Open In App

HackerTarget ToolKit – Tools To Help Organizations With Attack Surface Discovery

Last Updated : 28 Mar, 2022
Improve
Improve
Like Article
Like
Save
Share
Report

Information Gathering is an important part of Penetration Testing of web applications or any network application. Collecting more information about the target can help the attacker to easily gain access to the target domain server. HackerTarget is a python-based tool that is fully automated for Information Gathering. This tool can collect information like DNS details, IP lookup, Reverse IP lookup, and many more. HackerTarget tool is available on the GitHub platform for free.

Note: Make Sure You have Python Installed on your System, as HackerTarget is a python-based tool. Click to check the Installation process: Python Installation Steps on Linux

Installation of HackerTarget Tool on Kali Linux OS

Step 1: In this step, we will get the Longtongue tool repository from GitHub,

git clone https://github.com/pyhackertarget/hackertarget.git

 

Step 2: Use the below cd command to navigate to the Longtongue tool directory.

cd hackertarget

 

Step 3: Execute the below command to download all the Python dependencies which are associated with the tool.

sudo pip3 install -r requirements.txt

 

Step 4: Execute the below command in the terminal to view and understand the usage of the tool.

python3 hackertarget.py  --help/-h

 

Working with HackerTarget Tool on Kali Linux OS

Example 1: DNS Lookup

Select Option 3

In this example, we are performing DNS Lookup on geeksforgeeks.org

 

We have got the results of DNS lookup on the target domain geeksforgeeks.org.

 

Example 2: IP Location Lookup

Select Option 9

In this example, we are performing IP LocationLookup on geeksforgeeks.org

 

We have got the results of IP Location lookup on the target domain geeksforgeeks.org.

 

Example 3:  Reverse IP Lookup

Select Option 10

In this example, we are performing a Reverse IP Lookup on geeksforgeeks.org

 

We have got the results of Reverse IP lookup on the target domain geeksforgeeks.org.

 

Example 4: Subnet Lookup

Select Option 12

In this example, we are performing a Subnet Lookup on geeksforgeeks.org

 

We have got the results of Subnet lookup on the target domain geeksforgeeks.org.

 

Example 5: Extract Page Links

Select Option 14

In this example, we are extracting links from the target domain geeksforgeeks.org

 

We have got some interesting links of the target domain which contain parameters. So we can check for various vulnerabilities on the target domain links

 


Like Article
Suggest improvement
Previous
Next
Share your thoughts in the comments

Similar Reads