Premium Only Content

theHarvester Tutorial: Collect Emails, Subdomains, and More
theHarvester is a powerful tool used in Kali Linux for gathering emails, subdomains, hosts, employee names, open ports, and banners from different public sources like search engines, PGP key servers, and more.
TheHarvester
00:20 - theHarvester introduction
01:12 - Installation of theHarvester
01:22 - searching sweshi.com
02:10 - looking at some results
03:10 - searching cyber academy
03:47 - looking at the options
Reconnaissance tutorials
Google Footprinting tutorial:
https://sweshi.com/CyberSecurityTutorials/Penetration%20Testing%20and%20Ethical%20Hacking/GoogleFootprinting.php
theHarvester tutorial:
https://sweshi.com/CyberSecurityTutorials/Penetration%20Testing%20and%20Ethical%20Hacking/theHarv3ster%20-%20Network%20Reconnaissance%20tool%20tutorial.php
sublister tutorial:
https://sweshi.com/CyberSecurityTutorials/Penetration%20Testing%20and%20Ethical%20Hacking/sublist3r%20tutorial.php
censys free tutorial:
https://sweshi.com/CyberSecurityTutorials/Penetration%20Testing%20and%20Ethical%20Hacking/censys%20tutorial.php
shodan free tutorial:
https://sweshi.com/CyberSecurityTutorials/Penetration%20Testing%20and%20Ethical%20Hacking/shodan%20tutorial.php
dns dumpster tutorial:
https://sweshi.com/CyberSecurityTutorials/Penetration%20Testing%20and%20Ethical%20Hacking/dns%20dumpster%20tutorial.php
spiderfoot tutorial:
https://sweshi.com/CyberSecurityTutorials/Penetration%20Testing%20and%20Ethical%20Hacking/spiderfoot%20tutorial.php
nmap tutorial:
https://sweshi.com/CyberSecurityTutorials/Penetration%20Testing%20and%20Ethical%20Hacking/nmap%20tutorial.php
Nikto web server scanning Tutorial:
https://sweshi.com/CyberSecurityTutorials/Penetration%20Testing%20and%20Ethical%20Hacking/nikto%20tutorial.php
Dirbuster web directory scanner Tutorial:
https://sweshi.com/CyberSecurityTutorials/Penetration%20Testing%20and%20Ethical%20Hacking/dirbuster%20tutorial.php
Nmap port scanner:
https://sweshi.com/CyberSecurityTutorials/Penetration%20Testing%20and%20Ethical%20Hacking/nmap%20tutorial.php
Legion port scanner and vulnerability scanning tutorial:
https://sweshi.com/CyberSecurityTutorials/Penetration%20Testing%20and%20Ethical%20Hacking/legion%20tutorial.php
hping3 packet crafting tutorial:
https://sweshi.com/CyberSecurityTutorials/Penetration%20Testing%20and%20Ethical%20Hacking/hping3%20tutorial.php
amap scanner tutorial:
https://sweshi.com/CyberSecurityTutorials/Penetration%20Testing%20and%20Ethical%20Hacking/amap%20tutorial.php
masscan fast port scanner tutorial:
https://sweshi.com/CyberSecurityTutorials/Penetration%20Testing%20and%20Ethical%20Hacking/masscan%20tutorial.php
netcat tutorial:
https://sweshi.com/CyberSecurityTutorials/Penetration%20Testing%20and%20Ethical%20Hacking/netcat%20tutorial.php
VULNERABILITY SCANNING TUTORIALS
Nessus tenable tutorial:
https://sweshi.com/CyberSecurityTutorials/Penetration%20Testing%20and%20Ethical%20Hacking/nessus%20tenable%20essentials%20tutorial.php
Nikto tutorial:
https://sweshi.com/CyberSecurityTutorials/Penetration%20Testing%20and%20Ethical%20Hacking/nikto%20tutorial.php
Exploit tools:
Metasploit beginner tutorial:
https://sweshi.com/CyberSecurityTutorials/Penetration%20Testing%20and%20Ethical%20Hacking/metasploit%20tutorial.php
SQL Map tutorial:
https://sweshi.com/CyberSecurityTutorials/Penetration%20Testing%20and%20Ethical%20Hacking/sqlmap%20tutorial.php
routersploit tutorial:
https://sweshi.com/CyberSecurityTutorials/Penetration%20Testing%20and%20Ethical%20Hacking/routersploit.php
FORENSIC INVESTIGATION TOOLS:
Wireshark Tutorial:
https://sweshi.com/CyberSecurityTutorials/Penetration%20Testing%20and%20Ethical%20Hacking/wireshark%20tutorial.php
LastActivityView tutorial:
https://sweshi.com/CyberSecurityTutorials/Penetration%20Testing%20and%20Ethical%20Hacking/lastActivityView%20tutorial.php
Process Monitor Tutorial:
https://sweshi.com/CyberSecurityTutorials/Penetration%20Testing%20and%20Ethical%20Hacking/Process%20Monitor%20Tutorial.php
Autoruns Tutorial:
https://sweshi.com/CyberSecurityTutorials/Penetration%20Testing%20and%20Ethical%20Hacking/autoruns%20tutorial.php
More Game Development, Cyber Security, Linux and Coding tutorials on my website
https://sweshi.com
-
1:13:13
Michael Franzese
15 hours agoMegyn Kelly’s UNFILTERED Take on The Ukraine War, Trump & Modern Masculinity
142K58 -
1:43:21
Redacted News
17 hours agoBREAKING! UKRAINE AGREES TO CEASEFIRE WITH RUSSIA... BUT THERE'S A BIG CATCH | Redacted News
244K378 -
58:17
Candace Show Podcast
17 hours agoShould We Feel Bad For Blake Lively? | Candace Ep 157
198K392 -
3:06:52
The Nerd Realm
18 hours ago $15.02 earnedHollow Knight Voidheart Edition #19 | Nerd Realm Playthrough
116K7 -
1:17:27
Awaken With JP
20 hours agoThe Current Thing: Tesla Protesting - LIES Ep 82
182K85 -
1:07:08
Sean Unpaved
17 hours agoNFL Free Agency Rolls On! MLB Spring Training Heats Up along with 3x World Series Champ Dave Stewart
110K4 -
2:10:15
Right Side Broadcasting Network
22 hours agoLIVE REPLAY: White House Press Secretary Karoline Leavitt Holds Press Briefing - 3/11/25
192K46 -
2:06:00
The Quartering
21 hours agoTrump Goes NUCLEAR On Canada, Blasts Massie, Harry Potter Race Swap, Man Humiliated On TV Show
140K83 -
1:03:09
The White House
20 hours agoPress Secretary Karoline Leavitt Briefs Members of the Media, Mar. 11, 2025
129K84 -
1:07:03
Winston Marshall
20 hours agoEXCLUSIVE : Oliver Anthony On Life After ‘Rich Men’, The Christian Counter Culture and The Elites
86.3K16