In the world of cybersecurity, reconnaissance is the first and most crucial step in any security assessment. In this YouTube video, we’ll explore how to perform passive reconnaissance using bash scripting and two powerful reconnaissance tools – the Harvester and Subfinder – on Kali Linux.
Passive reconnaissance involves gathering information about a target without directly interacting with it. This method is critical to building an effective attack plan, and understanding potential weaknesses or vulnerabilities of a system.
The Harvester is a popular reconnaissance tool that allows you to search for email addresses, subdomains, and other relevant information about a target from various public sources. Subfinder, on the other hand, is a subdomain enumeration tool that helps to identify subdomains and IP addresses related to the target domain.
By using bash scripting, we’ll automate the reconnaissance process and make it more efficient. We’ll write a simple script that integrates the Harvester and Subfinder and automatically saves the output to a text file.
We’ll start by setting up the environment with Kali Linux and installing the Harvester and Subfinder. Next, we’ll dive into writing the bash script, explaining each step and command used in the process. Finally, we’ll run the script and see the results of our passive reconnaissance.
By the end of this video, you’ll have a better understanding of how to use bash scripting and reconnaissance tools like the Harvester and Subfinder to perform passive reconnaissance and gather valuable information about your target. Whether you’re a beginner or an experienced cybersecurity professional, this video is a must-watch for anyone interested in ethical hacking and cybersecurity.
Automating Passive Subdomain Enumeration – We have learned how to acquire helpful information from our target organization, like subdomains, naming patterns, alternate TLDs, IP ranges, etc., using third-party services without interacting directly with their infrastructure or relying on automated tools. Now, we will learn how to enumerate subdomains using tools and previously obtained information.
TheHarvester – is a simple-to-use yet powerful and effective tool for early-stage penetration testing and red team engagements. We can use it to gather information to help identify a company’s attack surface. The tool collects emails, names, subdomains, IP addresses, and URLs from various public data sources for passive information gathering.