官术网_书友最值得收藏!

Using scripts to automatically gather OSINT data

In the field of information security research, the time that we can save is critical when performing information gathering, which can yield vulnerability research and exploitation results. In this section, we will focus on how to automate some of the OSINT to make passive reconnaissance more effective:

#!/bin/bash 
echo "Enter target domain: "
read domain
if [[ $domain != "" ]]; then
echo "Target domain set to $domain"
echo "********************************************"
echo "The Harvestor"
theharvester -d $domain -l 500 -b all -f harvester_$domain
echo "done!"
echo "********************************************"
echo "Whois Details"
whois $domain >> whois_$domain
echo "done!"
echo "********************************************"
echo "Searching for txt files on $domain using Goofile..."
goofile -d $domain -f txt >> goofile_txt_$domain
echo "done!"
echo "********************************************"
echo "Searching for pdf files on $domain using Goofile..."
goofile -d $domain -f pdf >> goofile_pdf_$domain
echo "done!"
echo "********************************************"
echo "Searching for pdf files on $domain using Goofile..."
goofile -d $domain -f doc >> goofile_doc_$domain
echo "done!"
echo "********************************************"
echo "Searching for pdf files on $domain using Goofile..."
goofile -d $domain -f xls >> goofile_xls_$domain
echo "done!"
else
echo "Error! Please enter a domain... "
fi

The preceding automation is a very simple script that makes use of some of the command-line tools in Kali and stores the output in multiple files without a database. However, attackers can make use of similar scripts to automate the majority of command-line tools to harvest information.

主站蜘蛛池模板: 铜梁县| 苍溪县| 金沙县| 双辽市| 曲周县| 朔州市| 阳城县| 奇台县| 永德县| 黎平县| 阳曲县| 鲁甸县| 彭泽县| 伽师县| 禄丰县| 阿巴嘎旗| 萨嘎县| 三门峡市| 太和县| 乌恰县| 平顺县| 桂平市| 满城县| 长沙市| 桃江县| 宁强县| 凤凰县| 都兰县| 大姚县| 肃南| 厦门市| 辽阳市| 砀山县| 临安市| 英山县| 柳江县| 项城市| 嫩江县| 分宜县| 三江| 都昌县|