EI 2024 MOBMU-328 Samrudha - Mhatre
EI 2024 MOBMU-328 Samrudha - Mhatre
MOBMU-328
© 2024, Society for Imaging Science and Technology
1 SRHBerlin University of Applied Sciences, Berlin School of Technology, Ernst-Reuter-Platz 10, D-10587 Berlin, Germany
Email: [email protected], [email protected], [email protected], [email protected]
2 Technische Hochschule Brandenburg, Department of Informatics and Media, IT- and Media Forensics Lab, Magdeburger
Str. 50, D-14770 Brandenburg, Germany, Email: [email protected]
3 University of Granada, Faculty of Economics and Business, P.◦ de Cartuja, 7, ES-18011 Granada, Spain
Keywords: Open Source Intelligence, OSINT, SOCMINT, Cybersecurity, OSINT Investigation, Cybersecurity Training
Hunter
Hunter is a web application looking for email finder and
verification help running email campaigns. Using Hunter’s
services, professionals can connect with people who matter. The
application founders are François Grante and Antoine Fink.
Demonstration:
Figure 2. Screenshot of Hunter.io
• Domain’s search
Domain search allows the user to look for relevant verified • Author finder:
mail, and the pattern can be determined with the mail avail- With the Author Finder, the user can find out who wrote
able in the public domain. This search provides a personal an article and their professional email address. Based on
and generic view as well. the application’s information about the domain name of the
• Type filter given article, we can guess the email address or search for
Show only personal or role-based email addresses. it in our base. Based on the result, the application provides
• Email pattern confidence that it is a genuine email address.
The most common email format used in your organization
can be identified by selecting from dozens of combinations.
• Find someone
Enter the person’s name, and the user will be given their
email address.
• Score & verification
Obtain a confidence score or list of verified email addresses.
• Save a lead
Any email the user receives from your leads can be exported
or imported straight into your favorite CRM.
• Sources
Almost every email address has public sources that the user
can check and the last discovery date.
Figure 3. Screenshot of Hunter.io
• Verify
Using Email Verification, the application can check a recip-
ient’s deliverability without emailing. It verifies the format,
domain information, and responses from the mail servers to
verify that an email address can be used. The example be-
low is about a current employee and an old employee. The
older employee is Invalid as it is disabled, while the current
employee’s mail is valid. This section in the application pro-
vides information about the format, type, server status, and
email status.
• Bulks
The bulks option in this application allows the user to per-
form various tasks simultaneously. The task includes do-
Figure 1. Screenshot of Hunter.io main search, email Finder, author Finder, and email verifi-
cation.
The feature also shows the number of times the recipient has
• Add-ons
opened the mail.-
Hunter has add-on features like Chrome extension, Google
• Limitation
Sheets add-on, mail tracker, and templates. All these fea-
You can perform several email verifications per month based
tures are easy to use. Chrome extension allows the user to
on your monthly verification quota. A limit is set per do-
get the email address of the website it is currently browsing.
main: you can verify 200 email addresses per 24 hours from
Steps to add Chrome extension:
a single domain name. Bulk email verification allows for a
1. Search Hunter’s Chrome Extension page. maximum of 10,000 emails to be verified.
2. Then click + Add to Chrome” button.
3. Click the Add extension button to confirm. Emailable
After the extension is installed, it allows one to find email Emailable is a Fully equipped email verification solution.
addresses with a simple click while you are on the website. Sending emails is not sufficient. They must be delivered. Deliver-
ability and ROI for your email marketing campaigns will increase
1. Go to the website you want to get the email address with one of the most affordable and reliable mail-checking
for. services.
2. Click on the extension icon in your browser.
Using that method, you can find all the email addresses with Demonstration:
the same domain (i.e., finishing with Talon.One) we found The emailable web application has various categories: bulk,
on the web, along with the URL where each address was monitor, single, and API. The bulk category allows for the cre-
found. ation of a list of targeted emails. The list can be added to the bulk
Demonstration:
Creating a spreadsheet is the base for users of any Phantom
Buster categories. The spreadsheet setup is essential.
In column A, enter a list of full names, one person per row.
Having first names in one column and last names in another is
also possible. After that, enter the names of the corresponding
companies (or websites) for each person.
A column titled ”name” should be used for the full name,
while a column titled ”company” should be used for company
names.
Make this spreadsheet public so Phantom Buster can access
it.
