theHarvester – Gather E-mail Accounts, Subdomains, Hosts, Employee Names


theHarvester is a tool for gathering e-mail accounts, subdomain names, virtual hosts, open ports/ banners, and employee names from different public sources (search engines, pgp key servers).

theHarvester - Gather E-mail Accounts, Subdomains, Hosts, Employee Names


Is a really simple tool, but very effective for the early stages of a penetration test or just to know the visibility of your company on the Internet.

theHarvester Information Gathering Sources

The sources supported are:

Passive theHarvester Methods

  • google: google search engine
  • googleCSE: google custom search engine
  • google-profiles: google search engine, specific search for Google profiles
  • bing: microsoft search engine
  • bingapi: microsoft search engine, through the API (you need to add your Key)
  • dogpile: Dogpile search engine
  • pgp: pgp key server – mit.edu
  • linkedin: google search engine, specific search for Linkedin users
  • vhost: Bing virtual hosts search
  • twitter: twitter accounts related to an specific domain (uses google search)
  • googleplus: users that works in target company (uses google search)
  • yahoo: Yahoo search engine
  • baidu: Baidu search engine
  • shodan: Shodan Computer search engine, will search for ports and banners

Active theHarvester Methods

  • DNS brute force: this plugin will run a dictionary brute force enumeration
  • DNS reverse lookup: reverse lookup of IPs discovered in order to find hostnames
  • DNS TDL expansion: TLD dictionary brute force enumeration

How to use theHarvester


Searching emails accounts for the domain microsoft.com, it will work with the first 500 google results:

Searching emails accounts for the domain microsoft.com in a PGP server, here it’s not necessary to specify the limit.

Searching for user names that works in the company microsoft, we use google as search engine, so we need to specify the limit of results we want to use:

Searching in all sources at the same time, with a limit of 200 results:

There are some other tools you can check out too like:

snitch – Information Gathering Tool Via Dorks
DMitry – Deepmagic Information Gathering Tool
wig – CMS Identification & Information Gathering Tool

You can download theHarvester here:

theHarvester-2.7.zip

Or read more here.

Posted in: Hacking Tools

, , , , ,


Latest Posts:


Socialscan - Command-Line Tool To Check For Email And Social Media Username Usage Socialscan – Command-Line Tool To Check For Email And Social Media Username Usage
socialscan is an accurate command-line tool to check For email and social media username usage on online platforms, given an email address or username,
CFRipper - CloudFormation Security Scanning & Audit Tool CFRipper – CloudFormation Security Scanning & Audit Tool
CFRipper is a Python-based Library and CLI security analyzer that functions as an AWS CloudFormation security scanning and audit tool
CredNinja - Test Credential Validity of Dumped Credentials or Hashes CredNinja – Test Credential Validity of Dumped Credentials or Hashes
CredNinja is a tool to quickly test credential validity of dumped credentials (or hashes) across an entire network or domain very efficiently.
assetfinder - Find Related Domains and Subdomains assetfinder – Find Related Domains and Subdomains
assetfinder is a Go-based tool to find related domains and subdomains that are related to a given domain from a variety of sources including Facebook and more.
Karkinos - Beginner Friendly Penetration Testing Tool Karkinos – Beginner Friendly Penetration Testing Tool
Karkinos is a light-weight Beginner Friendly Penetration Testing Tool, which is basically a 'Swiss Army Knife' for pen-testing and/or hacking CTF's.
Aclpwn.Py - Exploit ACL Based Privilege Escalation Paths in Active Directory Aclpwn.Py – Exploit ACL Based Privilege Escalation Paths in Active Directory
Aclpwn.py is a tool that interacts with BloodHound< to identify and exploit ACL based privilege escalation paths.


Comments are closed.