in ,

Penetration Testing Tutorials – Harvesting a Company emails

Penetration Testing With Kali Linux Course – Email Harvesting

Penetration Testing With Kali Linux Tutorials

In our courses Learn The Basics of Ethical Hacking and Penetration Testing with Kali Linux on Section 2 Real World Information Intelligence Techniques we explain to you how to Harvesting a Company Emails.

Email spools can often lead to wealth of information that could include :

  • Competitive intelligence
  • Company Financials
  • Potential Attack Vectors

With the proliferation of online email, there is the potential to be able to gain access to an employee’s. Beyond information gathering, a penetration tester can use access to employee email spools to show impact of penetration.

HBGray, Infrag and Sony are illustrations of how dangerous an email compromise can be.
The tedious work of email analysis is more of a Red Teaming function.

How To Harvesting a Company Email with theHarvester

theHarvester : The objective of this program is to gather emails, subdomains, hosts, employee names, open ports and banners from different public sources like search engines, PGP key servers and SHODAN computer database.

theHarvester on Kali Linux it’s already installed, open your terminal and type ” theharvester “.

Usage Example of theHarvester on Kali Linux : Search from email addresses from a domain (-d, limiting the results to 500 (-l 500), using Google (-b google)

root@kali:~# theharvester -d -l 500 -b google

The following Video Tutorial Will show you How To collect emails and get a targeted email list.

If you have encountered a problem or you have any questions or remarks please feel free to set a comment.

Feel free to Share it with your friends … With Love and Prosperity K4LINUX-TEAM.


What do you think?

1078 points
Upvote Downvote

Total votes: 0

Upvotes: 0

Upvotes percentage: 0.000000%

Downvotes: 0

Downvotes percentage: 0.000000%

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Penetration Testing with Kali Linux free training course

Penetration Testing Tutorials – The power of Social Media websites

Penetration Testing with Kali Linux free training course mr robot

Kali Linux – Hacking Techniques Used On Mr. Robot [2]