CyberMoransđ¤
There are a many places where compromised emails and passwords â are stored and not all of them contain all the latest dumpsđ But there is a tool that can search through all of these databases and determine whether an email has been compromised đ and which data dump compromised it!.....very convenientđ
h8mail is a tool for finding compromised email addresses and their passwordsđ from these data breachesđ. When you combine this tool with others such as TheHarvester or the crosslinked tool, you can harvest email addresses from an organization you wish to target and then test to see if they have been compromised...Then use the credentials to gain initial access on the Organization. Although there are numerous tools to do so, h8mail may just be the best!đ
In this Post, I showcase how to use h8mail to quickly and effectively find an emailđ in these data dump databases that may contain a current password or hash of the passwordđľđŞ
đ Install h8mail
The first step If you have not yet installed pip3, you can do so by enteringđ
kali > apt install python3-pip
We can simply download it from pip3đ
kali > pip3 install h8mail
đ h8mail help
Before get started, let's look at this tool's help screen. When I installed it, the package placed my binary file in /home/kali/.local/bin. Yours may be different. If this directory is not in your $PATH variable, you will need to add it or simply navigate to the directory where the binary is locatedđ
kali > cd /home/kali/.local/bin
Now, preface the command with the name of the interpreter (python3), you should be able to run this script. Simply append a -h after the command to display the helpđ
kali > python3 h8mail -h
h8mail has muchas muchas opcionesđ -- but in its simplest usage, the syntax looks something like thisđ
python3 h8mail -t <target email address>
đ Add the API Keys
Next, we need to create a configuration file and provide API keys to the databases we want to search. Create a config fileđ
kali >python3 h8mail -g
h8mail will now create config file in the directory you executed this command from. I ran the command from /home/kali/.local/bin, so my config file was placed in that directory. Yours may be different, but h8mail will display the directory and file name after creating the file like sođ
Now, you have the option to use API keys from the premium services such as haveibeenpwned.com. To do so, click on the API tab at the top of the screen đ
haveibeenpwned.com is among the largest repositories of data dumps on the web. They require that you first provide a password and verify it. Finally, they ask that you pay a nominal $3.50/month to use their service....đ
Once you have an API key, open the config file and place the API key in the config file đ
kali> mousepad /home/kali/.local/bin/h8mail_config.ini
Place the API key after the hibp (haveibeenpwned) or the respective service line and uncomment it and the 'leak-lookup_pub line', incase you have used haveibeenpwned as well...â
Now lets HUNT! đŞ
đ Searching for emails in dumps
h8mail's syntax is rather simpleđ. We only need to use the -t option followed by the target email address or a text file with a bunch of emails to search the dumps for the email(s) followed by the -c option and the location of your config file, such asđ
kali > python3 ./h8mail -t emails.txt -c /home/kali/.local/bin/h8mail_config.ini
Hit enter and h8mail begins its search through the databases we specified in the config fileđ
If we want to save the results in a text file, we can use the -o option followed the name of file we want the results saved to đ
kali > python3 ./h8mail -t emails.txt -c /home/kali/.local/bin/h8mail_config.ini -o PostaKiserian_results.txt
To open the output file, you can use any text editor or the less command to view the output. to do a search of a specific email we only have to use the h8mail -t argument like đ
kali > python3 ./h8mail -t tom@myspace.com
đConclusion đ¤
Subscribe to receive notifications of similar posts đ where we will be reverse engineering malware, vulnerabilities as well as hacking tools, vectors, stories, tutorials and other Infosec stuff...đ
Follow me on twitter for daily Infosec Memes and shenanigansđ
Morans,
Thank you for taking time and hope you learned something new, Like/Share and leave a comment/review and as always, stay awesome! đđ đŞ
ComentĂĄrios