Friday, January 26, 2024

Theharvester: Email Harvesting Throughout Year




You might have harvested many things upto now but what we are going to harvest today is something bad :)



Requirements:

  1. A Linux box (I'm using Kali Linux)
  2. theharvester program (already available in Kali Linux)
So what does theharvester harvest? Well it harvests email addresses. theharvester is an Information gathering tool. If you want a list of emails to spam you can get that easily from theharvester tool and go on Spamming (I'm joking its illegal). It's a security tool that helps you in pentesting an organization (as always it can be used for evil as well). You can gather emails from an organization and look for potential victims to attack or use brute-force techniques to get their passwords or Social Engineer them into doing something that will let you compromise some or all systems in the organization. Uhh there are so many things that you can do when you have access to someone's email address.

OK stop talking and start doing.


Fire up a terminal in your kali box and type this command:


theharvester -d hotmail.com -l 50 -b google


In a small amount of time you'll see your terminal flooded with 200 hotmail.com email address. What does this command mean?


theharvester is the tool name that we are using

-d <domain_name> specifies the domain (or website) who's email addresses we're looking for, in our case it was hotmail.com
-l <number> specifies the number of results that we want in the output, I limited it to 50
-b <source> specifies the source on which to look for email addresses, I specified google as the source

Besides google we can specify any of the follow as source:

google, googleCSE, bing, bingapi, pgp, linkedin, google-profiles, people123, jigsaw, twitter, googleplus, all
Here the last entry all means look in every available source.

Let's say you wanted to look in every available source they you should specify the following command:


theharvester -d hotmail.com -b all




-f is another great flag which can be utilized to save the output in case we want to SPAM them later (just kidding) or for other reasons (I'm thinking positive). -f flag saves the result in html or xml format. Let's do just that:


theharvester -d gmail.com -l 50 -b google -f emailaddresses.html


here -f flag is followed by the location where we want to store the file and the name of file, in our case we stored it in our pwd (present working directory) with the name emailaddresses.html.




Above picture shows an html output generated by harvester.


That's it for this tutorial hope to see you next time!

More articles


  1. Pentest Tools Framework
  2. Hackers Toolbox
  3. Android Hack Tools Github
  4. Pentest Tools Free
  5. Hacking Tools For Windows 7
  6. Hack Tools Online
  7. Hack Tools Github
  8. Hacking Apps
  9. Hacker Tools Apk
  10. Hacking Tools Hardware
  11. Easy Hack Tools
  12. Hacker Tools Linux
  13. Hacking Tools Hardware
  14. Blackhat Hacker Tools
  15. Hack Tools
  16. Usb Pentest Tools
  17. Pentest Tools Online
  18. Tools 4 Hack
  19. Pentest Tools Alternative
  20. Pentest Tools Bluekeep
  21. Hack Tools Mac
  22. Hack Tools Mac
  23. Pentest Tools Android
  24. Nsa Hack Tools Download
  25. Hacker Tools
  26. Pentest Tools Website
  27. Hacking Tools For Mac
  28. Android Hack Tools Github
  29. Hacking Tools Online
  30. Hacking Tools Name
  31. Hacking Tools For Kali Linux
  32. Hacking Tools Software
  33. Hack Tools For Windows
  34. Hacker Tools 2020
  35. Hacking Tools Software
  36. Hacker Hardware Tools
  37. Hacking Tools Online
  38. Blackhat Hacker Tools
  39. Tools Used For Hacking
  40. Pentest Tools For Ubuntu
  41. Pentest Box Tools Download
  42. Wifi Hacker Tools For Windows
  43. How To Hack
  44. Hacker Tools For Windows
  45. Kik Hack Tools
  46. Hack Tool Apk
  47. Computer Hacker
  48. Ethical Hacker Tools
  49. Hacking Tools Hardware
  50. Hacker Hardware Tools
  51. Hacking Tools For Games
  52. Best Pentesting Tools 2018
  53. What Is Hacking Tools
  54. Hack Tools
  55. Pentest Tools Find Subdomains
  56. Hacker Search Tools
  57. What Is Hacking Tools
  58. Blackhat Hacker Tools
  59. Hack Tools Mac
  60. Pentest Tools List
  61. Physical Pentest Tools
  62. Hacker Tools Apk
  63. Hack Tool Apk
  64. Pentest Tools Port Scanner
  65. Github Hacking Tools
  66. World No 1 Hacker Software
  67. Hack Tools
  68. Hacker Tools Hardware
  69. Nsa Hacker Tools
  70. Hacker Tools Github
  71. Easy Hack Tools
  72. Hacker Tools Github
  73. Hacking Tools Name
  74. Hacking Tools For Mac
  75. Computer Hacker
  76. Nsa Hack Tools Download
  77. Hack Tools
  78. Nsa Hacker Tools
  79. Pentest Tools Linux
  80. Hack Apps
  81. Pentest Tools Online
  82. Hack Website Online Tool
  83. Ethical Hacker Tools
  84. Hacker Tools For Mac
  85. Pentest Tools Review
  86. Hack And Tools
  87. Hacker Tools Linux
  88. Hacker Tools Apk Download
  89. Hacker Tools Mac
  90. What Are Hacking Tools
  91. Pentest Tools Subdomain
  92. Easy Hack Tools
  93. Pentest Tools Url Fuzzer
  94. Pentest Box Tools Download
  95. Hack Tools Online
  96. Install Pentest Tools Ubuntu
  97. Hacking Tools 2019
  98. Black Hat Hacker Tools
  99. Hacking Tools 2019
  100. Hacking Tools Software
  101. Pentest Tools For Mac
  102. Ethical Hacker Tools
  103. Black Hat Hacker Tools
  104. Hacker Tools For Mac
  105. Beginner Hacker Tools
  106. Hack Tools Download
  107. Hacker Tools Apk
  108. Hacking Tools Software
  109. Hack Tools Download
  110. Hack Tool Apk
  111. Hack App
  112. Hack App
  113. Hacker Tools Hardware
  114. Hack Tools 2019
  115. How To Hack
  116. How To Install Pentest Tools In Ubuntu
  117. Black Hat Hacker Tools
  118. Pentest Tools Port Scanner
  119. Pentest Tools Port Scanner
  120. Hacking Tools Free Download
  121. Hackrf Tools
  122. Hacker Tools 2019
  123. Best Hacking Tools 2020
  124. Pentest Tools

No comments:

Post a Comment