. Several tools exist that can be easily found with a simple google search that can greatly decrease the amount of time spent combing through search engine results.
I have recently released a new tool into the BackTrack Linux penetration testing distribution that has proven useful on many of my external gigs.
Introducing Jigsaw. Jigsaw is a simple ruby script that searches www.jigsaw.com for employee records and crafts email addresses based on first and last name entries pulled down from their website.
In Backtrack, installation is as simple as typing:
$ apt-get install jigsaw
Otherwise you can clone the git repository from the above link.
$ ./jigsaw -h
Jigsaw 1.0 ( http://www.pentestgeek.com/ - http://hdesser.wordpress.com/ )
Usage: jigsaw [options]
example: jigsaw -s Google
-i, –id [Jigsaw Company ID] The Jigsaw ID to use to pull records
-s, –search [Company Name] Name of organization to search for
-r, –report [Output Filename] Name to use for report EXAMPLE: ‘-r google’ will generate ‘google.csv’
-v, –verbose Enables verbose output
$ ./jigsaw -s Google
Your search returned more then one company
Jigsaw ID: 215043 – Google, Inc. 6,627 employees.
Jigsaw ID: 224667 – Google Postini Services 149 employees.
Jigsaw ID: 439035 – AdMob Google Inc 2 employees.
Jigsaw ID: 5032028 – Google Inc 1 employees.
$ ./jigsaw -i 215043 |grep -i market |grep -i manager
Fyall, Mike - Product Marketing Manager
Ramaswamy, Jenny - Marketing Manager
Satyasai, Serena - Product Marketing Manager
Fu, John - Product Marketing Manager
Shah, Davang - Group Marketing Manager-US Large Advertiser Marketing
Standard output to the command line is great for searching specific records however the real value in this tool is generating a .csv report that you can open in any spreadsheet application and then filter for records belonging to specific employee or user groups such as Sales & Marketing or Information Systems.
The following query takes about 1 minute to run on my Macbook Pro and pulls 6.5k records from Google.
Royces-MacBook-Pro:jigsaw r3dy$ ./jigsaw.rb -s google.com
Jigsaw ID for google.com is: 215043
Royces-MacBook-Pro:jigsaw r3dy$ ./jigsaw.rb -i 215043 -v -r google
Your target has 22 domain/s:
Enter the name of the domain to use for crafting emails: google.com
Found 1122 records in Sales
Found 670 records in Marketing
Found 910 records in Finance & Administration
Found 245 records in Human Resources
Found 162 records in Support
Found 1410 records in Engineering & Research
Found 375 records in Operations
Found 1209 records in IT & IS
Found 468 records in Other
Wrote 6569 records to google.csv
Click on the link below to see a screenshot of the CSV Report:
CSV Report Screenshot
Share this article
- Playing With the New Burp Suite REST API
- Burp Suite 2.0 Beta Review
- Attacking Palo Alto Networks PAN-OS ‘readSessionVarsFromFile()’
- GPG Errors While Updating Kali Linux
- Installing Kali NetHunter on HTC Nexus 9
Subscribe To Our Mailing List
Want To Be a Better Pentester
Subscribe to our mailing list and recieve FREE pentest tips, tricks, product reviews, news, article release notifications and more!
The Ultimate Burp Suite Training Program
- Burp Suite
- Forensics and Incident Response
- Information Gathering
- Penetration Testing Tutorials
- Web Applications
Web Application Hacking