A Penetration Testing Framework
> theharvester -d target.com -b google >target_google.txt
> theharvester -d target.com -l 10 -b bing >target_bing.txt
Whois databases contain a treasure trove of information Many can be accessed via the web
whois
command built into many UNIX implementationsFirst, look up the target at InterNIC to determine the registrar
Then, go to registrar’s whois database to get detailed records
Attackers look for IP address assignments in these geographic whois databases:
Another useful site to check out for Whois information
> Whois target.com
> whois 10.10.10.10
Check here for more detat
> recon-ng
[recon-ng][default] > use recon/contacts/gather/http/api/whois_pocs
recon-ng > use recon/hosts/enum/http/web/xssed
recon-ng > use recon/hosts/gather/http/web/google_site
recon-ng > use recon/hosts/gather/http/web/ip_neighbor
Many of the modules in recon-ng require API keys with their respective service providers. Take some time to check out recon-ng and its various modules