Skip to content

laramies/theHarvester

Folders and files

NameName
Last commit message
Last commit date

Latest commit

8b88a66 · Dec 19, 2018
Dec 19, 2018
Dec 19, 2018
Nov 20, 2018
Nov 20, 2018
Dec 11, 2018
Nov 20, 2018
Dec 11, 2018
Nov 20, 2018
Dec 17, 2018
Dec 16, 2018
Dec 19, 2018
Dec 9, 2018
Dec 1, 2018
Dec 13, 2018
Dec 19, 2018
Dec 19, 2018

Repository files navigation

*******************************************************************
*                                                                 *
* | |_| |__   ___    /\  /\__ _ _ ____   _____  ___| |_ ___ _ __  *
* | __| '_ \ / _ \  / /_/ / _` | '__\ \ / / _ \/ __| __/ _ \ '__| *
* | |_| | | |  __/ / __  / (_| | |   \ V /  __/\__ \ ||  __/ |    *
*  \__|_| |_|\___| \/ /_/ \__,_|_|    \_/ \___||___/\__\___|_|    *
*                                                                 *
* TheHarvester Ver. 3.0.5                                         *
* Coded by Christian Martorella                                   *
* Edge-Security Research                                          *
* cmartorella@edge-security.com                                   *
*******************************************************************

What is this?

theHarvester is a tool for gathering subdomain names, e-mail addresses, virtual hosts, open ports/ banners, and employee names from different public sources (search engines, pgp key servers).

Is a really simple tool, but very effective for the early stages of a penetration test or just to know the visibility of your company in the Internet.

The sources are:

Passive:

  • threatcrowd: Open source threat intelligence - https://www.threatcrowd.org/

  • crtsh: Comodo Certificate search - www.crt.sh

  • google: Google search engine - www.google.com (With optional google dorking)

  • googleCSE: Google custom search engine

  • google-profiles: Google search engine, specific search for Google profiles

  • bing: Microsoft search engine - www.bing.com

  • bingapi: microsoft search engine, through the API (you need to add your Key in the discovery/bingsearch.py file)

  • dogpile: Dogpile search engine - www.dogpile.com

  • pgp: PGP key server - mit.edu

  • linkedin: Google search engine, specific search for Linkedin users

  • vhost: Bing virtual hosts search

  • twitter: Twitter accounts related to an specific domain (uses google search)

  • googleplus: users that works in target company (uses google search)

  • yahoo: Yahoo search engine

  • baidu: Baidu search engine

  • shodan: Shodan Computer search engine, will search for ports and banner of the discovered hosts (http://www.shodanhq.com/)

  • hunter: Hunter search engine (you need to add your Key in the discovery/huntersearch.py file)

  • google-certificates: Google Certificate Transparency report

Active:

  • DNS brute force: this plugin will run a dictionary brute force enumeration
  • DNS reverse lookup: reverse lookup of ip´s discovered in order to find hostnames
  • DNS TDL expansion: TLD dictionary brute force enumeration

Modules that need API keys to work:

  • googleCSE: You need to create a Google Custom Search engine(CSE), and add your Google API key and CSE ID in the plugin (discovery/googleCSE.py)
  • shodan: You need to provide your API key in discovery/shodansearch.py (one provided at the moment)
  • hunter: You need to provide your API key in discovery/huntersearch.py (none is provided at the moment)

Dependencies:

Changelog in 3.0.0:

  • Subdomain takeover checks
  • Port scanning (basic)
  • Improved DNS dictionary
  • Shodan DB search fixed
  • Result storage in Sqlite

Comments? Bugs? Requests?

cmartorella@edge-security.com

Updates:

https://github.com/laramies/theHarvester

Thanks:

  • Matthew Brown @NotoriousRebel
  • Janos Zold @Jzold
  • John Matherly - SHODAN project
  • Lee Baird for suggestions and bugs reporting
  • Ahmed Aboul Ela - subdomain names dictionary (big and small)