Email Addresses
Email Addresses
Identifying existing email addresses can also provide us with a massive attack vector that we can use to our advantage. We can use emails in many ways. Among other things, email can be used not only for phishing attacks, but we can also analyze the traffic of these to identify which is the "central" point for the processing of emails. After all, this will have by far the most sent emails. We can also subscribe to newsletters and analyze their headers with MXTools, which will also show us the route of the email and its security settings.
![[infra-emails.png]]
Email addresses may have different structures even within the same company. One of the most common examples is when the first
and last name
(first.lastname@domain.tld
) is used in the email address. However, the email addresses can be created with usernames
(username@domain.tld
) not to show the user's full name.
Last updated