Skip to content

Demonstrations

ktx edited this page Jan 5, 2020 · 6 revisions

This page helps newcomers quickly setup a demonstration
You can hide the last characters of the passwords using --hide

h8mail was initially developed as a PoC that would ultimately help secure budget for the next quarter.
This also explains why I chose a more colorful approach for outputs.
It has since grown into a full blown data breach investigation tool, but remains a good choice as a demonstration tool.

The budget data breach demonstration

First, get API keys. Premium keys are optional but increase demo value tenfold. Get a breach service API key from one of the supported services. Save the keys in a configuration file.

Next, gather emails of your firm using TheHarvester. You can use either Kali, ParrotOS or Tsurugi as a VM.
Once you've gathered a fair number of emails, or even extracted emails from your IT department (with the required permissions beforehand), install h8mail.

Run h8mail as you would against a list of emails, using the API keys saved earlier.
Use --hide to hide the last characters of the passwords on-screen.

$ h8mail -t emails.txt -c h8mail_config.ini --hide

***snip***

[>] Showing results for [email protected]
EMAILREP_LEAKS |     [email protected] > 46 leaked credentials
EMAILREP_SOCIAL|     [email protected] > Pinterest
EMAILREP_SOCIAL|     [email protected] > Foursquare
EMAILREP_SOCIAL|     [email protected] > Twitter
EMAILREP_SOCIAL|     [email protected] > Spotify
EMAILREP_LASTSN|     [email protected] > 10/16/2019
SCYLLA_SOURCE  |     [email protected] > exploit.in
SCYLLA_PASSWORD|     [email protected] > weki********
SCYLLA_SOURCE  |     [email protected] > exploit.in
SCYLLA_PASSWORD|     [email protected] > jane********
SCYLLA_SOURCE  |     [email protected] > exploit.in
SCYLLA_PASSWORD|     [email protected] > smit********

__________________________________________________________________________________________
 
 ***snip***

[>] Showing results for [email protected]
EMAILREP_LEAKS |     [email protected] > 103 leaked credentials
EMAILREP_SOCIAL|     [email protected] > Vimeo
EMAILREP_SOCIAL|     [email protected] > Pinterest
EMAILREP_SOCIAL|     [email protected] > Aboutme
EMAILREP_SOCIAL|     [email protected] > Foursquare
EMAILREP_SOCIAL|     [email protected] > Spotify
EMAILREP_SOCIAL|     [email protected] > Lastfm
EMAILREP_SOCIAL|     [email protected] > Twitter
EMAILREP_LASTSN|     [email protected] > 10/16/2019
SCYLLA_SOURCE  |     [email protected] > dropbox.com
SCYLLA_PASSWORD|     [email protected] > john********
SCYLLA_USERNAME|     [email protected] > 1645673
SCYLLA_PASSWORD|     [email protected] > john********
SCYLLA_USERNAME|     [email protected] > 1645673
SCYLLA_SOURCE  |     [email protected] > exploit.in
SCYLLA_PASSWORD|     [email protected] > 1203********
SCYLLA_SOURCE  |     [email protected] > exploit.in
SCYLLA_PASSWORD|     [email protected] > 8772********
SCYLLA_SOURCE  |     [email protected] > exploit.in
SCYLLA_PASSWORD|     [email protected] > 4599********

***snip***


                                   Session Recap:  


                 Target                  |                   Status                  
__________________________________________________________________________________________

          [email protected]           |          Breach Found (63 elements)        
__________________________________________________________________________________________

          [email protected]           |         Breach Found (153 elements)        
__________________________________________________________________________________________

Execution time (seconds):   13.989517450332642  

Done

Targeting your whole domain

Or instead you might want to hit all emails from your firm's domain:

$ h8mail -t fcorp.com -q domain -c h8mail_config.ini --hide

***snip***

[~] Target factory started for fcorp.com
[~] [fcorp.com]>[scylla.sh]
 __________________________________________________________________________________________
 
[>] Showing results for fcorp.com
SCYLLA_SOURCE  |            fcorp.com > exploit.in
SCYLLA_EMAIL   |            fcorp.com > [email protected]
SCYLLA_PASSWORD|            fcorp.com > aq1aq1aq1
SCYLLA_SOURCE  |            fcorp.com > exploit.in
SCYLLA_EMAIL   |            fcorp.com > [email protected]
SCYLLA_PASSWORD|            fcorp.com > aq4aq4aq4
SCYLLA_EMAIL   |            fcorp.com > [email protected],[email protected],[email protected]
SCYLLA_HASH    |            fcorp.com > 0x1D9E2B624FAF9DFF43A23473A589BA5B839D99CA
SCYLLA_USERNAME|            fcorp.com > 75445061
SCYLLA_SOURCE  |            fcorp.com > 000webhost.com
SCYLLA_EMAIL   |            fcorp.com > [email protected]
SCYLLA_LASTIP  |            fcorp.com > 82.23.109.200
SCYLLA_PASSWORD|            fcorp.com > superman123
SCYLLA_SOURCE  |            fcorp.com > 000webhost.com
SCYLLA_EMAIL   |            fcorp.com > [email protected]
SCYLLA_LASTIP  |            fcorp.com > 
SCYLLA_PASSWORD|            fcorp.com > mudfish1
***snip***
SCYLLA_PASSWORD|            fcorp.com > 1234hoedjevanpapier
SCYLLA_SOURCE  |            fcorp.com > 000webhost.com
SCYLLA_EMAIL   |            fcorp.com > [email protected]
SCYLLA_LASTIP  |            fcorp.com > 131.107.0.74
SCYLLA_PASSWORD|            fcorp.com > 1secret
SCYLLA_SOURCE  |            fcorp.com > 000webhost.com
SCYLLA_EMAIL   |            fcorp.com > [email protected]
SCYLLA_LASTIP  |            fcorp.com > 213.239.192.110
SCYLLA_PASSWORD|            fcorp.com > birmingham000
__________________________________________________________________________________________
                                   Session Recap:  
                 Target                  |                   Status                  
__________________________________________________________________________________________

             fcorp.com               |          Breach Found (77 elements)        
__________________________________________________________________________________________

Execution time (seconds):   3.903327226638794  
Done

The budget nuclear data breach demonstration

You might be having trouble getting the desired output if the number of emails gathered or found data is not enough.
h8mail includes a feature called chasing which hunts down related emails, and automatically scans them for leaked data.
This can be done like so:

$ h8mail -t fcorp.com -q domain --chase 4 --power-chase -c h8mail_config.ini --hide