pyfiscan – web application vulnerability

pyfiscan – web application vulnerability

August 28, 2021 pyfiscan – web application vulnerability The Pyfiscan web application vulnerability scanner can be used to locate outdated versions of popular web applications on Linux servers. For example, hosting providers monitor their users’ facilities to keep up with security updates. Fingerprints are easy to create and modify because the user can write them …

pyfiscan – web application vulnerability Read More »

Sitadel – Web Application Security Scanner

Sitadel – Web Application Security Scanner

August 28, 2021 Sitadel – Web Application Security Scanner Sitadel Web Application Security Scanner is basically an update for WAScan making it compatible for python it allows more flexibility for you to write new modules and implement new features : Frontend framework detection Content Delivery Network detection Define Risk Level to allow for scans Plugin …

Sitadel – Web Application Security Scanner Read More »

ScoutSuite : Security Auditing Tool

ScoutSuite : Security Auditing Tool

August 28, 2021 ScoutSuite : Security Auditing Tool ScoutSuite is a multi-cloud security auditing tool, which enables assessing the security posture of cloud environments, ScoutSuite gathers configuration data for manual inspection and highlights risk areas. ScoutSuite Rather than pouring through dozens of pages on the web consoles,ScoutSuite provides a clear view of the attack surface automatically. Support …

ScoutSuite : Security Auditing Tool Read More »

Profil3r — Search Anyone on the Internet

Profil3r — Search Anyone on the Internet

We are living in digital era. We are penetration testers, we need to protect the world. We need to be digital Sherlock Holmes. For that we need to find a criminal from a small clue. If we get a bad guy’s username or mail then we don’t need to manually search it on the internet. There are some OSINT (Open-Source Intelligence) tools to reduce our effort. Today we are going to talk about a tool called Profil3r on our Kali Linux. Not only for security experts even govt and law enforcement also can use the OSINT tools to gather information about some individuals or organizations from the ocean of internet.

Profil3r -- Search Anyone on the Internet Kali Linux

Previously we already talked about Sherlock and Trape, we can use them to find someone on internet with some basic details, in our this article we are going to do the same using Profil3r in a very effective way.

Install Profil3r on Kali Linux

Profil3r is an OSINT tool that allows us to find potential profiles of a person on social networks, as well as their email addresses. This program also alerts us to the presence of a data leak for the found emails.

Installing is very easy, we need to just apply following command on our Kali Linux terminal to install Profil3r on our updated (latest python3 and pip3) system:

pip3 install profil3r

In the following screenshot we can see that Profil3r installation is started on our system, it will install the script and some dependencies to run it:

profil3r installation

Now we can check it’s help by applying following command:

profil3r -h

In the following screenshot we can see the help options of this profil3r tool.

profil3r help options

We can see there are nothing much here, we can use -p flag to set the username or name of we are looking for. We can save the report output in HTML, JSON and CSV format using -r flag followed by directory location.

Running Profil3r on Kali Linux

For an example we are looking for Jhon Doe, so we use following command on our terminal:

profil3r -p john doe -r /home/kali

After pressing Enter ↲ , Profil3r will prompt suggesting some possible usernames, as we can see in the following screenshot:

profil3r on kali linux

Here in the above screenshot we can see the suggested usernames, we can use UP⬆ and DOWN⬇ key to move our cursor, to select we need to use SPACE button (we can select multiple), also we can invert them by using I key, and toogle using A key. We need to press ENTER after our selection to continue.

For an example we are going with john.doe username, Then we got a list of various type of sites, as we can see in the following screenshot:

profil3r services list

Here also we need to select things we need to search (shown in following screenshot), because we are showing an example here so we are going with just few things. For a better search we need to select everythinng, but that is really time consuming.

profil3r places to search

After the selection we need to press Enter, it will take some time to complete the scans. In the following screenshot we can see how profil3r is working:

Profil3r works

We can see that if founds some mail ids in data leak which may related to our target. After the scanning is complete is will generate a full report on our given path  as we can see in the following screenshot:

profil3r saved output results

We can open this reports to see everything in a very organized way. In the following screenshot we have opened the HTML report output on browser.

profil3r report html open

This is how we can use Profil3r tool on our Kali Linux and easily get information about a human or organizations using the usernames. This OSINT tool is very important for finding someone on the internet.

Love our articles? Make sure to follow us on Twitter and GitHub, we post updates there. To join our KaliLinuxIn family, join our Telegram Group. We are trying to build a community for Linux and Cybersecurity. For anything we always happy to help everyone on the comment section. As we know our comment section is always open to everyone. We read each and every comment and we always reply.

Metagoofil — Extract Information using Google

Metagoofil — Extract Information using Google

Metagoofil is an awesome Information gathering tool that can be used for extracting lots of information from Word Documents, Presentation files, PDF’s, Excel Sheets, .jpg images and lots of other formats. Metagoofil also can provide a lots of constructive information during the penetration testing just by scanning the gathered files. Lets learn how to extract information from documents, images using Metagoofil on our Kali Linux.

metagoofil collect information from google metadata on kali linux

Metagoofil utilizes the Google search engine to get metadata from the documents available in the target domain. Currently, it supports the following document types:

  1. Word documents (.docx , .doc)
  2. Spreadsheet documents (.xlsx , .xls , .ods)
  3. Presentation files (.pptx , .ppt , .odp)
  4. PDF files (.pdf)

Metagoofil works by executing following actions:

  • It searches for all of the preceding file types in the target domain using the Google search engine.
  • Then it downloads all of the documents found and saving them to the local disk.
  • It extracts the metadata from the downloaded documents.

The metadata that can be found includes the following:

  • Usernames
  • Server or machine names
  • Software versions

This information may be valuable and used later during the penetration testing phase. Metagoofil comes pre-installed with the full version of Kali Linux, if not then we can easily install it from the repository by using sudo apt-get install metagoofil command.

We can see the help (options) of Metagoofil by using following command on our terminal:

metagoofil -h

Then we can see the help options as in the following screenshot:

metagoofil help

Let’s use it and know how to use Metagoofil. First of all we need a target, we took the domain example.com as our target and runs Metagoofil aginst it by using following command:

metagoofil -d example.com -l 20 -t doc,pdf -n 5

Here we specify our domain using -d flag, and uses -t flag to specify file types we are looking for, -l to limit the search for every file types (20 in our case), using -n flag we specified that we want to download only 5 files. We can changes the values used in this command as per our requirement.

Now we run the command on our terminal and after sometime (Metagoofil take some time to scan) it will show us the results, as we can see in the following screenshot:

metagoofil results

Here our target website is a blank website, so it can’t find anything on this website. But if we provide a healthy target then it can gather a lot of information.

metagoofil results

This is how we can gather information using metadata from Google search engine using Metagoofil on our Kali Linux. We should always remember that information gathering is the most crucial part of penetration testing.

Love our articles? Make sure to follow us on Twitter and GitHub, we post updates there. To join our KaliLinuxIn family, join our Telegram Group. We are trying to build a community for Linux and Cybersecurity. For anything we always happy to help everyone on the comment section. As we know our comment section is always open to everyone. We read each and every comment and we always reply.

Open Whatsapp chat
Whatsapp Us
Chat with us for faster replies.