This project demonstrates the use of OSINT tools for information gathering on target domains.
Tools used: theHarvester, Google Dorking, subfinder, Sherlock, Dirb, Disearch.
To simulate how attackers might uncover hidden information about organizations, and to document mitigation strategies.
- theHarvester → Email enumeration
- Google Dorking → Sensitive data discovery
- subfinder → Subdomain enumeration
- Sherlock → Username search
- Dirb / Disearch → Directory brute-forcing
- WhatsApp.com → Email harvesting, admin panel exposure
- Flipkart.com → Subdomain enumeration, sensitive file discovery
- Instagram.com → Email harvesting, directory scans
- Importance of information gathering in cybersecurity
- How attackers leverage OSINT tools
- Defensive strategies to mitigate exposure
- [Google Cybersecurity Certificate (Coursera, Oct 2024)] (https://drive.google.com/file/d/1NcLcc8sMx3uteKy7X3UbuV9xt6bVg3dl/view?usp=sharing)
- [Internship completion certificate (Coincent, Sep 2024)] (https://drive.google.com/file/d/1kE7YC_Hn4f1LLfLe1H_iF1wLhSHYgKMS/view?usp=sharing)
Aarushi Agrawal
Course: Cyber Security & Ethical Hacking
Submitted to: Coincent Technologies