Limitation:
The web application has limited access during the trial pe-
riod. The execution time is just 2 hours, while only five searches
were possible.
Figure 12. Screenshot of LeadFuze
LeadFuze
LeadFuze is a Lead Generation Software that provides ad-
vanced communication data. It uses Artificial Intelligence to find
specific clues in specific fields and industries. They are used by
sales, hiring teams, and marketing organizations. Key features
offered by LeadFuze software include automated listing, reliable
email access, and a focus on exciting prospects.
Get the contact details of any business professional. Get
contact details and social media profile information such as
Facebook, LinkedIn, Instagram, etc. Search all market segments
or specific people or accounts. They are used by retailers,
employers, and advertisers in marketing agencies, employees, IT,
and start-ups.
Demonstration:
LeadFuze consists of different searches, such as market- Figure 13. Screenshot of LeadFuze
Email Harvester
In this package, you will find Email Harvester, a tool to re-
trieve Domain email addresses from search engines.
Email harvesting or scraping can obtain email address lists Figure 18. Screenshot of emailharvester
through various methods.
deliverable, but the mail server accepts all the Email addresses.
No malicious or suspicious activities are found from this address.
Figure 21. Screenshot of Email Header Analyzer
suspicious sender.
The next important thing that can be useful is IP addresses.
The application also provides information regarding the
header. In this section, the output of each header description in-
cludes both a description and a formatted and decoded header, if
Figure 20. Screenshot of Simple Email Reputation available.
Input: [email protected]
Output: Risky
Suspicious. The email address is not found on the Internet,
and there is no primary profile on LinkedIn, Facebook, or other
social media accounts. A lack of digital presence may indicate
that this is new and can be suspicious mail. The domain has a low
reputation. The email address is deliverable, and the mail server
accepts all the emails.
Limitation:
The application does not provide a proper output and can be
a false positive output.
Figure 22. Screenshot of Email Header Analyzer
E-Mail Header Analyzer
An email header can be checked and analyzed with this tool. Information like delivered to Return-Path, X-Google-SMTP-
Received lines are displayed separately, and the data is displayed. Source, Authentication-Results, message-ID, DKIM-Signature
The tool is all about providing information extracted from the with an explanation for each information shown.
header of any mail. Information like Time Overview, Descrip- This tool helps to get a person’s IP address. This can be a
tion, Received Details, Public IP Addresses, and Header Descrip- helpful thing in case of fraudulent activities. This application can
tion (Recipient hostname, Sender hostname). The tool is available help police keep track of information regarding any suspicious
for free. The owner of the tool is Gaijin. activities.
To use this tool, the user needs to get the header of the
particular mail about which the user needs more information. Limitation:
The header needs to be pasted in the box and searched. The application is free, and there is no control over who will
use this service. IP addresses failing into the wrong hands can
Demonstration: be dangerous. That login page and security are essential for this
Once the header is copied, paste it into the box and click service to be used.
enter.
After clicking enter, the output will have a systematically Google Admin Toolbox Message header
arranged header, time overview of the mail, description, and other This is another Email Header checker. These tools provide
information. more accurate information regarding the mail using its header.
The time overview will provide information about the The Gmail headers are crucial in revealing sensitive information
sender, receiver, and the cycle from where the mail has traveled about the sender and other aspects of your network. Thus, one will
to the end recipient. It will also show IP addresses. likely find sensitive information if one carefully analyses Gmail
The description will show a proper timeline for the mail. headers. The Gmail header contains the following elements:
The receiver details more information about the sender until Delivered-to: This field indicates the email address of the
it reaches its target. Here, a warning will be raised regarding any recipient. It usually contains the same email ID used to analyze
Problem description:
The use cases are an example of Blackmailing mail and
Lottery/Fund Mail. There is an email received on the target mail
addresses. The mail has blackmailed the person to reveal the
secret of the business accessed by the sender. The sender has
demanded a Bitcoin to solve this issue. Another example is a
person trying to send money to the target by making an emotional
and nationality-based connection. The solution here would pro-
vide how an investigator can use your email analyzer and other
tools to get information about all the relevant parties, like the
organization whose server has been used. All this analysis will
be done using the email header. Email headers serve as passports
for your messages. Each email server it encounters inserts entries
into the header along the way. Therefore, the longer the header,
the more servers route the Email. The ransomware threat is not
possible using Google Mail.
