News

Extract 108 Employee Names of ZOOM Company on LinkedIn

Introduction

When the whole world is going through the crisis of COVID and every organization is asking their employee’s to work from home. The one company that comes in mind, when we talk about work from home is ZOOM. ZOOM shares outpaces stock market with the demand of online video conferencing and it also became the favorite target of hacker.

Today we will talk about on how we can extract employee details of ZOOM on LinkedIn using a tool called CrossLinked. It’s a good tool to crawl all the employee names from LinkedIn by using different search engines like Google, Bing and it also collects valid emails of a domain, which in our case is zoom.us. This tool also comes with password generator, which can further be used by ethical hacking researchers in brute force attacks.


Environment

  • OS: Kali Linux 2019 64 bit
  • Kernel-Version: 5.2.0

Installation Steps

[email protected]:/home/iicybersecurity# git clone https://github.com/m8r0wn/CrossLinked
Cloning into 'CrossLinked'...
remote: Enumerating objects: 78, done.
remote: Total 78 (delta 0), reused 0 (delta 0), pack-reused 78
Receiving objects: 100% (78/78), 33.90 KiB | 187.00 KiB/s, done.
Resolving deltas: 100% (34/34), done.
  • Use the cd command to enter into CrossLinked directory.
[email protected]:/home/iicybersecurity# cd CrossLinked/
[email protected]:/home/iicybersecurity/CrossLinked#
  • Use this command to install the requirements for the tool.
  • pip3 install -r requirements.txt
[email protected]:/home/iicybersecurity/CrossLinked# pip3 install -r requirements.txt
Requirement already satisfied: bs4 in /usr/local/lib/python3.8/dist-packages (from -r requirements.txt (line 1)) (0.0.1)
Collecting unidecode (from -r requirements.txt (line 2))
  Downloading https://files.pythonhosted.org/packages/d0/42/d9edfed04228bacea2d824904cae367ee9efd05e6cce7ceaaedd0b0ad964/Unidecode-1.1.1-py2.py3-none-any.whl (238kB)
    100% |████████████████████████████████| 245kB 1.8MB/s
Requirement already satisfied: requests in /usr/local/lib/python3.8/dist-packages (from -r requirements.txt (line 3)) (2.23.0)
Collecting argparse (from -r requirements.txt (line 4))
  Using cached https://files.pythonhosted.org/packages/f2/94/3af39d34be01a24a6e65433d19e107099374224905f1e0cc6bbe1fd22a2f/argparse-1.4.0-py2.py3-none-any.whl
Requirement already satisfied: beautifulsoup4 in /usr/local/lib/python3.8/dist-packages (from bs4->-r requirements.txt (line 1)) (4.8.2)
Requirement already satisfied: chardet<4,>=3.0.2 in /usr/lib/python3/dist-packages (from requests->-r requirements.txt (line 3)) (3.0.4)
Requirement already satisfied: certifi>=2017.4.17 in /usr/local/lib/python3.8/dist-packages (from requests->-r requirements.txt (line 3)) (2019.11.28)
Requirement already satisfied: urllib3!=1.25.0,!=1.25.1,<1.26,>=1.21.1 in /usr/local/lib/python3.8/dist-packages (from requests->-r requirements.txt (line 3)) (1.25.8)
Requirement already satisfied: idna<3,>=2.5 in /usr/local/lib/python3.8/dist-packages (from requests->-r requirements.txt (line 3)) (2.9)
Requirement already satisfied: soupsieve>=1.2 in /usr/local/lib/python3.8/dist-packages (from beautifulsoup4->bs4->-r requirements.txt (line 1)) (2.0)
Installing collected packages: unidecode, argparse
Successfully installed argparse-1.4.0 unidecode-1.1.
  • Now, type this command python3 crosslinked.py -h to get help.
CrossLinked Help Options
  • Now, let’s extract the email addresses of ZOOM employees using domain zoom.us.
  • Here, we have selected a particular domain zoom.us (Zoom Video Communications).
  • Type this command to get email ids
    • python3 crosslinked.py -f ‘{first}.{last}@zoom.us’ zoom
    • -f: format names
CrossLinked Email Search
  • In the below picture, we can see Employees of ZOOM are saved in name.txt, we can also change the output file name by using -o <filename.txt>
  • To view the list Employees of ZOOM, type cat name.txt
Zoom.us Email IDs
  • Now, use this command to collect the emails and Names (user names) with the designation.
    • python3 crosslinked.py -f ‘{first}.{last}@zoom.us’ zoom -o zoom.txt -t 20 -v
      • -f: Name format
      • -o: output file name
      • -v: Show names and titles recovered after enumeration.
      • -t: Threads in seconds.
ZOOM User Names Fig 1
ZOOM User Names Fig 2
ZOOM User Names Fig 3
  • In the above picture, we found all 108 Employees of ZOOM with the designation.
  • Now, let’s confirm whether the user belongs to ZOOM Video Communications or not.
  • In the first picture, we have highlighted two profile names, here we can see the results for those two profiles.
  • One is Ryan Azus profile chief Revenue Officer at Zoom Video Communication.
Ryan Azus Profile of ZOOM
  • Other is Lynne Oldham profile Chief People Officer at Zoom Video Communications.
Lynne Oldham profile of ZOOM
  • We can also view the Email IDs, which we have crawled from the internet.
  • Type cat zoom.txt to view the ZOOM Employees Email Addresses.
ZOOM Employee Emails

Password Generator

  • In this tool we can also generate a unique password list, this password list can be useful for brute force attacks.
  • To generate a password list type this command python3  pwd_gen.py.
Generating Password
  • In the above picture, we see the Unique password list has been generated.
  • Use the cat command to view the password list.
    • cat password.txt
Password List

Conclusion

So we saw how to find the Employees of a particular organization on Internet and using the same we can also crawl the valid Email Id’s of a particular domain from LinkedIn using different search engines. The collected data can further we used for further analysis.

You Might Also Like