Wednesday, May 8, 2024
Home Hacking Tools The Harvester 2.2a-Tool for data gathering

The Harvester 2.2a-Tool for data gathering

The Harvester is a tool that is basically used to gather, open ports, emails, subdomains, hosts, employee names, and banners from different public sources like search engines, PGP key servers, and SHODAN computer databases.

This tool is helpful in penetration testing in the early stages. The tools used to understand the customer footprint on the internet. It also helps organizations to now pre attacker plans what exactly they found from the server.

The Harvester 2.2a-Tool for data gathering
The Harvester 2.2a-Tool for data gathering

The feature of the Tools :

  • Search all sources
  • Verify the virtual host
  • File saved in form of HTML and XML
  • Graphic and stats options
  • New Sources
  • Active enumeration(DNS enumeration,Reverse lookups,TLD expansion)
  • New sources
  • Check the open ports and banner with the integration of the SHODAN computer database.

Passive work :

  • Linkedin: specific search for LinkedIn user
  • Google Search Engine- www.google.com
  • Google-specific profiles and search engines.
  •  Bing: Microsoft search engine –www.bing.com
  • PGP key server
  • Shodan- this app will search for ports and banner of discovered hosts(www.shodanhq.com)

Active discovery:

  • DNS brute force: This option helps to run a directory brute force action.
  • DNS reverse lookup: The Reverse lookup is found and discovered in order to find hostnames.
  • DNS TDL expansion: TLD dictionary brute force.

For more information visit: Google Code – The harvester

Download harvester from Source link

Bipin Choudharyhttps://vednam.com
Bipin has been a passionate blogger for several years. He is a Cyber Security Enthusiast, Security Blogger, Technical Writer. He is always eager to know everything about the latest technology development and advancement. Author @ Vednam

2 COMMENTS

LEAVE A REPLY

Please enter your comment!
Please enter your name here

- Advertisment -

Most Popular

7 Best Free Ethical Hacking Courses Online

  Ethical hacking is the practice of identifying vulnerabilities in computer systems and networks, using the same techniques and tools as malicious hackers. Ethical hackers,...

How does AuKill malware work?

AuKill Malware Actively Used to Disable EDR in Ongoing Attacks The cybersecurity landscape is constantly evolving, and attackers are always finding new ways to breach...

What is Black box hacking ? How Does it works ?

  Black box hacking refers to the process of testing a system, network or application for vulnerabilities without having any prior knowledge of its internal...

What is Penetration testing ? How does it works ?

  Penetration testing, or PenTesting for short, is a critical part of any comprehensive cybersecurity program. It involves testing the security of computer systems, networks,...

Recent Comments