Figure 23. Screenshot of Google Admin Toolbox Message header
•Blackmailing mails
The output in the figure below will have information about A lot of information is contained in email headers.email
the message held, created at, from, to, subject, and DKIM. readers will only see the subject, the sender’s Email, and other
information.
Here is an email that can help the investigator find the
sender’s information, like IP address, server information, etc. The
investigator will use the mail header to collect more information
about the sender. The header can be accessed by clicking on the
show original option in the Gmail account.
The user will now copy the header from the mail. This
Figure 24. Screenshot of Google Admin Toolbox Message header header will be pasted into the Email Header Analyzer or Gmail
Email header tool. Now, the header will be pasted into the ana-
The other part of the output shows the entire timeline from lyzing tools.
the destination to the recipient. The timestamp is from when it is The header will then be analyzed using the Google Gmail
received and the protocol. header tools. To investigate suspicious mail, it is essential to know
The heat map we got from the Passive Total shows the do-
main has been online since February 3 and is still working. The
domain is still being used to send spam messages.
Figure 40. Screenshot of Google Admin Toolbox Message header (Use Analysis
case) Every OSINT tool behaves and approaches situations dif-
ferently depending on the scenario, which changes the tools and
settings every time. Section V offers a complete breakdown of
header entry, it adds another one below it. There is a high like- each OSINT tool and its primary findings. Each tool is explained
lihood that this email server is under the control of a malicious and demonstrated as the limitation of these tools. Depending on
sender. This information should not be trusted. It is still worth the use cases associated with intelligence gathering and analysis,
investigating. We should try to determine the location of the these tools can be helpful individually and together. An author
email server. After seeing the delay and the domain provider, the has created a table to find a solution to this problem, where dif-
sender’s mail address [email protected] is fake. Thus, the investi- ferent tools are shown without undermining the effectiveness of
gator can inform aol.com about a possible breach in their domain. the other tools. Based on their effectiveness, the ten tools listed in
For more information regarding the server, the investigator Appendix A have been selected from 115.
can use Passive Total’s website. The heat map shows that the
Each tool provides different types of information. Typically,
domain mail.shako.com.tw has been live since February 1, 2022,
OSINT tools for Email have the primary function of obtaining the
and is still alive.
Email address of a targeted individual from an organization. Table
VI illustrates that many tools have different features, all of which
are considered while analyzing tools. The best tool selection re-
lies on which works in most cases when analyzing large data sets.
The author found the tool hunter to have the most required fea-
tures to work with different methods and with more accuracy than
others. These tools have many good features like Domain Search,
Email Finder, and Verifier. There is also an option for Bulk tasks
where the user can run or perform all the features with multiple
inputs. The Email Analyzer is an effective tool that police can use
Figure 41. Screenshot of Passive Total (Use case)
to investigate fraud mail to catch such culprits or for companies
to set up filters to prevent employees from getting phished.
The investigator can look into the resolution and WHOIS
sections to get more information about the organization’s IP, Conclusion and limitations
Email, and name. This study suggested that OSINT tools could be a good
source of information about mail addresses from any organiza-
tion during a demonstration and analysis of the OSINT tool for
email addresses. People tend to keep a lot of data in their email
addresses that can be analyzed in many ways and based on differ-
ent data models, which are significant resources in data collection,
mining, etc. The data can be the location of the person, the history
of the person, and other things. When used as digital footprints,
data can be analyzed simultaneously across various targets with
fewer resources than traditional data gathering, processing, and
analysis methods. Automating the analysis of big data sets with
a set of tools is very important. The analyst selects the toolset
from the list of use cases and scenarios, even though the author
Figure 42. Screenshot of Passive Total (Use case) has found a list of tools with these features. In analyzing the
toolset, researchers found that users can access only public data
Using the tool on the domain mail.shako.com.tw, we found via these tools, regardless of the location from which they access
that the server is based in Taiwan. A genuine person requesting the data. If the researcher has significant funds to spare for the
help would instead use a legitimate server from the country in task, it is possible to consider premium plans available after the
which they are located. The person won’t use a server in Taiwan basic plan. Most tools offer data export functions as well. Once an
to get help. Email address is found or identified, various hacking techniques
The information collected until now is the location of the like Phishing (Email spoofing), spear phishing, and dictionary at-
server and the delay time in sending the mail. This factor is tacks are used. Thus, the account or mail address is subject to a
Author Biography
Samrudha Mhatre received his Master’s in Computer Sci-
ence, focusing on Cyber Security in 2022. His research interests
include computer security and OSINT technologies and applica-
tions.
