Friday, May 26, 2023

Theharvester: Email Harvesting Throughout Year




You might have harvested many things upto now but what we are going to harvest today is something bad :)



Requirements:

  1. A Linux box (I'm using Kali Linux)
  2. theharvester program (already available in Kali Linux)
So what does theharvester harvest? Well it harvests email addresses. theharvester is an Information gathering tool. If you want a list of emails to spam you can get that easily from theharvester tool and go on Spamming (I'm joking its illegal). It's a security tool that helps you in pentesting an organization (as always it can be used for evil as well). You can gather emails from an organization and look for potential victims to attack or use brute-force techniques to get their passwords or Social Engineer them into doing something that will let you compromise some or all systems in the organization. Uhh there are so many things that you can do when you have access to someone's email address.

OK stop talking and start doing.


Fire up a terminal in your kali box and type this command:


theharvester -d hotmail.com -l 50 -b google


In a small amount of time you'll see your terminal flooded with 200 hotmail.com email address. What does this command mean?


theharvester is the tool name that we are using

-d <domain_name> specifies the domain (or website) who's email addresses we're looking for, in our case it was hotmail.com
-l <number> specifies the number of results that we want in the output, I limited it to 50
-b <source> specifies the source on which to look for email addresses, I specified google as the source

Besides google we can specify any of the follow as source:

google, googleCSE, bing, bingapi, pgp, linkedin, google-profiles, people123, jigsaw, twitter, googleplus, all
Here the last entry all means look in every available source.

Let's say you wanted to look in every available source they you should specify the following command:


theharvester -d hotmail.com -b all




-f is another great flag which can be utilized to save the output in case we want to SPAM them later (just kidding) or for other reasons (I'm thinking positive). -f flag saves the result in html or xml format. Let's do just that:


theharvester -d gmail.com -l 50 -b google -f emailaddresses.html


here -f flag is followed by the location where we want to store the file and the name of file, in our case we stored it in our pwd (present working directory) with the name emailaddresses.html.




Above picture shows an html output generated by harvester.


That's it for this tutorial hope to see you next time!

Related links


  1. Hacker
  2. Nsa Hacker Tools
  3. Pentest Tools Framework
  4. Tools 4 Hack
  5. Tools Used For Hacking
  6. Hacking Tools For Games
  7. Hacker Tools Linux
  8. Pentest Tools Url Fuzzer
  9. Hacker Tools Windows
  10. Pentest Tools Website Vulnerability
  11. Hacker Tools Free
  12. Pentest Tools Find Subdomains
  13. Pentest Tools
  14. Pentest Tools Bluekeep
  15. Game Hacking
  16. Hacker Security Tools
  17. Pentest Automation Tools
  18. Hack Tool Apk
  19. Hacker Tools For Ios
  20. Usb Pentest Tools
  21. What Are Hacking Tools
  22. Hacker Tools For Windows
  23. Hacking Tools Mac
  24. Best Hacking Tools 2020
  25. Hacking Tools And Software
  26. Hacking Tools For Windows
  27. Best Hacking Tools 2019
  28. Hacker Tools Apk Download
  29. Hack Tools Download
  30. Hack Website Online Tool
  31. Hacker Tool Kit
  32. Hacker Tools 2019
  33. Hacking Tools For Mac
  34. World No 1 Hacker Software
  35. Hacker Tools Mac
  36. Hack Tools For Pc
  37. Hacking App
  38. Hack Tools For Pc
  39. Wifi Hacker Tools For Windows
  40. Best Hacking Tools 2019
  41. Pentest Box Tools Download
  42. Pentest Tools Windows
  43. Bluetooth Hacking Tools Kali
  44. Pentest Tools Online
  45. Hacking Tools Windows 10
  46. Best Pentesting Tools 2018
  47. Hacker Tools For Pc
  48. Physical Pentest Tools
  49. Pentest Tools Website Vulnerability
  50. Hacking Tools For Windows Free Download
  51. Tools 4 Hack
  52. Best Hacking Tools 2019
  53. Hacking Tools
  54. Hack Apps
  55. Nsa Hacker Tools
  56. Hacking Tools Name
  57. Computer Hacker
  58. Hackers Toolbox
  59. Hacker Tools Free Download

No comments: