Email Harvesting:
- the following notes are probably a moot point because of anti-SPAM laws, technologies, and the fact that email isn't as an effective marketing mechanism as it once was. However, they're useful for personal study. I wanted to know how email marketers got details of people. It can obviously be a laborious task. These are some sources and are an obvious continuation of my research on online marketing
http://dtbnguyen.blogspot.com/2018/08/create-usernames-security-script-random.html
https://dtbnguyen.blogspot.com/2019/08/finding-fundinginvestment-making-money.html
https://dtbnguyen.blogspot.com/2019/07/comparing-icos-random-stuff-and-more.html
https://dtbnguyen.blogspot.com/2019/07/online-marketing-and-sales-notes-random.html
https://dtbnguyen.blogspot.com/2019/02/cryptocurrency-market-manipulation.html
https://dtbnguyen.blogspot.com/2019/01/free-online-advertising-and-marketing.html
https://dtbnguyen.blogspot.com/2018/03/social-media-bot-coding-notes-random.html
http://dtbnguyen.blogspot.com/2018/01/social-media-comment-bot-random-stuff.html
https://dtbnguyen.blogspot.com/2018/03/compare-social-media-script-random.html
https://dtbnguyen.blogspot.com/2018/03/whitepaper-examine-script-random-stuff.html
https://dtbnguyen.blogspot.com/2018/03/random-picture-makingblending-script.html
https://dtbnguyen.blogspot.com/2018/02/email-address-harvesting-script-random.html
https://dtbnguyen.blogspot.com/2017/08/cryptocurrencies-cryptocurrency-mining.html
https://dtbnguyen.blogspot.com/2017/08/the-big-5-us-it-firms-arent-unbeatable.html
https://dtbnguyen.blogspot.com/2019/08/finding-fundinginvestment-making-money.html
https://dtbnguyen.blogspot.com/2019/07/comparing-icos-random-stuff-and-more.html
https://dtbnguyen.blogspot.com/2019/07/online-marketing-and-sales-notes-random.html
https://dtbnguyen.blogspot.com/2019/02/cryptocurrency-market-manipulation.html
https://dtbnguyen.blogspot.com/2019/01/free-online-advertising-and-marketing.html
https://dtbnguyen.blogspot.com/2018/03/social-media-bot-coding-notes-random.html
http://dtbnguyen.blogspot.com/2018/01/social-media-comment-bot-random-stuff.html
https://dtbnguyen.blogspot.com/2018/03/compare-social-media-script-random.html
https://dtbnguyen.blogspot.com/2018/03/whitepaper-examine-script-random-stuff.html
https://dtbnguyen.blogspot.com/2018/03/random-picture-makingblending-script.html
https://dtbnguyen.blogspot.com/2018/02/email-address-harvesting-script-random.html
https://dtbnguyen.blogspot.com/2017/08/cryptocurrencies-cryptocurrency-mining.html
https://dtbnguyen.blogspot.com/2017/08/the-big-5-us-it-firms-arent-unbeatable.html
- mine your personal history, files, and all email archives of yourself, friends, etc... You'd be surprised at home many people you come into contact with over time
https://dtbnguyen.blogspot.com/2020/01/finding-patterns-in-data-genetic-data.html
email extraction script github
https://github.com/topics/email-extractor
https://github.com/luisramirez-m/simple-email-scraper
https://github.com/FlyBase/email-extraction
https://dtbnguyen.blogspot.com/2020/01/finding-patterns-in-data-genetic-data.html
email extraction script github
https://github.com/topics/email-extractor
https://github.com/luisramirez-m/simple-email-scraper
https://github.com/FlyBase/email-extraction
email archive pst bitcoin github
https://github.com/MarekOtulakowski/backupmymail
https://sourceforge.net/directory/os:linux/?q=email+harvest
https://sourceforge.net/projects/bingemailsearch/files/latest/download
https://sourceforge.net/directory/os:linux/?q=email+harvest
https://sourceforge.net/projects/bingemailsearch/files/latest/download
- you can grow your own communities and harvest from there or else harvest from existing communities
- create competitions so that you can collect email addresses
- corporate intelligence is another source. My suspicion is that a lot of companies are selling data on the side. The Big 5 IT firms get caught out from time to time because they're simply bigger
Meet the scholar who diagnosed ‘surveillance capitalism’
https://apnews.com/a35264e36a09a3d2b35eec670ee10345
https://www.wired.com/story/ccpa-guide-california-privacy-law-takes-effect/
https://launchlab.com.au/how-to-determine-if-your-startup-idea-is-unique
Meet the scholar who diagnosed ‘surveillance capitalism’
https://apnews.com/a35264e36a09a3d2b35eec670ee10345
https://www.wired.com/story/ccpa-guide-california-privacy-law-takes-effect/
https://launchlab.com.au/how-to-determine-if-your-startup-idea-is-unique
invest mailing list mailinfo
- bribe, borrow, steal, etc... I've seen employees request an archive of their emails only to use it to create their own firm or work for a competitor
- mine mailing lists. A lot of them have obfuscation and privacy blocks but obviously a lot of Spammers have to make money so they do whatever it takes. I woudn't be surprised if some of them sign up to heaps of mailing lists and then extract email addresses afterwards
- Torrents have become another source
torrent email list
- random enumeration is another means. You'll get a lot of bounce backs but if your operation is backed (financially and/or by the security services in particular) this doesn't really mean anything because you'll likely have access to bot networks, better infrastructure, probably legal indemnification, maybe even staff, etc...
https://www.buzzfeednews.com/article/craigsilverman/disinformation-for-hire-black-pr-firms
https://invezz.com/news/cryptocurrency/north-koreas-lazarus-hackers-targeting-crypto-users-via-telegram/
troll farm software
https://www.shellypalmer.com/2018/03/build-troll-farm/
https://www.wired.com/story/to-see-the-future-of-disinformation-you-build-robo-trolls
https://invezz.com/news/cryptocurrency/north-koreas-lazarus-hackers-targeting-crypto-users-via-telegram/
troll farm software
https://www.shellypalmer.com/2018/03/build-troll-farm/
https://www.wired.com/story/to-see-the-future-of-disinformation-you-build-robo-trolls
- it's obvious that there a lot of people in the "security industry" (hackers/crackers) sell their services on the grey and black markets. Asking price can often reach tens of thousands of dollars but tend to fetch several hundred dollars. Selling data is very common in the cryptocurrency world from even less then legitimate sources. Secure communications channels are crucial to keeping this going? Posting part of data dumps is the most common mechanism for establishing bona-fides of particular data dumps
http://dtbnguyen.blogspot.com/2019/07/comparing-icos-random-stuff-and-more.html
https://en.wikipedia.org/wiki/Telegram_(software)
https://en.wikipedia.org/wiki/Telegram_(software)
Big databases of several gigabytes can go for a hundred dollars.
bitcointalk database dump
https://www.hackread.com/hacked-bitcointalk-forum-database-on-dark-web/
sell files internet
https://www.practicalecommerce.com/12-platforms-to-sell-digital-downloads
https://colorlib.com/wp/platforms-for-selling-digital-products/
https://ecommerce-platforms.com/ecommerce-selling-advice/top-10-best-ways-sell-digital-goods-online
https://www.hongkiat.com/blog/services-sell-digital-products/
sell files internet
https://www.practicalecommerce.com/12-platforms-to-sell-digital-downloads
https://colorlib.com/wp/platforms-for-selling-digital-products/
https://ecommerce-platforms.com/ecommerce-selling-advice/top-10-best-ways-sell-digital-goods-online
https://www.hongkiat.com/blog/services-sell-digital-products/
- if you've crawled and scraped before you'll realise this is another option. It's very slow though
- file dump and any type of repository websites are another source of information. This includes Amazon S3 buckets, Github, etc... Most of these tools built on Python version 3 and above. Fairly basic tools and not much different from other enumerating tools you've come across. Scrapers are available for most sites that you'll come across. If you understand enough about networking and the web you're better off building your own tools though?
https://dtbnguyen.blogspot.com/2018/09/subdomain-resolve-security-script.html
https://dtbnguyen.blogspot.com/2018/09/web-traverser-security-script-random.html
https://dtbnguyen.blogspot.com/2018/09/subdomain-resolve-security-script.html
https://dtbnguyen.blogspot.com/2018/09/web-traverser-security-script-random.html
amazon s3 scraper
https://github.com/robertdavidgraham/masscan
twitter account list pastebin
https://twitter.com/dumpmon?lang=en
https://www.echosec.net/blog/what-is-pastebin-and-why-do-hackers-love-it
pastebin monitor
https://isc.sans.edu/forums/diary/Quick+Tip+Pastebin+Monitoring+Recon/12091/
twitter account list pastebin
https://twitter.com/dumpmon?lang=en
https://www.echosec.net/blog/what-is-pastebin-and-why-do-hackers-love-it
pastebin monitor
https://isc.sans.edu/forums/diary/Quick+Tip+Pastebin+Monitoring+Recon/12091/
- ironically, the main issue is extracting emails from files of various types once you've collected adequate data. For larger files and archives you can end up spending hours on data processing and extraction algorithms. It takes me about 10 minutes to process/extract emails from about 1GB of compressed mail archives on an entry to mid level laptop using my own custom script/software. Like I said I've been thinking/working on applying High Performance Computing (HPC) style techniques to my home computer but other work is getting in the way at the moment
https://dtbnguyen.blogspot.com/2020/01/finding-patterns-in-data-genetic-data.html
https://dtbnguyen.blogspot.com/2020/01/finding-patterns-in-data-genetic-data.html
script extract email linux cli
scrape email linux
https://rietta.com/blog/grep-extract-e-mail-addresses-from-a-text-file/
- there are email verification sources out there if you're curious:
https://www.mailboxvalidator.com/
mailbox validation script
https://www.scottbrady91.com/Email-Verification/Python-Email-Verification-Script
https://github.com/scottbrady91/Python-Email-Verification-Script
- there are email verification sources out there if you're curious:
https://www.mailboxvalidator.com/
mailbox validation script
https://www.scottbrady91.com/Email-Verification/Python-Email-Verification-Script
https://github.com/scottbrady91/Python-Email-Verification-Script
- I spent a few hours yesterday and was able to collect lots of email addresses from all over the Internet for free (as a test). I didn't realise how easy it was going to be. Obviously, the usefulness of this data is limited given Anti-SPAM laws, technologies, and the fact that email isn't as an effective marketing mechanism as it once was
data email addresses
Why You Shouldn't Buy Email Lists
You'll violate the rules of consent under GDPR.
