Hi HackToday, Today we are going to Fetch Emails and Subdomains of a Domain.
The information gathering steps of footprinting and scanning are the most importance before hacking. Good information gathering can make the difference between a successful penetration test and one that has failed to provide maximum benefit to the client.
Google profiles – Employee names
Bing search – emails, subdomains/hostnames, virtual hosts
Pgp servers – emails, subdomains/hostnames
LinkedIn – Employee names
Google – emails, subdomains/hostnames
Exalead – emails, subdomains/hostnames
Time delays between requests
XML results export
Search a domain in all sources
Virtual host verifier
If you wanna Download Harvester Click here: Download
How to USE!
Provide execute permission to theby [chmod 755 ]
After getting into that, simply run. /theharvester, it will display version and other option that can be used with this tool with detailed description.
#theHarvester -d [url] -l 500 -b [search engine name]
Kali-:#theHarvester -d-l 500 -b google
-d [url] will be the remote site from which you wants to fetch the juicy information.
-l will limit the search for specified number.
-b is used to specify search engine name.
From above information of email address we can identify pattern of the email addresses assigned to the employees of the organization.
Kali-:#theHarvester -d facebook-l 500 -b all
If you have any Problem Hit Comment! and Share Article!
How to Fetch Emails and Subdomains of a Domain | Kali Linux | Harvester |