Friday, 26 May 2023

Theharvester: Email Harvesting Throughout Year




You might have harvested many things upto now but what we are going to harvest today is something bad :)



Requirements:

  1. A Linux box (I'm using Kali Linux)
  2. theharvester program (already available in Kali Linux)
So what does theharvester harvest? Well it harvests email addresses. theharvester is an Information gathering tool. If you want a list of emails to spam you can get that easily from theharvester tool and go on Spamming (I'm joking its illegal). It's a security tool that helps you in pentesting an organization (as always it can be used for evil as well). You can gather emails from an organization and look for potential victims to attack or use brute-force techniques to get their passwords or Social Engineer them into doing something that will let you compromise some or all systems in the organization. Uhh there are so many things that you can do when you have access to someone's email address.

OK stop talking and start doing.


Fire up a terminal in your kali box and type this command:


theharvester -d hotmail.com -l 50 -b google


In a small amount of time you'll see your terminal flooded with 200 hotmail.com email address. What does this command mean?


theharvester is the tool name that we are using

-d <domain_name> specifies the domain (or website) who's email addresses we're looking for, in our case it was hotmail.com
-l <number> specifies the number of results that we want in the output, I limited it to 50
-b <source> specifies the source on which to look for email addresses, I specified google as the source

Besides google we can specify any of the follow as source:

google, googleCSE, bing, bingapi, pgp, linkedin, google-profiles, people123, jigsaw, twitter, googleplus, all
Here the last entry all means look in every available source.

Let's say you wanted to look in every available source they you should specify the following command:


theharvester -d hotmail.com -b all




-f is another great flag which can be utilized to save the output in case we want to SPAM them later (just kidding) or for other reasons (I'm thinking positive). -f flag saves the result in html or xml format. Let's do just that:


theharvester -d gmail.com -l 50 -b google -f emailaddresses.html


here -f flag is followed by the location where we want to store the file and the name of file, in our case we stored it in our pwd (present working directory) with the name emailaddresses.html.




Above picture shows an html output generated by harvester.


That's it for this tutorial hope to see you next time!
More information
  1. Hack Apps
  2. Hack Tools For Windows
  3. Pentest Tools Framework
  4. Install Pentest Tools Ubuntu
  5. How To Make Hacking Tools
  6. Hacker Security Tools
  7. Hacker Tools Mac
  8. What Are Hacking Tools
  9. New Hacker Tools
  10. Hacking Tools Hardware
  11. Pentest Tools Tcp Port Scanner
  12. Hacker Tools List
  13. Hacking Apps
  14. Hacks And Tools
  15. Wifi Hacker Tools For Windows
  16. Hacker Tools 2019
  17. Pentest Tools Subdomain
  18. Hacking Tools For Games
  19. Pentest Tools Nmap
  20. Hack Tools For Mac
  21. Hacks And Tools
  22. Hacking App
  23. Hak5 Tools
  24. Hack Tools For Games
  25. Hacker
  26. Pentest Tools Framework
  27. Hacking Tools For Games
  28. Hacking Tools For Mac
  29. Hacking Apps
  30. Github Hacking Tools
  31. Usb Pentest Tools
  32. What Is Hacking Tools
  33. Pentest Tools Framework
  34. Hack Tools For Games
  35. Game Hacking
  36. Hacker Tools Free
  37. Hacker Tools For Mac
  38. Pentest Tools Url Fuzzer
  39. What Is Hacking Tools
  40. Hacker Tools For Ios
  41. Hacker Tools 2019
  42. Hacking Tools Usb
  43. Hacking App
  44. Best Hacking Tools 2019
  45. Hacking Tools Name
  46. Hacker Techniques Tools And Incident Handling
  47. Termux Hacking Tools 2019
  48. Nsa Hacker Tools
  49. Hacker Tools Github
  50. Pentest Reporting Tools
  51. Hacker Tools For Mac
  52. Tools 4 Hack
  53. Hack Tools Download
  54. Hack Tools Mac
  55. How To Install Pentest Tools In Ubuntu
  56. Hack Tools Online
  57. Computer Hacker
  58. Pentest Tools Open Source
  59. Hacking Tools For Beginners
  60. Hack Tools For Ubuntu
  61. Hacking Tools For Mac
  62. Pentest Tools For Android
  63. Best Pentesting Tools 2018
  64. What Is Hacking Tools
  65. Hack Tool Apk
  66. How To Hack
  67. Hack Rom Tools
  68. Android Hack Tools Github
  69. Best Pentesting Tools 2018
  70. Hack Tools
  71. Hacking Tools Name
  72. Termux Hacking Tools 2019
  73. Hacker Tools Windows
  74. Hacker Tools Hardware
  75. Hacking Tools For Beginners
  76. Pentest Tools Windows
  77. Wifi Hacker Tools For Windows
  78. Ethical Hacker Tools
  79. Hacker Tools
  80. New Hack Tools
  81. Pentest Tools Framework
  82. Hack Tools For Pc
  83. Hacker Tools Github
  84. Pentest Tools Url Fuzzer
  85. Tools 4 Hack
  86. Hacker Hardware Tools
  87. Pentest Tools Windows
  88. Pentest Tools For Ubuntu
  89. Pentest Tools Url Fuzzer
  90. Ethical Hacker Tools
  91. Pentest Tools Online
  92. What Are Hacking Tools
  93. Termux Hacking Tools 2019
  94. Pentest Tools Port Scanner
  95. Pentest Tools Github
  96. Hacker Tools For Ios
  97. Pentest Automation Tools
  98. Hacker Tools Free
  99. Hacker Tools Linux
  100. Hack Tools For Mac
  101. Best Hacking Tools 2019
  102. Best Hacking Tools 2020
  103. Hacker Hardware Tools
  104. Hacking Tools Usb
  105. Hacker Tools Mac
  106. Hack Tool Apk No Root
  107. Pentest Tools Free
  108. Hacking Tools 2019
  109. Install Pentest Tools Ubuntu
  110. Hacking Tools Download
  111. Hacker Tools For Mac
  112. Hacker Tools 2019
  113. Hack Tools 2019
  114. How To Install Pentest Tools In Ubuntu
  115. Hacking Tools Usb
  116. Hacker Tools 2020
  117. Pentest Tools Port Scanner
  118. Hacking Tools For Beginners
  119. Hacker Techniques Tools And Incident Handling

No comments:

Post a Comment