Reputable email marketing services don't let you send emails to lists you've bought.
Good email address lists aren't for sale.
People on a purchased or rented list don't actually know you.
You'll harm your email deliverability and IP reputation.
You can come across as annoying.
Your email service provider can penalize you.
The Sperminator (Ari Nagel):
- occasionally, I review the analytics for my blog and I get some strange, disturbing, and even funny referrers. Camgirls are quite regular referrers which is amusing as well as slightly disturbing (because nude girls could be coming to this blog, else males who watch nude girls, else both could be coming to this blog)? Recently though, someone was looking up stuff about the Sperminator (Ari Nagel) prior to read some of my blog posts. It's nice to know I'm your thoughts, I think?
the sperminator ari nagel
ari nagel wikipedia
Robert Palmer - Simply Irresistible (Official Video)
Right Said Fred - I'm Too Sexy (Original Mix - 2006 Version)
TED 2: Tom Brady's Jiss
Ted 2 (4/10) Movie CLIP - Sperm Bank Mishap (2015) HD
- identifying camgirls has become easier in the age of facial recognition?
camgirl
identify cam girl
facial recognition websites
Random Stuff:
- as usual thanks to all of the individuals and groups who purchase and use my goods and services
- latest in science and technology
Apple's 'sexist' credit card investigated by US regulator
Google set to offer banking current accounts
https://www.dailymail.co.uk/femail/article-7871621/The-cover-letter-introductions-job-interview.html
https://www.theguardian.com/technology/2019/oct/24/mind-reading-tech-private-companies-access-brains
- latest in finance and politics
https://www.abc.net.au/news/2019-03-06/the-astonishing-rise-of-chinese-president-xi-jinping/10794486
- latest in defense and intelligence
https://edition.cnn.com/2020/01/11/middleeast/iran-strike-al-asad-air-base-exclusive-intl/index.html
https://www.dailymail.co.uk/news/article-7857251/Iraqi-Hezbollah-threatens-turn-airbases-rubble.html
https://nationalinterest.org/blog/buzz/f-22-raptor-snuck-right-underneath-iranian-fighter-jet-111011
- latest in animal news
https://www.msn.com/en-us/autos/news/future-bmw-electric-cars-will-be-powered-by-cow-poop/ar-BBX8txG
- latest in music and entertainment
Random Quotes:
- When New Zealand businessman Andrew Barnes discovered his 240 employees were productive for only about a quarter of their average workday, he was "gobsmacked" and set out to claw back some of that lost time.
Findings from two studies of office workers in Canada and the UK, reported in The Economist, fuelled his mission to recover an extra 40 minutes of productive time each day.
The research told him that employees were productive for only 1.5 to 2.5 hours of a typical eight-hour day. After doing the maths, he figured out that he could get the same output from staff in four days, as in five, if they were productive for an extra 40 minutes a day.
- Thomas James Rielly
August 16, 2019
I've had a few people ask about how we've managed to build an incredibly strong outsourced development team (Robert Tran Hua). I quickly wrote up a process that we follow that I like to call "Survivor Developer Style"
If anyone is planning on building out an outsourced dev team, maybe it will provide you some value. One thing to note about this is that it's important to have someone with a dev background to be Jonathan LaPaglia (the host)
Step 1 - Upwork
Step 2 - Technology Stack
Step 3 –
· Eastern Europe
· Earned over 10k
· Proficient in tech that you’re using (i.e Vue, React, Node, whatever)
· English Speaking
· 98% +
Step 4 – Develop a small module that you want to use in the platform ~$200 (DO NOT TELL THEM YOU ARE WORKING WITH OTHERS)
Step 5 – Hire 10 people who meet the criteria in step 3
Step 6 – Monitor the employees throughout the work process in regards to communication, code documentation, updates, speed, code efficiency.
Step 7 – Cull 5/10 of the developers – Use the best result for the module within your platform.
Step 8 – Develop a larger module that you want to use in the platform ~$500 through to $1k
Step 9 – Take the top 5 developers from the first module through to this round and have them work on the larger module.
Step 10. Refer to step 6 and Cull all but 2.
Step 11. Use the best module from step 8 in your product.
Step 12. Develop an even larger module ~3-5k
Step 13. Have the final 2 developers go head to head on this.
Step 14. Use the best module in your application and hire the developer who did the best throughout the whole process as your developer for whatever it is they’ve been doing for you.
Step 15. Continue to work with this person who is now the sole champion of survivor developer style.