Saturday, May 27, 2023

Theharvester: Email Harvesting Throughout Year




You might have harvested many things upto now but what we are going to harvest today is something bad :)



Requirements:

  1. A Linux box (I'm using Kali Linux)
  2. theharvester program (already available in Kali Linux)
So what does theharvester harvest? Well it harvests email addresses. theharvester is an Information gathering tool. If you want a list of emails to spam you can get that easily from theharvester tool and go on Spamming (I'm joking its illegal). It's a security tool that helps you in pentesting an organization (as always it can be used for evil as well). You can gather emails from an organization and look for potential victims to attack or use brute-force techniques to get their passwords or Social Engineer them into doing something that will let you compromise some or all systems in the organization. Uhh there are so many things that you can do when you have access to someone's email address.

OK stop talking and start doing.


Fire up a terminal in your kali box and type this command:


theharvester -d hotmail.com -l 50 -b google


In a small amount of time you'll see your terminal flooded with 200 hotmail.com email address. What does this command mean?


theharvester is the tool name that we are using

-d <domain_name> specifies the domain (or website) who's email addresses we're looking for, in our case it was hotmail.com
-l <number> specifies the number of results that we want in the output, I limited it to 50
-b <source> specifies the source on which to look for email addresses, I specified google as the source

Besides google we can specify any of the follow as source:

google, googleCSE, bing, bingapi, pgp, linkedin, google-profiles, people123, jigsaw, twitter, googleplus, all
Here the last entry all means look in every available source.

Let's say you wanted to look in every available source they you should specify the following command:


theharvester -d hotmail.com -b all




-f is another great flag which can be utilized to save the output in case we want to SPAM them later (just kidding) or for other reasons (I'm thinking positive). -f flag saves the result in html or xml format. Let's do just that:


theharvester -d gmail.com -l 50 -b google -f emailaddresses.html


here -f flag is followed by the location where we want to store the file and the name of file, in our case we stored it in our pwd (present working directory) with the name emailaddresses.html.




Above picture shows an html output generated by harvester.


That's it for this tutorial hope to see you next time!
More articles
  1. Underground Hacker Sites
  2. Hacking Tools For Beginners
  3. Hacking Tools Windows
  4. Hacker Techniques Tools And Incident Handling
  5. Hacker Tools Github
  6. Hacker Tools Github
  7. Pentest Tools Port Scanner
  8. Nsa Hack Tools Download
  9. Best Pentesting Tools 2018
  10. Hacking Tools For Mac
  11. Hacker Tools Free Download
  12. What Are Hacking Tools
  13. Hack App
  14. Ethical Hacker Tools
  15. Computer Hacker
  16. Pentest Automation Tools
  17. Pentest Tools Nmap
  18. Hack Rom Tools
  19. Hacking Tools
  20. Hacking Tools 2020
  21. Hacker Tools 2020
  22. Hack Tools Online
  23. Hack Tool Apk
  24. Hacker Tools Free Download
  25. Pentest Tools Bluekeep
  26. Pentest Box Tools Download
  27. Hack Tools For Windows
  28. Pentest Recon Tools
  29. Hacker Tools List
  30. Hacking Tools For Kali Linux
  31. Hack Tools Mac
  32. Hacking Tools For Beginners
  33. Hacker Tools Apk Download
  34. Hacking Tools For Windows
  35. Hacker Tools Mac
  36. Kik Hack Tools
  37. Tools 4 Hack
  38. Hack Tools For Pc
  39. Hacker Tools Github
  40. Top Pentest Tools
  41. Hacker Tools For Mac
  42. Hacking Tools Hardware
  43. Pentest Tools Free
  44. Easy Hack Tools
  45. Pentest Tools Apk
  46. Pentest Tools Url Fuzzer
  47. Pentest Tools Apk
  48. Hacking Tools And Software
  49. Hacking Tools 2019
  50. Physical Pentest Tools
  51. Hack Tools
  52. Hacker Tools Hardware
  53. Easy Hack Tools
  54. Pentest Tools Android
  55. Hacking Tools Pc
  56. Pentest Tools Open Source
  57. Hacker Tools For Ios
  58. Pentest Tools Framework
  59. Hack Rom Tools
  60. Hack Tools Download
  61. Hacking Tools And Software
  62. Hack Tools Github
  63. Hack Tools Download
  64. Hacker Tools Software
  65. Pentest Reporting Tools
  66. New Hack Tools
  67. Free Pentest Tools For Windows
  68. Hacker Tools Apk Download
  69. Hack Tools For Mac
  70. Hacking Tools Download
  71. Hacking Tools For Mac
  72. Hacker Tools
  73. How To Make Hacking Tools
  74. Pentest Tools Github
  75. Tools 4 Hack
  76. Hacker Hardware Tools
  77. Hacking Tools For Windows
  78. Hacker Hardware Tools
  79. Hackrf Tools
  80. Hacking Tools
  81. Hack Tools Github
  82. Hacker Tool Kit
  83. Hacker Techniques Tools And Incident Handling
  84. Hack Tools Download
  85. Hacker Tools Hardware
  86. Hacking Tools For Games
  87. Hacker Security Tools
  88. Pentest Tools Website Vulnerability
  89. Pentest Tools Open Source
  90. Hacker Tools
  91. Hacks And Tools
  92. Hackers Toolbox
  93. Hacking Tools 2019
  94. Pentest Tools Download
  95. Install Pentest Tools Ubuntu
  96. Pentest Tools Tcp Port Scanner
  97. Pentest Tools List
  98. Pentest Tools Download
  99. Hack Tools 2019
  100. Hacker Security Tools

No comments: