Find target Internet activity across Social Networks using Sherlock

July 13th, 2019 by

When gathering our target internet activity on the internet, Sherlock is a great tool we can easily use to collect opensource intelligence (data that are produced from publicly available information). The downside of open-source intelligence, whilst can be used by security professionals, so does threat actors. With a single clue, such as username/email, we can obtain information like transactions, family members and other account created by our target.

In this tutorial we need Kali Linux, Python 3 and pip to install the dependencies and run Sherlock.

Step 1: Clone the Sherlock Project

Open up your terminal and clone the project by pasting the following clone command.

 

Step 2: Install dependencies.

Install Sherlock dependencies using Pip3.

 

Step 3: Gathering opensource intelligence

To start OSCINT, type the following command. You will see the list of URLs the user is associated to.

Step 4: Viewing results

If you list all the files, you will notice a “user123.txt” exist. Open if by using the nano command.

For more options, you can open sherlock help using this command.

 

To share awareness, please share this post by clicking the social media icons below 🙂

Spread the love


Comments

2 Comments

  1. GG

    July 14, 2019 at 1:35 pm

    I mean the step #2.

    Reply
    • cedcraftscodes

      July 14, 2019 at 7:21 pm

      Are you using Python3 and Pip3 for Python?

      Reply

Leave a Reply

Your email address will not be published.