{"title":"使用Kali Linux和TheHarvester访问LinkedIn和Google电子邮件数据库","authors":"Zornitsa Terneva, Ivaylo Vladimirov, Desislava Nikolova","doi":"10.1109/ICEST52640.2021.9483460","DOIUrl":null,"url":null,"abstract":"In this scientific paper, a test is made on how reliable and secure databases are. The simulation shows how easily hackers can access a database and use its contents maliciously. It is performed on a virtual machine Kali Linux using software program - TheHarvester. People's personal email addresses have been used and shown for educational purposes only. The aim is to analyse the accessibility of data collections.","PeriodicalId":308948,"journal":{"name":"2021 56th International Scientific Conference on Information, Communication and Energy Systems and Technologies (ICEST)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Accessing LinkedIn and Google E-mail Databases Using Kali Linux and TheHarvester\",\"authors\":\"Zornitsa Terneva, Ivaylo Vladimirov, Desislava Nikolova\",\"doi\":\"10.1109/ICEST52640.2021.9483460\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In this scientific paper, a test is made on how reliable and secure databases are. The simulation shows how easily hackers can access a database and use its contents maliciously. It is performed on a virtual machine Kali Linux using software program - TheHarvester. People's personal email addresses have been used and shown for educational purposes only. The aim is to analyse the accessibility of data collections.\",\"PeriodicalId\":308948,\"journal\":{\"name\":\"2021 56th International Scientific Conference on Information, Communication and Energy Systems and Technologies (ICEST)\",\"volume\":\"57 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-06-16\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2021 56th International Scientific Conference on Information, Communication and Energy Systems and Technologies (ICEST)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICEST52640.2021.9483460\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 56th International Scientific Conference on Information, Communication and Energy Systems and Technologies (ICEST)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICEST52640.2021.9483460","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Accessing LinkedIn and Google E-mail Databases Using Kali Linux and TheHarvester
In this scientific paper, a test is made on how reliable and secure databases are. The simulation shows how easily hackers can access a database and use its contents maliciously. It is performed on a virtual machine Kali Linux using software program - TheHarvester. People's personal email addresses have been used and shown for educational purposes only. The aim is to analyse the accessibility of data collections.