官术网_书友最值得收藏!

Using scripts to automatically gather OSINT data

In the field of information security research, the time that we can save is critical when performing information gathering, which can yield vulnerability research and exploitation results. In this section, we will focus on how to automate some of the OSINT to make passive reconnaissance more effective:

#!/bin/bash 
echo "Enter target domain: "
read domain
if [[ $domain != "" ]]; then
echo "Target domain set to $domain"
echo "********************************************"
echo "The Harvestor"
theharvester -d $domain -l 500 -b all -f harvester_$domain
echo "done!"
echo "********************************************"
echo "Whois Details"
whois $domain >> whois_$domain
echo "done!"
echo "********************************************"
echo "Searching for txt files on $domain using Goofile..."
goofile -d $domain -f txt >> goofile_txt_$domain
echo "done!"
echo "********************************************"
echo "Searching for pdf files on $domain using Goofile..."
goofile -d $domain -f pdf >> goofile_pdf_$domain
echo "done!"
echo "********************************************"
echo "Searching for pdf files on $domain using Goofile..."
goofile -d $domain -f doc >> goofile_doc_$domain
echo "done!"
echo "********************************************"
echo "Searching for pdf files on $domain using Goofile..."
goofile -d $domain -f xls >> goofile_xls_$domain
echo "done!"
else
echo "Error! Please enter a domain... "
fi

The preceding automation is a very simple script that makes use of some of the command-line tools in Kali and stores the output in multiple files without a database. However, attackers can make use of similar scripts to automate the majority of command-line tools to harvest information.

主站蜘蛛池模板: 屯留县| 科技| 中西区| 永兴县| 黄龙县| 嘉善县| 绵阳市| 西畴县| 彩票| SHOW| 高碑店市| 綦江县| 大荔县| 岢岚县| 杭锦后旗| 许昌县| 罗江县| 云阳县| 平利县| 靖西县| 清镇市| 贞丰县| 西峡县| 台前县| 余江县| 苏州市| 鸡西市| 湖州市| 大洼县| 和林格尔县| 鸡西市| 娱乐| 洪洞县| 大同市| 龙里县| 阜平县| 开江县| 福鼎市| 邢台县| 简阳市| 安仁县|