People

Table of contents

  1. Vulnerability
  2. Prerequisites
  3. Exploit
  4. Useful links
  5. Recommendations

Vulnerability

TODO: Describe the vulnerability here.

Prerequisites

  • Knowing email or username your target uses.

Exploit

If you know a username of your target, use Maigret to identify where this username is used.

maigret $username

Otherwise, if you know an email of your target, use Holehe or H8mail to identify on which websites this email is used.

holehe $email
h8mail -t $email

You can also use SpiderFoot to search information on someone based on any initial information: name, email, phone, etc.

spiderfoot -l 127.0.0.1:8000

Recommendations

  • TODO: List recommendations here.