Using theHarvester to perform host Auditing

KALA
1 min readJun 4, 2021

Post thread

Let’s face it, We all don’t see our-self as the bad guys do see us or our interaction from the internet. Each day on the dark-web there are hundreds of thousands of email leaks, those leaks may include your own from your favorite site. There are sites out there dedicated to investigating leaks and warning users for possible changes.

Some of those site include;

Besides those site that help you to check for external threats there are Audit tools dedicated to auditing a sites external threats one of those tools include

  • thHarvester

the Harvester is a very simple, yet effective tool designed to be used in the early stages of a penetration test. Use it for open source intelligence gathering and helping to determine a company’s external threat landscape on the internet. The tool gathers emails, names, subdomains, IPs, Portscan and URLs using multiple public data sources.

READ MORE

--

--

KALA

Welcome to Kali linux tips medium blog we will keep you updated on cyber security world for more info kindly visit: https://kalilinuxtips.online