Hi HackToday, Today we are going to Fetch Emails and Subdomains of a Domain.

The information gathering steps of footprinting and scanning are the most importance before hacking. Good information gathering can make the difference between a successful penetration test and one that has failed to provide maximum benefit to the client.

Some Features:-

Google profiles – Employee names

Bing search – emails, subdomains/hostnames, virtual hosts

Pgp servers – emails, subdomains/hostnames

LinkedIn – Employee names

Google – emails, subdomains/hostnames

Exalead – emails, subdomains/hostnames

New features:

Time delays between requests

XML results export

Search a domain in all sources

Virtual host verifier

If you wanna Download Harvester Click here: Download

How to USE!

Provide execute permission to the by [chmod 755 ]

After getting into that, simply run. /theharvester, it will display version and other option that can be used with this tool with detailed description.

#theHarvester -d [url] -l 500 -b [search engine name]

Kali-:#theHarvester -d -l 500 -b google

-d [url] will be the remote site from which you wants to fetch the juicy information.

-l will limit the search for specified number.

-b is used to specify search engine name.

From above information of email address we can identify pattern of the email addresses assigned to the employees of the organization.

Kali-:#theHarvester -d facebook -l 500 -b all

If you have any Problem Hit Comment! and Share Article!

How to Fetch Emails and Subdomains of a Domain | Kali Linux | Harvester |