theharvester


Information Gathering

LATEST CODE AVAILABLE IN GITHUB:

https://github.com/laramies/theHarvester


The objective of this program is to gather emails, subdomains, hosts, employee names, open ports and banners from different public sources like search engines, PGP key servers and SHODAN computer database.

This tool is intended to help Penetration testers in the early stages of the penetration test in order to understand the customer footprint on the Internet. It is also useful for anyone that wants to know what an attacker can see about their organization.

This is a complete rewrite of the tool with new features like:

  • Time delays between request
  • All sources search
  • Virtual host verifier
  • Active enumeration (DNS enumeration, Reverse lookups, TLD expansion)
  • Integration with SHODAN computer database, to get the open ports and banners
  • Save to XML and HTML
  • Basic graph with stats
  • New sources

Passive discovery:

Google: google search engine - www.google.com

Google-profiles: google search engine, specific search for Google profiles

Bing: microsoft search engine - www.bing.com

Bingapi: microsoft search engine, through the API (you need to add your Key in the discovery/bingsearch.py file)

Pgp: pgp key server - pgp.rediris.es

Linkedin: google search engine, specific search for Linkedin users

Shodan: Shodan Computer search engine, will search for ports and banner of the discovered hosts (http://www.shodanhq.com/)

Vhost: Bing virtual hosts search

Active discovery:

DNS brute force: this plugin will run a dictionary brute force enumeration

DNS reverse lookup: reverse lookup of ip´s discovered in order to find hostnames

DNS TDL expansion: TLD dictionary brute force enumeration

Please read the README file for more information.

Latest version in the subversion repository

http://www.edge-security.com/img/harvester-screenshot.png

http://www.edge-security.com/img/harvester-shodan.png

http://www.edge-security.com/theharvester.php

Project Information

The project was created on May 3, 2011.

  • License: GNU GPL v2
  • 87 stars
  • svn-based source control

Labels:
informationgathering osint infogathering security public information profiling