root@kali:~# theharvester
*******************************************************************
* *
* | |_| |__ ___ /\ /\__ _ _ ____ _____ ___| |_ ___ _ __ *
* | __| '_ \ / _ \ / /_/ / _` | '__\ \ / / _ \/ __| __/ _ \ '__| *
* | |_| | | | __/ / __ / (_| | | \ V / __/\__ \ || __/ | *
* \__|_| |_|\___| \/ /_/ \__,_|_| \_/ \___||___/\__\___|_| *
* *
* TheHarvester Ver. 2.2a *
* Coded by Christian Martorella *
* Edge-Security Research *
* cmartorella@edge-security.com *
*******************************************************************
Usage: theharvester options
-d: Domain to search or company name 域名搜索或公司名称
-b: Data source (google,bing,bingapi,pgp,linkedin,google-profiles,people123,jigsaw,all)
数据源(谷歌、必应、bingapi pgp,linkedin,google档案,people123,拼图,)
-s: Start in result number X (default 0) 从结果号X开始(默认为0)
-v: Verify host name via dns resolution and search for virtual hosts 通过dns解析验证主机名,并搜索虚拟主机
-f: Save the results into an HTML and XML file 将结果保存到HTML和XML文件中
-n: Perform a DNS reverse query on all ranges discovered 在发现的所有范围内执行一个DNS反向查询
-c: Perform a DNS brute force for the domain name 对域名执行DNS暴力破解
-t: Perform a DNS TLD expansion discovery 执行DNS TLD扩展发现
-e: Use this DNS server 使用这个DNS服务器
-l: Limit the number of results to work with(bing goes from 50 to 50 results, 限制结果的数量
-h: use SHODAN database to query discovered hosts 使用SHODAN数据库查询已发现的主机谷歌100到100,pgp不使用这个选项
google 100 to 100, and pgp doesn't use this option)
Examples: theharvester -d microsoft.com -l 500 -b google
theharvester -d microsoft.com -b pgp
theharvester -d microsoft -l 200 -b linkedin