Skip to content

CrapeBell/coincent-cybersecurity-assignment

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

2 Commits
 
 
 
 
 
 
 
 

Repository files navigation

Coincent Cybersecurity Assignment

📌 Overview

This project demonstrates the use of OSINT tools for information gathering on target domains.
Tools used: theHarvester, Google Dorking, subfinder, Sherlock, Dirb, Disearch.

🎯 Objective

To simulate how attackers might uncover hidden information about organizations, and to document mitigation strategies.

🛠 Tools & Techniques

  • theHarvester → Email enumeration
  • Google Dorking → Sensitive data discovery
  • subfinder → Subdomain enumeration
  • Sherlock → Username search
  • Dirb / Disearch → Directory brute-forcing

📊 Case Studies

  • WhatsApp.com → Email harvesting, admin panel exposure
  • Flipkart.com → Subdomain enumeration, sensitive file discovery
  • Instagram.com → Email harvesting, directory scans

✅ Key Learnings

  • Importance of information gathering in cybersecurity
  • How attackers leverage OSINT tools
  • Defensive strategies to mitigate exposure

📜 Certifications

👩‍💻 Author

Aarushi Agrawal
Course: Cyber Security & Ethical Hacking
Submitted to: Coincent Technologies

About

“Cybersecurity OSINT assignment using tools like theHarvester, Google Dorking, Subfinder, Sherlock, Dirb, and Disearch."

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors

Languages