theHarvester – Gather E-mail Accounts, Subdomains, Hosts, Employee Names


theHarvester is a tool for gathering e-mail accounts, subdomain names, virtual hosts, open ports/ banners, and employee names from different public sources (search engines, pgp key servers).

theHarvester - Gather E-mail Accounts, Subdomains, Hosts, Employee Names


Is a really simple tool, but very effective for the early stages of a penetration test or just to know the visibility of your company on the Internet.

theHarvester Information Gathering Sources

The sources supported are:

Passive theHarvester Methods

  • google: google search engine
  • googleCSE: google custom search engine
  • google-profiles: google search engine, specific search for Google profiles
  • bing: microsoft search engine
  • bingapi: microsoft search engine, through the API (you need to add your Key)
  • dogpile: Dogpile search engine
  • pgp: pgp key server – mit.edu
  • linkedin: google search engine, specific search for Linkedin users
  • vhost: Bing virtual hosts search
  • twitter: twitter accounts related to an specific domain (uses google search)
  • googleplus: users that works in target company (uses google search)
  • yahoo: Yahoo search engine
  • baidu: Baidu search engine
  • shodan: Shodan Computer search engine, will search for ports and banners

Active theHarvester Methods

  • DNS brute force: this plugin will run a dictionary brute force enumeration
  • DNS reverse lookup: reverse lookup of IPs discovered in order to find hostnames
  • DNS TDL expansion: TLD dictionary brute force enumeration

How to use theHarvester


Searching emails accounts for the domain microsoft.com, it will work with the first 500 google results:

Searching emails accounts for the domain microsoft.com in a PGP server, here it’s not necessary to specify the limit.

Searching for user names that works in the company microsoft, we use google as search engine, so we need to specify the limit of results we want to use:

Searching in all sources at the same time, with a limit of 200 results:

There are some other tools you can check out too like:

snitch – Information Gathering Tool Via Dorks
DMitry – Deepmagic Information Gathering Tool
wig – CMS Identification & Information Gathering Tool

You can download theHarvester here:

theHarvester-2.7.zip

Or read more here.

Posted in: Hacking Tools

, , , , ,


Latest Posts:


Memhunter - Automated Memory Resident Malware Detection Memhunter – Automated Memory Resident Malware Detection
Memhunter is an Automated Memory Resident Malware Detection tool for the hunting of memory resident malware at scale, improving threat hunter analysis process.
Sandcastle - AWS S3 Bucket Enumeration Tool Sandcastle – AWS S3 Bucket Enumeration Tool
Astra - API Automated Security Testing For REST Astra – API Automated Security Testing For REST
Astra is a Python-based tool for API Automated Security Testing, REST API penetration testing is complex due to continuous changes in existing APIs.
Judas DNS - Nameserver DNS Poisoning Attack Tool Judas DNS – Nameserver DNS Poisoning Attack Tool
Judas DNS is a Nameserver DNS Poisoning Attack Tool which functions as a DNS proxy server built to be deployed in place of a taken over nameserver to perform targeted exploitation.
dsniff Download - Tools for Network Auditing & Password Sniffing dsniff Download – Tools for Network Auditing & Password Sniffing
Dsniff download is a collection of tools for network auditing & penetration testing. Dsniff, filesnarf, mailsnarf, msgsnarf, URLsnarf, and WebSpy passively monitor a network
OWASP Amass - DNS Enumeration, Attack Surface Mapping & External Asset Discovery OWASP Amass – DNS Enumeration, Attack Surface Mapping & External Asset Discovery
The OWASP Amass Project is a DNS Enumeration, Attack Surface Mapping & External Asset Discovery tool to help information security professionals perform network mapping of attack surfaces.


Comments are closed.