Recon Tool: CrossLinked

by | Aug 26, 2022 | Tools

Premium Content

Patreon

Subscribe to Patreon to watch this episode.

Reading Time: 2 Minutes

CrossLinked

CrossLinked by m8sec, is a LinkedIn enumeration tool that uses search engine scraping to collect valid employee names from a target organization. This technique provides accurate results without the use of API keys, credentials, or even accessing the site directly. Formats can then be applied in the command line arguments to turn these names into email addresses, domain accounts, and more. This tool will help the red team and penetration testers perform a better targeted Phishing Attack Simulation in their assessments.

 

See Also: So you want to be a hacker?
Complete Offensive Security and Ethical Hacking Course

SETUP

git clone https://github.com/m8sec/crosslinked

cd crosslinked

pip3 install -r requirements.txt

 

EXAMPLES

Results are written to a ‘names.txt’ file in the current directory unless specified in the command line arguments. See the Usage section for additional options.

python3 crosslinked.py -f '{first}.{last}@domain.com' company_name

python3 crosslinked.py -f 'domain\{f}{last}' -t 45 -j 1 company_name

 

 

USAGE

Usage

 

 

PROXY SUPPORT

The latest version of CrossLinked provides proxy support through the Taser library. Users can mask their traffic with a single proxy by adding –proxy 127.0.0.1:8080 to the command line arguments, or use –proxy-file proxies.txt for rotating source addresses.

http/https proxies can be added in IP:PORT notation, while SOCKS requires a socks4:// or socks5:// prefix.

 

 

Clone the repo from here: GitHub Link

 

Merch

Recent Tools

Offensive Security & Ethical Hacking Course

Begin the learning curve of hacking now!


Information Security Solutions

Find out how Pentesting Services can help you.


Join our Community

Share This