1 00:00:01,200 --> 00:00:06,180 ‫Developed by Edge Security, the Harvester is a command line program written in Python, which is to 2 00:00:06,180 --> 00:00:12,480 ‫gather emails, subdomains, hosts employee names, open ports and banners from different public sources 3 00:00:12,480 --> 00:00:16,800 ‫like search engines, p-gp keys and showdown computer databases. 4 00:00:17,640 --> 00:00:26,130 ‫You can download the harvester from its GitHub page https colon slash slash GitHub JD.com slash Laremy 5 00:00:26,130 --> 00:00:29,880 ‫is that's L.A. AMPAS slash the harvester. 6 00:00:30,360 --> 00:00:32,880 ‫It's also embedded in Kali Linux. 7 00:00:33,570 --> 00:00:37,320 ‫When you run the script with no parameters, you can see the usage options. 8 00:00:38,630 --> 00:00:46,850 ‫One of the usages of the harvester, too, is the harvester dashti domainname, dash l result limit 9 00:00:47,360 --> 00:00:51,600 ‫Dash B datasource when the script finishes its job. 10 00:00:51,620 --> 00:00:57,470 ‫You can see the results, emails and hosts found. 11 00:01:00,490 --> 00:01:05,500 ‫Recon Energy is a full featured Web reconnaissance framework written in Python, complete with independent 12 00:01:05,500 --> 00:01:11,830 ‫modules, database interaction, built in convenience functions, interactive help and command completion. 13 00:01:12,840 --> 00:01:18,750 ‫Record energy provides a powerful environment, Recon Energy has a look and feel similar to the Metasploit 14 00:01:18,750 --> 00:01:21,900 ‫Framework, reducing the learning curve for leveraging the framework. 15 00:01:22,650 --> 00:01:26,670 ‫Recon Energy is designed exclusively for web based open source reconnaissance. 16 00:01:27,090 --> 00:01:32,430 ‫If you want to exploit, you can use the Metasploit Framework or any other exploitation tool. 17 00:01:33,030 --> 00:01:39,690 ‫You can download the Recon framework on the website seen on this slide, and it's already embedded and 18 00:01:39,690 --> 00:01:41,460 ‫ready to use and Kali Linux. 19 00:01:46,640 --> 00:01:50,460 ‫When you run Recon Energy script, you'll end up with a shell like interface. 20 00:01:50,480 --> 00:01:55,880 ‫Now you can use Recon Energy commands type help to see the available commands. 21 00:02:06,290 --> 00:02:09,080 ‫Typekit show modules to see the available modules. 22 00:02:10,990 --> 00:02:13,120 ‫As you can see, there are a lot of modules. 23 00:02:14,200 --> 00:02:17,110 ‫You can use search commands to find the modules we need. 24 00:02:17,500 --> 00:02:23,710 ‫For example, we can tape search access to find the module, which is aimed to find out access as vulnerabilities, 25 00:02:24,250 --> 00:02:27,730 ‫type use keyword with the module name to use the module. 26 00:02:28,270 --> 00:02:37,090 ‫In this example, let's use Recon Slash Domains Hyphen Vulnerabilities Slash Exceed module to learn 27 00:02:37,090 --> 00:02:39,280 ‫more about the module type show in. 28 00:02:40,560 --> 00:02:47,340 ‫This module checks excesses edengay.com website for excess records associated with the domain. 29 00:02:50,440 --> 00:02:56,800 ‫Type show options to see the parameters of the module set, the source parameter value typing, set 30 00:02:56,810 --> 00:03:01,090 ‫source UWW, NHS Dot UK command. 31 00:03:04,660 --> 00:03:11,760 ‫Tape run to run the module in this example, we found an excess as a vulnerability for NHS staff at 32 00:03:11,770 --> 00:03:14,560 ‫UK website was published in 2008. 33 00:03:15,040 --> 00:03:21,130 ‫Even though we were almost sure it was fixed years ago, it's better to look and see if the vulnerability 34 00:03:21,140 --> 00:03:22,090 ‫still exists.