Autors: Terneva, Z. A., Vladimirov, I. H., Nikolova, D. V. Title: Accessing LinkedIn and Google E-mail Databases Using Kali Linux and TheHarvester Keywords: Databases; e-mails; Kali Linux; Phishing attacks; TheHarvestAbstract: In this scientific paper, a test is made on how reliable and secure databases are. The simulation shows how easily hackers can access a database and use its contents maliciously. It is performed on a virtual machine Kali Linux using the software program - TheHarvester. People's personal email addresses have been used and shown for educational purposes only. The aim is to analyse the accessibility of data collections. References - Ramzan, Z., 2010, Handbook of Information and Communication Security, Chapter: Phishing Attacks and Countermeasures, Germany, Springer Berlin, Heidelberg
- Terneva, Z., 2021, Master Thesis: Design and Development of A Solution for Malware Protection, Technical University - Sofia
- Velev, M., 2019, Pragmatic Lectures: Penetration Testing and Information Security, Pragmatic
- Wang, Z., Sun, L., Zhu, H., 2020, Defining Social Engineering in Cybersecurity, IEEE Access, Volume 8, pp. pp.85094-85115
- Gupta, B.B., Arachchilage, N.A.G., Psannis, K.E., 2018, Defending against phishing attacks: taxonomy of methods, current issues and future directions, Telecommunication Systems, Volume 67(2), pp. pp.247-267
- Jagatic, T.N., Johnson, N.A., Jakobsson, M., Menczer, F., 2007, Social phishing, Communications of the ACM, Volume 50(10), pp. pp.94-100
- Till-Rogers, M., 2013, Protecting Yourself from Consumer Fraud and Scams, Australian Competition & Consumer Commision, <https://www.accc.gov.au/consumers/consumer-protection/protecting-yourself-from-scams>, Дата на последен преглед (Last accessed on): 16.09.2022
- Prince, M.B., Holloway, L., Langheinrich, E., Dahl, B.M., Keller, A.M., 2005, Understanding how spammers steal your E-Mail address: An analysis of the first six months of data from project honey pot, California, USA, 21-22 July 2005, <USA>, CEAS
- Brewer, D., Li, K., Ramaswamy, L., Pu, C., 2010, A link obfuscation service to detect webbots, Shanghai, China, 5-10 July 2010, <>, IEEE
- Uehara, K., Mukaiyama, K., Fujita, M., Nishikawa, H., Yamamoto, T., Kawauchi, K., Nishigaki, M., 2020, Basic Study on Targeted E-mail Attack Method Using OSINT, Caserta, Italy, 15-17 April 2020, <Switzerland>, Springer Cham
- Yu, N., Tuttle, Z., Thurnau, C.J., Mireku, E., 2020, AI-powered GUI attack and its defensive methods, Tampa, FL, USA, 2-4 April 2020, <USA>, Association for Computing Machinery, Inc
- Routh, C., Decrescenzo, B., Roy, S., 2018, Attacks and vulnerability analysis of e-mail as a password reset point, Miami Beach, CA, USA, 24-25 February 2018, <>, IEEE
- Engebretson, P., 2011, The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy, 2nd ed., USA, Syngress
- Wang, W., Bickford, J., Murynets, I., Subbaraman, R., Forte, A.G., Singaraju, G., 2012, Catching the Wily Hacker: A multilayer deception system, Newark, NJ, USA, 21-22 May 2012, <>, IEEE
- Klimburg-Witjes, N., Wentland, A., 2021, Hacking Humans? Social Engineering and the Construction of the “Deficient User” in Cybersecurity Discourses, Science Technology and Human Values, Volume 46(6), pp. pp.1316-1339
- Zeltser, L., 2006, Phishing Messages May Include Highly-personalized Information, SANS Internet Storm Center, <https://isc.sans.edu/diary/Phishing+Messages+May+Include+Highly-Personalized+Information/1194>, Дата на последен преглед (Last accessed on): 16.09.2022
- Jakobsson, M., Ratkiewicz, J., 2006, Designing ethical phishing experiments: A study of (ROT13) rOnl query features, New York, NY, USA, 23-26 May 2006, <USA>, Association for Computing Machinery
- Malik, M., Patel, T., 2016, Database security - Attacks and control methods, International Journal of Information Sciences and Techniques, Volume 6(1/2), pp. pp.175–183
Issue
| ICEST Conference, issue 56, pp. 59 - 62, 2021, Bulgaria, IEEE, DOI 10.1109/ICEST52640.2021.9483460 |
Copyright IEEE Full text of the publication |