Spider Foot
Spider Foot
OSINT Framework
Introduction:
SpiderFoot is an open-source intelligence (OSINT) automation tool that collects
information about a given target from over 200 public data sources. It is widely
used for reconnaissance in cybersecurity, penetration testing, and investigative
research.
Features:
Automates the collection of OSINT data from multiple sources.
Supports over 200 data sources including WHOIS, DNS, search engines, social
media, and breach databases.
Provides web-based and command-line interfaces.
Generates visualized reports and detailed insights.
Highly customizable through modules and scripting.
Supports API integration for automation.
Installation:
Install the Spiderfoot on the kali Linux by using the following command:
Sudo apt install spiderfoot
How to use:
Run the spiderfoot on the kali Linux by the following command:
Spiderfoot -l <local host ip>:<port number>
Page | 1
This will open the GUI of spider foot
Give the scan name and scan target you want. In my case my target is for
the eccouncil.org.
Page | 2
By Required Data: Focus on gathering specific data types regardless of
modules.
By Module: Complete manual control over individual SpiderFoot
modules.
Page | 3
After that click on the “Run Scan” option. This will take some time to
complete the scan. After the scan the results are as follows
After the data has been scan the results are given in the form of bar chart
Page | 4
This portion shows the findings
Page | 5
Email fetched (can be used to fetch leaked passwords and the password
hashes)
Page | 6
This SpiderFoot graph visualization shows the identified email address
[email protected] as a central node, with numerous related data points
(black nodes) connected to it, indicating the tool has found multiple
connections or associations related to this email during the scan.
Page | 7