This guide explores three powerful tools for Open-Source Intelligence (OSINT) gathering: theHarvester, Amass, and Recon-ng. Each offers unique functionalities, and using them together provides a comprehensive picture of your target.
1. theHarvester: Efficient Initial Discovery
theHarvester shines in its ability to collect subdomains, IP addresses, email addresses, and employee names – all with just a starting domain name. While API keys from services like Bing, Hunter.io, and Shodan enhance results, the tool works well without them. Here's how to get started:
- Install theHarvester (usually
pip install theHarvester
). - Run the following command, replacing
<target_domain>
with your target:
python3 theHarvester.py -d <target_domain> -b all -l 1000
This retrieves the top 1000 results across all sources.
2. Amass: Deep Subdomain Exploration
Amass excels at subdomain discovery, pulling data from a vast array of OSINT resources. It also boasts brute-forcing capabilities. Similar to theHarvester, API keys for services like SecurityTrails and Shodan improve performance. Here's a breakdown:
Install Amass (refer to official documentation).
Leverage the
intel
module for various searches:- Reverse WHOIS:
amass intel -d <target_domain> -whois
- Company Name in ASNs:
amass intel -org <target_organization>
- Domain names, IPs, and source details:
amass intel -asn <target_asn> -ip -src
- Reverse WHOIS:
Utilize the
enum
module for subdomain discovery:- Pure OSINT resources:
amass enum -d <target_domain> -passive
- Direct connection verification:
amass enum -d <target_domain> -active
- Brute-forcing with masks:
amass enum -d <target_domain> -active -brute -wm "aaa-?l?l?l"
- Pure OSINT resources:
3. Recon-ng: A Modular Powerhouse
Recon-ng is a framework offering a plethora of modules for diverse OSINT tasks. Its extensibility through the Recon-NG Marketplace allows customization and community contributions. Like the previous tools, API keys can optimize performance. Here's a quick guide:
- Install Recon-ng (refer to official documentation).
- Manage API keys and install modules as needed.
- Craft a script for efficient information gathering.
- Start with logging (
spool start <filepath>/recon-ng.log
) and workspace creation (workspaces create <target_name>
). - Set options like timeout, DNS server, and user agent.
- Input target data (domains, companies, netblocks) using dedicated commands.
- Execute modules sequentially (e.g., subdomain enumeration before social engineering attempts).
- Wrap it up with reporting (e.g.,
modules load reporting/xlsx; options set FILENAME <filepath>/recon-results.xlsx; run
).
- Start with logging (
Conclusion
theHarvester, Amass, and Recon-ng are a formidable trio for OSINT investigations. While they share some functionalities, each tool offers unique strengths, providing a more holistic view of your target. Remember, responsible and ethical usage is crucial when conducting OSINT activities.