Franziska Schwarz received her M.Sc. in Computer Science
from Technische Hochschule Brandenburg (Germany) in 2022.
Since 2021, she has worked in cyber security consulting with
clients in the public and private sectors. Her research focuses on
Cybersecurity and Management, Data Protection, IoT, and Smart
Home Security.
Klaus Schwarz received his B.Sc. and M.Sc. in Computer
Science from Brandenburg University of Applied Sciences (Ger-
many) in 2017 and 2020, respectively. Klaus is working in tech-
nology consulting as an AI specialist for clients in the public and
private sectors. Furthermore, he is a Ph.D. student at the Uni-
versity of Granada, Spain. His research interests include IoT and
smart home security, OSINT, mechatronics, additive manufactur-
ing, embedded systems, artificial intelligence, and cloud security.
As an SRH Berlin University of Applied Sciences faculty member,
he developed a graduate program in Applied Mechatronic Sys-
tems focusing on Embedded Systems at SRH Berlin University of
Applied Sciences.
Reiner Creutzburg is a retired Professor of Applied Com-
puter Science at the Technische Hochschule Brandenburg in
Brandenburg, Germany. Since 2019, he has been a Professor
of IT Security at the SRH Berlin University of Applied Sciences,
Berlin School of Technology. He has been a member of the IEEE
and SPIE and chairman of the Multimedia on Mobile Devices
(MOBMU) Conference at the Electronic Imaging conferences
since 2005. In 2019, he was elected a member of the Leibniz So-
ciety of Sciences to Berlin e.V. His research interest is focused on
Cybersecurity, Digital Forensics, Open Source Intelligence (OS-
INT), Multimedia Signal Processing, eLearning, Parallel Memory
Architectures, and Modern Digital Media and Imaging Applica-
328--16
ation Platform of Re- Col-
sults lection
Meth-
ods
Hunter easy Web-based 25 searches text account option for teams; API op- credits are deducted most 25 searches and 50
and 50 tion; search features including domain from Hunter for recent, verifications per
monthly search, bulk domain search, ...; veri- generating emails, real-time month; free (paid
verifications fying email addresses, tracking email but Hunter also version with more
campaigns, and sending email drip takes away credits features)
campaigns for validating those
emails
Emailable easy Web-based Limited to graphical helps marketing teams plan campaigns veracity of infor- not limited to credit;
credit by sorting email addresses into multi- mation known free (paid version
ple categories; provides open API, de- with more features)
velopers can connect to common pro-
gramming languages
Phantom easy Web-based 14-day free text helps to find professional email quite pricing is quite real-time 14-day free trial;
Buster trial easily; reduces the complexity of au- high; social media free (paid version
tomating search with various platforms platforms are heav- with more features)
like LinkedIn and Twitter ily emphasized in
software
LeadFuze easy Web-based 25 leads free text quick set-up; high-quality detailed data confusing to use; real-time 25 leads free; free
export limits; au- (paid version with
tomation limits; more features)
pricing is high
Email Har- moderate runs on unlimited text output is specific to the command output is not real- stored unlimited; free
vester virtual time; needs virtual data is
machine machine reveal
Simple easy Web-based 250 queries test easy to use; provides good information accuracy of the in- real-time 250 queries per
Email per month, formation month, up to 10
Reputation up to 10 queries/day; free
queries/day (paid version to use
more features)
SpiderFoot easy Web-based 5 scans test easy to use; good detailed information paid version needed Unknown 5 scans available
HX available to enable many fea- and 1 target per
and 1 target tures; limited time scan; free (paid ver-
per scan for the scans in the sion to use more
free version features)
AeroLeads moderate Web-based limited to 5 text pricing is relatively good; enriches the improve on their not 5 credits; free (paid
Email credits contact with other details ease of use; accu- known version to use more
Finder racy needs to be im- features)
proved
Mobile Devices and Multimedia: Enabling Technologies, Algorithms, and Applications 2024
IS&T International Symposium on Electronic Imaging 2024
E-Mail easy Web-based unlimited text easy to use; good results (information is accuracy needs to most free
Header produced) be improved recent;
Analyzer real-time
Google easy Web-based unlimited text easy to use; good results (information is accuracy needs to most free
Admin produced) be improved recent;
Toolbox real-time
Message
Header
Table 1: List of tested and recommended OSINT-based Email investigation tools