1 00:00:01,200 --> 00:00:06,510 Developed by Ed Security, the Harvester is a command line program written in Python, which is to gather 2 00:00:06,510 --> 00:00:12,510 emails, subdomains, hosts, employee names, open ports and banners from different public sources 3 00:00:12,510 --> 00:00:16,830 like search engines, PGP keys and showdown computer databases. 4 00:00:17,670 --> 00:00:26,280 You can download the harvester from its GitHub page https colden slash GitHub Dotcom slash Laramie's. 5 00:00:26,280 --> 00:00:29,900 That's LHR, AMISOM, the Harvester. 6 00:00:30,330 --> 00:00:32,910 It's also embedded in Linux. 7 00:00:33,600 --> 00:00:37,350 When you run the script with no parameters, you can see the usage options. 8 00:00:38,630 --> 00:00:47,750 One of the usages of the harvester tool is the harvester dashty domain name Dasch result limit Dasch 9 00:00:47,750 --> 00:00:48,950 be datasource. 10 00:00:49,940 --> 00:00:57,500 When the script finishes its job, you can see the results, emails and hosts found. 11 00:01:00,520 --> 00:01:05,500 Reconning is a full featured Web reconnaissance framework written in Python, complete with independent 12 00:01:05,500 --> 00:01:11,860 modules, database interaction built in convenience functions, interactive help and command completion. 13 00:01:12,840 --> 00:01:18,770 Rickon Energy provides a powerful environment, Rickon has a look and feel similar to the metabolite 14 00:01:18,780 --> 00:01:24,780 framework, reducing the learning curve for leveraging the framework, Rickon Energy is designed exclusively 15 00:01:24,780 --> 00:01:26,730 for Web based open source reconnaissance. 16 00:01:27,090 --> 00:01:32,430 If you want to exploit, you can use the Métis framework or any other exploitation tool. 17 00:01:33,060 --> 00:01:39,570 You can download the Rickon framework on the website seen on this slide, and it's already embedded 18 00:01:39,570 --> 00:01:41,490 and ready to use in callisthenics. 19 00:01:46,640 --> 00:01:50,490 When you run recon engy script, you'll end up with a shell like interface. 20 00:01:50,510 --> 00:01:55,910 Now you can use Rickon energy commands type help to see the available commands. 21 00:02:06,290 --> 00:02:09,110 Type show module's to see the available module's. 22 00:02:10,990 --> 00:02:13,150 As you can see, there are a lot of module's. 23 00:02:14,200 --> 00:02:19,870 You can use search commands to find the modules we need, for example, we can type search access to 24 00:02:19,870 --> 00:02:26,560 find the module which is aimed to find out excess as vulnerabilities type use keyword with the module 25 00:02:26,560 --> 00:02:27,760 name to use the module. 26 00:02:28,270 --> 00:02:37,450 In this example, let's use recon slash domain's hyphen vulnerabilities exceed module to learn more 27 00:02:37,450 --> 00:02:39,460 about the module type showing for. 28 00:02:40,560 --> 00:02:47,370 This module checks excess dot com website for excess records associated with the domain. 29 00:02:50,500 --> 00:02:57,470 Type show options to see the parameters of the model set the source parameter value, Taiping set source 30 00:02:57,640 --> 00:03:01,090 w WW NHS dot UK Command. 31 00:03:04,690 --> 00:03:12,760 Type run to run the module, in this example, we found an excess vulnerability for NHS DOT UK website 32 00:03:12,970 --> 00:03:17,920 was published in 2008, even though we were almost sure it was fixed years ago. 33 00:03:18,070 --> 00:03:22,150 It's better to look and see if the vulnerability still exists.