TheHarvester Optionen: Unterschied zwischen den Versionen

Aus Xinux Wiki
Zur Navigation springen Zur Suche springen
(Die Seite wurde neu angelegt: „=theHarvester is used to gather open source intelligence (OSINT) on a company or domain.= <pre> optional arguments: -h, --help show this help mess…“)
 
 
(8 dazwischenliegende Versionen desselben Benutzers werden nicht angezeigt)
Zeile 1: Zeile 1:
=theHarvester is used to gather open source intelligence (OSINT) on a company or domain.=
+
=API Keys=
 +
;Manche Abfragen verlagen eine Authorisierung, hier kommen die API Keys rein
 +
*/etc/theHarvester/api-keys.yaml
 
<pre>
 
<pre>
optional arguments:
+
apikeys:
   -h, --help            show this help message and exit
+
   bing:
  -d DOMAIN, --domain DOMAIN
+
    key:
                        Company name or domain to search.
+
 
   -l LIMIT, --limit LIMIT
+
   censys:
                        Limit the number of search results, default=500.
+
    id:
  -S START, --start START
+
    secret:
                        Start with result number X, default=0.
+
 
   -g, --google-dork     Use Google Dorks for Google search.
+
   github:
   -p, --proxies        Use proxies for requests, enter proxies in proxies.yaml.
+
     key:
  -s, --shodan          Use Shodan to query discovered hosts.
+
 
   --screenshot SCREENSHOT
+
   hunter:
                        Take screenshots of resolved domains specify output directory: --screenshot output_directory
+
    key:
   -v, --virtual-host    Verify host name via DNS resolution and search for virtual hosts.
+
 
  -e DNS_SERVER, --dns-server DNS_SERVER
+
   intelx:
                        DNS server to use for lookup.
+
    key:
   -t DNS_TLD, --dns-tld DNS_TLD
+
 
                        Perform a DNS TLD expansion discovery, default False.
+
   pentestTools:
  -r, --take-over      Check for takeovers.
+
    key:
   -n, --dns-lookup      Enable DNS server lookup, default False.
+
 
  -c, --dns-brute      Perform a DNS brute force on the domain.
+
   projectDiscovery:
  -f FILENAME, --filename FILENAME
+
    key:
                        Save the results to an HTML and/or XML file.
+
 
   -b SOURCE, --source SOURCE
+
   securityTrails:
                        baidu, bing, bingapi, bufferoverun, censys, certspotter, crtsh, dnsdumpster, duckduckgo, exalead, github-code, google,
+
    key:
                        hackertarget, hunter, intelx, linkedin, linkedin_links, netcraft, omnisint, otx, pentesttools, projectdiscovery, qwant,
+
 
                        rapiddns, securityTrails, spyse, sublist3r, threatcrowd, threatminer, trello, twitter, urlscan, virustotal, yahoo
+
   shodan:
 +
    key:
 +
 
 +
  spyse:
 +
    key:
 
</pre>
 
</pre>
 +
 +
 +
=theHarvester is used to gather open source intelligence (OSINT) on a company or domain.=
 +
;optional arguments:
 +
*-h, --help
 +
show this help message and exit
 +
*-d DOMAIN, --domain DOMAIN
 +
Company name or domain to search.
 +
*-l LIMIT, --limit LIMIT
 +
Limit the number of search results, default=500.
 +
*-S START, --start START
 +
Start with result number X, default=0.
 +
*-g, --google-dork   
 +
Use Google Dorks for Google search.
 +
*-p, --proxies       
 +
Use proxies for requests, enter proxies in proxies.yaml.
 +
*-s, --shodan         
 +
Use Shodan to query discovered hosts.
 +
*--screenshot SCREENSHOT
 +
Take screenshots of resolved domains specify output directory: --screenshot output_directory
 +
*-v, --virtual-host   
 +
Verify host name via DNS resolution and search for virtual hosts.
 +
*-e DNS_SERVER, --dns-server DNS_SERVER
 +
DNS server to use for lookup.
 +
*-t DNS_TLD, --dns-tld DNS_TLD
 +
Perform a DNS TLD expansion discovery, default False.
 +
*-r, --take-over
 +
Check for takeovers.
 +
*-n, --dns-lookup
 +
Enable DNS server lookup, default False.
 +
*-c, --dns-brute
 +
Perform a DNS brute force on the domain.
 +
-f FILENAME, --filename FILENAME
 +
Save the results to an HTML and/or XML file.
 +
-b SOURCE, --source SOURCE
 +
baidu, bing, bingapi, bufferoverun, censys, certspotter, crtsh, dnsdumpster, duckduckgo, exalead, github-code, google,
 +
hackertarget, hunter, intelx, linkedin, linkedin_links, netcraft, omnisint, otx, pentesttools, projectdiscovery, qwant,
 +
rapiddns, securityTrails, spyse, sublist3r, threatcrowd, threatminer, trello, twitter, urlscan, virustotal, yahoo

Aktuelle Version vom 20. März 2023, 10:02 Uhr

API Keys

Manche Abfragen verlagen eine Authorisierung, hier kommen die API Keys rein
  • /etc/theHarvester/api-keys.yaml
apikeys:
  bing:
    key:

  censys:
    id:
    secret:

  github:
    key:

  hunter:
    key:

  intelx:
    key:

  pentestTools:
    key:

  projectDiscovery:
    key:

  securityTrails:
    key:

  shodan:
    key:

  spyse:
    key:


theHarvester is used to gather open source intelligence (OSINT) on a company or domain.

optional arguments
  • -h, --help
show this help message and exit
  • -d DOMAIN, --domain DOMAIN
Company name or domain to search.
  • -l LIMIT, --limit LIMIT
Limit the number of search results, default=500.
  • -S START, --start START
Start with result number X, default=0.
  • -g, --google-dork
Use Google Dorks for Google search.
  • -p, --proxies
Use proxies for requests, enter proxies in proxies.yaml.
  • -s, --shodan
Use Shodan to query discovered hosts.
  • --screenshot SCREENSHOT
Take screenshots of resolved domains specify output directory: --screenshot output_directory
  • -v, --virtual-host
Verify host name via DNS resolution and search for virtual hosts.
  • -e DNS_SERVER, --dns-server DNS_SERVER
DNS server to use for lookup.
  • -t DNS_TLD, --dns-tld DNS_TLD
Perform a DNS TLD expansion discovery, default False.
  • -r, --take-over
Check for takeovers.
  • -n, --dns-lookup
Enable DNS server lookup, default False.
  • -c, --dns-brute
Perform a DNS brute force on the domain.

-f FILENAME, --filename FILENAME

Save the results to an HTML and/or XML file.

-b SOURCE, --source SOURCE

baidu, bing, bingapi, bufferoverun, censys, certspotter, crtsh, dnsdumpster, duckduckgo, exalead, github-code, google,
hackertarget, hunter, intelx, linkedin, linkedin_links, netcraft, omnisint, otx, pentesttools, projectdiscovery, qwant,
rapiddns, securityTrails, spyse, sublist3r, threatcrowd, threatminer, trello, twitter, urlscan, virustotal, yahoo