利用theHarvester进行信息收集
`TheHarvester`能够收集电子邮件账号、用户名、主机名和子域名等信息。它通过Google、Bing、PGP、LinkedIn、Baidu、Yandex、People123、Jigsaw、Shodan等公开资源整理收集这些信息。![鎴?浘_2020-07-04_17-43-18.png](data/attachment/forum/202007/04/102127jbbhzbjvejvzsvje.png?imageMogr2/auto-orient/strip%7CimageView2/2/w/300 "鎴?浘_2020-07-04_17-43-18.png")
### 使用命令
```
optional arguments:
-h, --help show this help message and exit
-d DOMAIN, --domain DOMAIN
company name or domain to search
-l LIMIT, --limit LIMIT
limit the number of search results, default=500
-S START, --start START
start with result number X, default=0
-g, --google-dork use Google Dorks for Google search
-p, --port-scan scan the detected hosts and check for Takeovers
(21,22,80,443,8080)
-s, --shodan use Shodan to query discovered hosts
-v, --virtual-host verify host name via DNS resolution and search
for virtual hosts
-e DNS_SERVER, --dns-server DNS_SERVER
DNS server to use for lookup
-t DNS_TLD, --dns-tld DNS_TLD
perform a DNS TLD expansion discovery, default
False
-n, --dns-lookup enable DNS server lookup, default False
-c, --dns-brute perform a DNS brute force on the domain
-f FILENAME, --filename FILENAME
save the results to an HTML and/or XML file
-b SOURCE, --source SOURCE
baidu, bing, bingapi, certspotter, crtsh,
dnsdumpster, dogpile, duckduckgo, github-code,
google, hunter, intelx, linkedin, linkedin_links,
netcraft, otx, securityTrails, spyse(disabled for
now), threatcrowd, trello, twitter, vhost,
virustotal, yahoo, all
```
### 示例
通过百度查找域名bbskali.cn的相关信息
```
theHarvester -d bbskali.cn -l 500 -b baidu
```
页:
[1]