The #1 Anonymous Imageboard
[ /b/ / /pol/ / /a/ / /v/ / /g/ / /fit/ / /biz/ / /int/ / /memes/ / /sec/ / /pentest/ / /ctf/ / /osint/ ]

/osint/ - OSINT

Open source intelligence gathering

Name
Comment
Image
Upload directly to Imgur (JPG, PNG, GIF, WEBP - max 20MB)

Anonymous No. 1767806830509
theHarvester. It’s one of the most common “first-pass” OSINT tools for collecting emails, subdomains
What it’s for

Finding employee email addresses that are publicly indexed (good for building contact maps and spotting patterns like first.last@company.com).

Discovering subdomains and related hosts (useful for recon + expanding your attack surface map in authorized tests).

Getting a quick “OSINT snapshot” before you do deeper enumeration.

How to use it (practical)
Install

Kali/Parrot (usually easiest):

sudo apt update
sudo apt install theharvester


If your distro doesn’t have it or it’s outdated, you can use pip (varies by distro), but apt is the cleanest when available.

Basic run (domain recon)
theHarvester -d example.com -b all


-d = target domain

-b = data source (“backend”). all tries multiple sources.

Use specific sources (more control)
theHarvester -d example.com -b google,bing,duckduckgo


This is often more stable than all if one source rate-limits you.

Limit results (faster, less noisy)
theHarvester -d example.com -b bing -l 200


-l 200 caps how many results it pulls (good for quick runs).

Save output (so you can report it)
theHarvester -d example.com -b all -f example_osint


This saves results to files (HTML/XML/JSON depending on version). Check the created files in your directory.

What you should look for in the output

Emails: patterns, departments, third-party services (e.g., marketing tools) that might indicate other exposed systems.

Hosts/Subdomains: anything interesting like:

dev. / staging. / test. (often softer targets)

old portals: vpn., owa., mail., jira., git., sso.

Repetition across sources: if multiple sources show the same host, it’s more likely real.

Common “why is it not working?” fixes

Rate limiting / captchas: try fewer sources, or run from a clean IP, or use a different backend.

Garbage results: narrow sources and lower -l.

Nothing found: that can be normal—some orgs are just clean, or block indexing.

Ethical line (important)

Only run it against domains you own or have permission to assess. OSINT still counts as recon in most engagement rules.
👍 1 👎 1