theHarvester (Demo)

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
or

Already have an account? Sign In »

Time
7 hours 6 minutes
Difficulty
Intermediate
CEU/CPE
7
Video Transcription
00:00
Hey, everyone, welcome back to the course. So in this video, we're gonna use a tool called the Harvester. The harvester is a pretty good tool to use for your pen test. This will help us gather some information about the target. So, for example, in this video, we're gonna try to gather some information from social media, so we'll use linked in
00:16
to try to gather information about the target. And we'll also do some Yahoo and Google searching
00:22
on our target as well. So in this case, we're just gonna use the harvester. We're gonna specify the domain we're targeting, which is, in this case, facebook dot com. So we can actually get some information we're gonna just limited to, ah, list of 100. So we don't want this running forever. And then we're gonna specify that linked in is where we want to try to gather information about potential employees
00:40
at Facebook.
00:42
So see, just based off that simple query, we do get some information. Some of this stuff might be junk to try to throw us off, but a lot of these names look pretty legitimate, obviously, like anime fight. That's not a that's probably not gonna be a real person, but some of these, like tail, took cut or whatever. That might be an actual person over on LinkedIn.
01:02
So now we're just gonna target another company called Helix. It's smaller organization, and we'll see if we can get some additional information about this target via linked in.
01:11
All right, So we are able to gather some information about that healers company just glancing at this list because I do know this company. Ah, lot of these people are no longer with that organization, but it does give us some potential targets. If we were looking to do social engineering attacks against this particular organization.
01:29
Alright, we're gonna target facebook dot com again. We're just gonna do a query against Google and Yahoo to see what kind of information we get back. Potentially getting some email addresses back. So we'll see how we do here may not be a lot if we're just specifying 100
01:42
uh, targets. The list out here are 100 things to scan. We're gonna see if we get any information back. We may have to increase that. Yeah, we get zero search results back, so let's go ahead and increase that number and see if we get additional information back on this target.
02:00
Alright, so we get a little information. We find an email us as friendship on Facebook. That's really not valuable to us, more than likely. But we do get some information about some I P addresses on servers, so that may be beneficial to us for potential targets.
02:15
Let's increase that number to 200 targets and see
02:21
if we can get some additional email dresses back from Facebook.
02:24
Alright, So even with the increase in number there, we still just basically get the same information back.
02:30
So let's go ahead. And we're just gonna target that other companies who were gonna target he looks again
02:37
and we'll run our query and see what kind information we get back on that target
02:42
again. We're really just trying to look for email addresses here that we might be able to either spoof or use directly in phishing attacks.
02:52
All right, so you see, we are able to get some email addresses back. Obviously, some of these air fake and just looking at this list, I can tell you that, uh, I'm not seeing anyone. That's currently with that organization. At least last I knew. So These are all kind of outdated things,
03:06
which is fine, right? This might be a way for us to pretend we were someone else. Or at least understand the structure of emails at the company.
03:13
Yeah.
Up Next
Penetration Testing and Ethical Hacking

The Penetration Testing and Ethical Hacking course prepares students for certifications, like CEH. This course walks students through the process of gaining intelligence, scanning and enumerating and hacking the target.

Instructed By