Wednesday, August 29, 2012

TheHarvester v 2.0 - Collects email accounts, usernames and hostnames


TheHarvester is a tool to collect email accounts, usernames and hostnames/subdomains from different public sources like search engines and PGP key servers.
This tool is intended to help Penetration testers in the early stages of the project. It's a really simple tool, but very effective.

The sources supported are:
  • Google - emails,subdomains/hostnames
  • Google profiles - Employee names
  • Bing search - emails, subdomains/hostnames,virtual hosts
  • Pgp servers - emails, subdomains/hostnames
  • Linkedin - Employee names
  • Exalead - emails,subdomain/hostnames
Some examples: 
  • Searching emails accounts for the domain microsoft.com, it will work with the first 500 google results.
./theharvester.py -d microsoft.com -l 500 -b google
  • Searching emails accounts for the domain microsoft.com in a PGP server, here it's not necessary to specify the limit.
./theharvester.py -d microsoft.com -b pgp


Searching for user names that works in the company microsoft, we use google as search engine, so we need to specify the limit of results we want to use:
./theharvester.py -d microsoft.com -l 200 -b linkedin
  • Searching in all sources at the same time, with a limit of 200 results:
./theHarvester.py -d microsoft.com -l 200 -b all

No comments:

Post a Comment