Step 2 – specifying a target

Just like in the procedure for gathering data about a domain name using Footprint L3, this machine also prompts a user to enter some details about the target. It requests a target's full name. Once the name is provided and the user clicks OK, the software does a basic search to find all email addresses that are closely related to the name given. It will come back with a number of email addresses that it finds to be correlated with the name and prompt the user to pick the relevant email(s). This is because some of the email addresses will not be related to the target and it is a waste of resources to dig into them. You will be able to see the interface prompting a user to select the email addresses that are more ...

Get Learn Social Engineering now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.