Autors: Terneva, Z. A., Vladimirov, I. H., Nikolova, D. V.
Title: Accessing LinkedIn and Google E-mail Databases Using Kali Linux and TheHarvester
Keywords: Databases; e-mails; Kali Linux; Phishing attacks; TheHarvester

Abstract: In this scientific paper, a test is made on how reliable and secure databases are. The simulation shows how easily hackers can access a database and use its contents maliciously. It is performed on a virtual machine Kali Linux using the software program - TheHarvester. People's personal email addresses have been used and shown for educational purposes only. The aim is to analyse the accessibility of data collections.


  1. Ramzan, Z., 2010, Handbook of Information and Communication Security, Chapter: Phishing Attacks and Countermeasures, Germany, Springer Berlin, Heidelberg
  2. Terneva, Z., 2021, Master Thesis: Design and Development of A Solution for Malware Protection, Technical University - Sofia
  3. Velev, M., 2019, Pragmatic Lectures: Penetration Testing and Information Security, Pragmatic
  4. Wang, Z., Sun, L., Zhu, H., 2020, Defining Social Engineering in Cybersecurity, IEEE Access, Volume 8, pp. pp.85094-85115
  5. Gupta, B.B., Arachchilage, N.A.G., Psannis, K.E., 2018, Defending against phishing attacks: taxonomy of methods, current issues and future directions, Telecommunication Systems, Volume 67(2), pp. pp.247-267
  6. Jagatic, T.N., Johnson, N.A., Jakobsson, M., Menczer, F., 2007, Social phishing, Communications of the ACM, Volume 50(10), pp. pp.94-100
  7. Till-Rogers, M., 2013, Protecting Yourself from Consumer Fraud and Scams, Australian Competition & Consumer Commision, <>, Дата на последен преглед (Last accessed on): 16.09.2022
  8. Prince, M.B., Holloway, L., Langheinrich, E., Dahl, B.M., Keller, A.M., 2005, Understanding how spammers steal your E-Mail address: An analysis of the first six months of data from project honey pot, California, USA, 21-22 July 2005, <USA>, CEAS
  9. Brewer, D., Li, K., Ramaswamy, L., Pu, C., 2010, A link obfuscation service to detect webbots, Shanghai, China, 5-10 July 2010, <>, IEEE
  10. Uehara, K., Mukaiyama, K., Fujita, M., Nishikawa, H., Yamamoto, T., Kawauchi, K., Nishigaki, M., 2020, Basic Study on Targeted E-mail Attack Method Using OSINT, Caserta, Italy, 15-17 April 2020, <Switzerland>, Springer Cham
  11. Yu, N., Tuttle, Z., Thurnau, C.J., Mireku, E., 2020, AI-powered GUI attack and its defensive methods, Tampa, FL, USA, 2-4 April 2020, <USA>, Association for Computing Machinery, Inc
  12. Routh, C., Decrescenzo, B., Roy, S., 2018, Attacks and vulnerability analysis of e-mail as a password reset point, Miami Beach, CA, USA, 24-25 February 2018, <>, IEEE
  13. Engebretson, P., 2011, The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy, 2nd ed., USA, Syngress
  14. Wang, W., Bickford, J., Murynets, I., Subbaraman, R., Forte, A.G., Singaraju, G., 2012, Catching the Wily Hacker: A multilayer deception system, Newark, NJ, USA, 21-22 May 2012, <>, IEEE
  15. Klimburg-Witjes, N., Wentland, A., 2021, Hacking Humans? Social Engineering and the Construction of the “Deficient User” in Cybersecurity Discourses, Science Technology and Human Values, Volume 46(6), pp. pp.1316-1339
  16. Zeltser, L., 2006, Phishing Messages May Include Highly-personalized Information, SANS Internet Storm Center, <>, Дата на последен преглед (Last accessed on): 16.09.2022
  17. Jakobsson, M., Ratkiewicz, J., 2006, Designing ethical phishing experiments: A study of (ROT13) rOnl query features, New York, NY, USA, 23-26 May 2006, <USA>, Association for Computing Machinery
  18. Malik, M., Patel, T., 2016, Database security - Attacks and control methods, International Journal of Information Sciences and Techniques, Volume 6(1/2), pp. pp.175–183


ICEST Conference, issue 56, pp. 59 - 62, 2021, Bulgaria, IEEE, DOI 10.1109/ICEST52640.2021.9483460

Copyright IEEE

Full text of the publication

Вид: постер/презентация в международен форум, публикация в реферирано издание, индексирана в Scopus