LinkedIn Enumeration with InSpy 3.0

InSpy: https://github.com/leapsecurity/InSpy Welcome to InSpy 3.0 With InSpy 3.0 we decided to go back to the drawing boards and focus on what InSpy does best, gather employee information. We improved its core functionality and automated it as much as possible to the point that consultants no longer need to research an organization’s domain or email…

Posted by: Leap Security

InSpy: https://github.com/leapsecurity/InSpy

Welcome to InSpy 3.0

With InSpy 3.0 we decided to go back to the drawing boards and focus on what InSpy does best, gather employee information. We improved its core functionality and automated it as much as possible to the point that consultants no longer need to research an organization’s domain or email format, InSpy will now do that for you. Using third party APIs, InSpy will attempt to identify an organization’s domain and email format simply based off of the organization’s name.

In addition, we added support for header randomization during HTTP requests and XML output.

Using InSpy 3.0

Before use, visit HunterIO and grab an API key. In addition, use python’s pip to install requirements used by InSpy (pip install -r requirements.txt). Be sure to enter the Hunter API key into InSpy.py as shown (and bolded out below).

args = parser.parse_args()
start_logger(args.company)
hunterapi = "" #insert hunterio api key here

After we have our hunterapi key inserted and installed the requirements via pip we are ready to use InSpy 3.0! Let’s take a look at some examples.

Examples

./InSpy acme

InSpy will automatically try to identify the domain associated with the organization and its email format. Output will be to screen.

./InSpy acme --domain acme.com --email first.last --xml

InSpy will output emails using the acme.com domain and email format of first.last. Output will be in XML format.

Conclusion

You can download InSpy on Leap Security’s Github at https://github.com/leapsecurity/InSpy