/
Tech-study-notes

E-mail OSINT

Email OSINT involves discovering, verifying, and investigating email addresses.

Email Discovery tools

These tools allows to:

They typically offer features like pattern identification, department filtering, and monthly search limits on free tiers

Email Verification tools

There are many tools for email verification.

Use Cases

Investigations:

Penetration Testing:

Email Pattern Analysis

Common Corporate Patterns

PatternExampleNotes
First.Lastjohn.doe@company.comMost common
FLastjdoe@company.comInitial + last
FirstLastjohndoe@company.comNo separator
Firstjohn@company.comSmall companies
FirstLjohn.d@company.comInitial only
Lastdoe@company.comRare

How to Determine Pattern

  1. Use Hunter.io - Often shows pattern
  2. Search for one known email - “john.doe@company.com
  3. Analyze multiple results - Look for consistency
  4. Test variations - Try pattern with target name

Real-World Example

Company: TCM Security

Company: Tesla

Integration with Other OSINT

Workflow Example

Investigation Goal: Find email for Bob Jones at Target Company

Step 1: Google search

"Bob Jones" "Target Company" email

Step 2: Hunter.io

Step 3: Verify

Step 4: Additional verification (if needed)