Friday, January 26, 2024

Theharvester: Email Harvesting Throughout Year




You might have harvested many things upto now but what we are going to harvest today is something bad :)



Requirements:

  1. A Linux box (I'm using Kali Linux)
  2. theharvester program (already available in Kali Linux)
So what does theharvester harvest? Well it harvests email addresses. theharvester is an Information gathering tool. If you want a list of emails to spam you can get that easily from theharvester tool and go on Spamming (I'm joking its illegal). It's a security tool that helps you in pentesting an organization (as always it can be used for evil as well). You can gather emails from an organization and look for potential victims to attack or use brute-force techniques to get their passwords or Social Engineer them into doing something that will let you compromise some or all systems in the organization. Uhh there are so many things that you can do when you have access to someone's email address.

OK stop talking and start doing.


Fire up a terminal in your kali box and type this command:


theharvester -d hotmail.com -l 50 -b google


In a small amount of time you'll see your terminal flooded with 200 hotmail.com email address. What does this command mean?


theharvester is the tool name that we are using

-d <domain_name> specifies the domain (or website) who's email addresses we're looking for, in our case it was hotmail.com
-l <number> specifies the number of results that we want in the output, I limited it to 50
-b <source> specifies the source on which to look for email addresses, I specified google as the source

Besides google we can specify any of the follow as source:

google, googleCSE, bing, bingapi, pgp, linkedin, google-profiles, people123, jigsaw, twitter, googleplus, all
Here the last entry all means look in every available source.

Let's say you wanted to look in every available source they you should specify the following command:


theharvester -d hotmail.com -b all




-f is another great flag which can be utilized to save the output in case we want to SPAM them later (just kidding) or for other reasons (I'm thinking positive). -f flag saves the result in html or xml format. Let's do just that:


theharvester -d gmail.com -l 50 -b google -f emailaddresses.html


here -f flag is followed by the location where we want to store the file and the name of file, in our case we stored it in our pwd (present working directory) with the name emailaddresses.html.




Above picture shows an html output generated by harvester.


That's it for this tutorial hope to see you next time!
Continue reading
  1. Best Pentesting Tools 2018
  2. Hacking Tools For Pc
  3. Hack Apps
  4. Hacks And Tools
  5. Pentest Reporting Tools
  6. Hacking Tools 2019
  7. Underground Hacker Sites
  8. How To Install Pentest Tools In Ubuntu
  9. Hack Tools For Ubuntu
  10. Pentest Tools Download
  11. Hacker Hardware Tools
  12. Ethical Hacker Tools
  13. Hacker Hardware Tools
  14. What Are Hacking Tools
  15. Pentest Tools Download
  16. Top Pentest Tools
  17. Hacking Tools For Windows 7
  18. Pentest Tools For Ubuntu
  19. Pentest Tools Find Subdomains
  20. Hacker Tools For Pc
  21. Beginner Hacker Tools
  22. World No 1 Hacker Software
  23. Pentest Tools Port Scanner
  24. Hacking Tools Windows 10
  25. Pentest Tools List
  26. Hack Tools Online
  27. Hacking Tools For Windows Free Download
  28. How To Install Pentest Tools In Ubuntu
  29. Hacker Hardware Tools
  30. Free Pentest Tools For Windows
  31. Hack Tools For Games
  32. Hack Rom Tools
  33. Tools For Hacker
  34. Hacker Tools Free Download
  35. Hacker
  36. Hacking Tools For Windows Free Download
  37. Hacker Tools For Mac
  38. Hack Tool Apk No Root
  39. Computer Hacker
  40. Hacker Tools 2020
  41. Hacking Tools Name
  42. Hacker Tools For Windows
  43. Hackrf Tools
  44. Hacking Tools Pc
  45. Hacking Tools Online
  46. Pentest Box Tools Download
  47. Hack Tools Online
  48. Hack Tools For Mac
  49. Hacking Tools Windows
  50. Hacking Tools Pc
  51. Hacker Tools For Pc
  52. Pentest Tools Website Vulnerability
  53. Bluetooth Hacking Tools Kali
  54. Pentest Tools Download
  55. Hack Tools For Windows
  56. New Hack Tools
  57. Pentest Tools Review
  58. Github Hacking Tools
  59. Hacking Tools For Windows
  60. Top Pentest Tools
  61. Hack Tools Online
  62. Beginner Hacker Tools
  63. Pentest Recon Tools

No comments: