This tool is used to gather e-mail accounts, usernames, hostnames, subdomains from public sources such as google, bing and Linkedin. In penetration testing, this is part of performing enumeration or footprinting a network
Supported sources are:
- Google – emails, subdomain and hostnames
- Google profiles – locate employee names connected with the domain
- Bing search – emails, subdomain, hostnames and virtual hosts
- Linkedin – locate employee names connected with the domain
- Exalead – emails, subdomain and hostnames
Command Use:
- cd /pentest/enumeration/theharvestor
- ./theHarvester.py –d <target site> -l <max number of returned results> –b <source of gathering, ex: google>