Friday, May 26, 2023

Theharvester: Email Harvesting Throughout Year




You might have harvested many things upto now but what we are going to harvest today is something bad :)



Requirements:

  1. A Linux box (I'm using Kali Linux)
  2. theharvester program (already available in Kali Linux)
So what does theharvester harvest? Well it harvests email addresses. theharvester is an Information gathering tool. If you want a list of emails to spam you can get that easily from theharvester tool and go on Spamming (I'm joking its illegal). It's a security tool that helps you in pentesting an organization (as always it can be used for evil as well). You can gather emails from an organization and look for potential victims to attack or use brute-force techniques to get their passwords or Social Engineer them into doing something that will let you compromise some or all systems in the organization. Uhh there are so many things that you can do when you have access to someone's email address.

OK stop talking and start doing.


Fire up a terminal in your kali box and type this command:


theharvester -d hotmail.com -l 50 -b google


In a small amount of time you'll see your terminal flooded with 200 hotmail.com email address. What does this command mean?


theharvester is the tool name that we are using

-d <domain_name> specifies the domain (or website) who's email addresses we're looking for, in our case it was hotmail.com
-l <number> specifies the number of results that we want in the output, I limited it to 50
-b <source> specifies the source on which to look for email addresses, I specified google as the source

Besides google we can specify any of the follow as source:

google, googleCSE, bing, bingapi, pgp, linkedin, google-profiles, people123, jigsaw, twitter, googleplus, all
Here the last entry all means look in every available source.

Let's say you wanted to look in every available source they you should specify the following command:


theharvester -d hotmail.com -b all




-f is another great flag which can be utilized to save the output in case we want to SPAM them later (just kidding) or for other reasons (I'm thinking positive). -f flag saves the result in html or xml format. Let's do just that:


theharvester -d gmail.com -l 50 -b google -f emailaddresses.html


here -f flag is followed by the location where we want to store the file and the name of file, in our case we stored it in our pwd (present working directory) with the name emailaddresses.html.




Above picture shows an html output generated by harvester.


That's it for this tutorial hope to see you next time!
More information
  1. Hackers Toolbox
  2. Hacking Tools Free Download
  3. Hack Tools
  4. Hacking Tools Name
  5. Best Hacking Tools 2020
  6. Hacker Search Tools
  7. Pentest Tools For Windows
  8. Hacking Tools For Pc
  9. Hacking Apps
  10. Hack Tools
  11. Pentest Tools Tcp Port Scanner
  12. Hacker Tools
  13. Hacking Tools And Software
  14. Hackrf Tools
  15. Hacker Tools Hardware
  16. Pentest Tools Download
  17. Github Hacking Tools
  18. Pentest Tools Alternative
  19. Nsa Hack Tools Download
  20. Free Pentest Tools For Windows
  21. Hacking Tools For Games
  22. Pentest Tools Download
  23. Hacking Tools Online
  24. Underground Hacker Sites
  25. Hacking Tools Pc
  26. Hacker Tools Linux
  27. Hacking Tools Hardware
  28. Hack Tools For Games
  29. Hacking App
  30. Hack And Tools
  31. Hacker Search Tools
  32. Hack Tool Apk No Root
  33. Nsa Hack Tools
  34. Physical Pentest Tools
  35. Hacker Tools 2019
  36. Pentest Tools Linux
  37. Hacker Techniques Tools And Incident Handling
  38. Bluetooth Hacking Tools Kali
  39. Pentest Tools Tcp Port Scanner
  40. Pentest Tools Download
  41. Hacks And Tools
  42. Hacking Tools 2019
  43. Black Hat Hacker Tools
  44. Hack Tools For Ubuntu
  45. Pentest Tools Website Vulnerability
  46. Blackhat Hacker Tools
  47. Tools For Hacker
  48. Hacker Tools For Pc
  49. Hacker Hardware Tools
  50. Hack And Tools
  51. Pentest Tools Website Vulnerability
  52. Hacker Tools Free
  53. Hacking Tools For Mac
  54. Tools Used For Hacking
  55. Pentest Tools Url Fuzzer
  56. Pentest Tools Website Vulnerability
  57. Hacker Tools Hardware
  58. Hacker Tool Kit
  59. Hacker Tools List
  60. Pentest Tools Open Source
  61. Game Hacking
  62. Hacking Tools For Windows Free Download
  63. Tools 4 Hack
  64. Free Pentest Tools For Windows
  65. Hacker Tools Github
  66. Hacking Tools For Windows Free Download
  67. New Hack Tools
  68. Black Hat Hacker Tools
  69. What Are Hacking Tools
  70. Hack Rom Tools
  71. Hackrf Tools
  72. Hacker Techniques Tools And Incident Handling
  73. Android Hack Tools Github
  74. Hacker Tools Mac
  75. How To Hack
  76. Hacks And Tools
  77. Hacking Tools
  78. Hacker Tools For Windows
  79. Nsa Hack Tools Download
  80. Hacker Tools
  81. Pentest Box Tools Download
  82. Hacking Tools Windows
  83. Pentest Tools Review
  84. Pentest Tools Download
  85. What Is Hacking Tools
  86. Pentest Tools Website
  87. Hacking Tools For Games
  88. Computer Hacker
  89. Pentest Tools Tcp Port Scanner
  90. Hackers Toolbox
  91. Hacking Tools Pc
  92. Hack And Tools
  93. Pentest Tools Website
  94. Pentest Tools List
  95. Hacker Tools For Windows
  96. Hack Tools Github
  97. Hack Tools Mac
  98. Physical Pentest Tools
  99. Growth Hacker Tools
  100. Install Pentest Tools Ubuntu
  101. Hack Tools Github
  102. Hacking App
  103. Hacking Tools
  104. Easy Hack Tools
  105. Hacker Tools 2020
  106. Hacker Tools Free
  107. Hacking Tools
  108. Pentest Tools Nmap
  109. Pentest Tools For Ubuntu
  110. Pentest Box Tools Download
  111. Hacking Tools For Beginners
  112. Usb Pentest Tools
  113. Hacker Tools For Mac
  114. Hacking Tools
  115. Physical Pentest Tools
  116. Pentest Tools Subdomain
  117. Hacker Tools For Pc
  118. Hack Tools Pc
  119. Hacker Tools For Ios
  120. Pentest Tools Linux
  121. Pentest Tools Tcp Port Scanner
  122. Hack Tools For Windows
  123. Pentest Tools For Mac
  124. Hackers Toolbox
  125. Hacking Tools For Windows 7
  126. Hacking Tools For Games
  127. Github Hacking Tools
  128. Hacker Tools Hardware
  129. Hacker Techniques Tools And Incident Handling
  130. Hacking Tools Name
  131. Hacker Tool Kit
  132. Underground Hacker Sites

No comments:

Post a Comment