官术网_书友最值得收藏!

Using scripts to automatically gather OSINT data

In the field of information security research, the time that we can save is critical when performing information gathering, which can yield vulnerability research and exploitation results. In this section, we will focus on how to automate some of the OSINT to make passive reconnaissance more effective:

#!/bin/bash 
echo "Enter target domain: "
read domain
if [[ $domain != "" ]]; then
echo "Target domain set to $domain"
echo "********************************************"
echo "The Harvestor"
theharvester -d $domain -l 500 -b all -f harvester_$domain
echo "done!"
echo "********************************************"
echo "Whois Details"
whois $domain >> whois_$domain
echo "done!"
echo "********************************************"
echo "Searching for txt files on $domain using Goofile..."
goofile -d $domain -f txt >> goofile_txt_$domain
echo "done!"
echo "********************************************"
echo "Searching for pdf files on $domain using Goofile..."
goofile -d $domain -f pdf >> goofile_pdf_$domain
echo "done!"
echo "********************************************"
echo "Searching for pdf files on $domain using Goofile..."
goofile -d $domain -f doc >> goofile_doc_$domain
echo "done!"
echo "********************************************"
echo "Searching for pdf files on $domain using Goofile..."
goofile -d $domain -f xls >> goofile_xls_$domain
echo "done!"
else
echo "Error! Please enter a domain... "
fi

The preceding automation is a very simple script that makes use of some of the command-line tools in Kali and stores the output in multiple files without a database. However, attackers can make use of similar scripts to automate the majority of command-line tools to harvest information.

主站蜘蛛池模板: 鄂州市| 兴宁市| 淮滨县| 青海省| 长垣县| 长寿区| 嵊泗县| 图木舒克市| 太仓市| 长武县| 扬州市| 忻城县| 石城县| 洞口县| 邢台县| 芦山县| 河东区| 砚山县| 阜宁县| 宜章县| 海南省| 那坡县| 合作市| 鄂托克前旗| 望城县| 古蔺县| 梓潼县| 宁乡县| 汶川县| 历史| 巴林左旗| 桂林市| 醴陵市| 凤台县| 新竹市| 湘潭县| 治多县| 湛江市| 光山县| 手游| 遂宁市|