Hacking Tools

SlackEnum – Mastering User Enumeration On Slack

A specialized tool designed for user enumeration on the Slack platform. This powerful utility aids in identifying active users within a Slack workspace, enhancing both security testing and network analysis.

Learn how to set up and deploy SlackEnum effectively with our step-by-step guide.

Setup

Clone this repository and install the necessary dependencies with the commands below.

git clone https://github.com/Wh1t3Rh1n0/SlackEnum

cd SlackEnum

python3 -m pip install -r requirements.txt

Create the cookies_dir and http_requests_dir folders defined in the settings at the top of slackenum.py.

By default, these are slack_ids-cookiebro and slack_ids-burp and can be created by running the commands below.

mkdir slack_ids-cookiebro

mkdir slack_ids-burp

Basic Usage

Usage:

python3 slackenum.py <TARGET/TARGETS LIST> [--sanity]
  • <TARGET/TARGETS LIST> – May be either a single email address or a file containing one email address per line.
  • --sanity – Option to “sanity check” all Slack identities before launching a long running user enumeration job.

Instructions

  1. Create one or more Slack user accounts from which to execute user enumeration. (Referred to as “Slack identities” or “Slack IDs”.) Multiple accounts (100 or more) are recommended to perform user enumeration at higher/useable speeds.
  2. Log into each user account you’ve created and join the users to the same Slack workspace.
  3. While logged into Slack, use the CookieBro browser extension to export your cookies in JSON format. Save the exported cookies to a file in the slack_ids-cookiebro folder.
  4. Repeat steps 2 and 3 for every additional user account you want to use with SlackEnum.
  5. Edit the settings at the top of slackenum.py. At a minimum, you must change the default_host setting to the Slack subdomain of your workspace.

Example:

# The hostname of the workspace where all your Slack IDs reside.
default_host = 'YOUR-WORKSPACE.slack.com'
  1. Optionally sanity check your Slack IDs before launching a real enumeration campaign by targeting a known-valid Slack account and including the --sanity flag.

Example:

python3 slackenum.py jsmith@example.com

7. When everything is ready, start enumerating users.

python3 slackenum.py targets.txt

When SlackEnum first launches, it will print statistics about:

  • the number of Slack IDs you have loaded,
  • the number of users you are targeting,
  • your timing options,
  • and some estimations of how long enumeration could take, based on all of those factors.
Varshini

Tamil has a great interest in the fields of Cyber Security, OSINT, and CTF projects. Currently, he is deeply involved in researching and publishing various security tools with Kali Linux Tutorials, which is quite fascinating.

Recent Posts

Kali Linux 2024.4 Released, What’s New?

Kali Linux 2024.4, the final release of 2024, brings a wide range of updates and…

4 days ago

Lifetime-Amsi-EtwPatch : Disabling PowerShell’s AMSI And ETW Protections

This Go program applies a lifetime patch to PowerShell to disable ETW (Event Tracing for…

4 days ago

GPOHunter – Active Directory Group Policy Security Analyzer

GPOHunter is a comprehensive tool designed to analyze and identify security misconfigurations in Active Directory…

6 days ago

2024 MITRE ATT&CK Evaluation Results – Cynet Became a Leader With 100% Detection & Protection

Across small-to-medium enterprises (SMEs) and managed service providers (MSPs), the top priority for cybersecurity leaders…

1 week ago

SecHub : Streamlining Security Across Software Development Lifecycles

The free and open-source security platform SecHub, provides a central API to test software with…

2 weeks ago

Hawker : The Comprehensive OSINT Toolkit For Cybersecurity Professionals

Don't worry if there are any bugs in the tool, we will try to fix…

2 weeks ago