Posted on

Beginners guide to SpiderFoot

Hello, aspiring ethical hackers. In one of our previous blogposts, you learnt in detail about what is OSINT, types of OSINT etc. In this blogpost, you will learn about a tool named SpiderFoot. SpiderFoot is an open-source intelligence (OSINT) automation tool.

Spiderfoot is a python script and can be run on any machine with Python installed. Using spiderfoot, we can gather information from almost any open source data source available. For this tutorial, we will be using Kali Linux as spiderfoot is installed by default on it. Spiderfoot has an embedded web server and hence has a web-based interface.

To start spiderfoot on Kali, all you have to do is use the “-l” option and then specify a IP address and port on which you want the web server to listen on. The “-l” option stands for listen. Here we have configured spiderfoot to listen on the port 5500 of localhost.

Spiderfoot 1
Spiderfoot 2

Now, browse to the above highlighted URL using your favorite browser. You should see this.

Spiderfoot 3

Since we have not yet performed any scans yet. There is no scan history. To start a new scan, click on “New scan”.

Spiderfoot 4

Spiderfoot can gather information from domain name, IPV4 or IPV6 address, host names, sub-domains, subnet, Bitcoin address, E-mail address, phone number, human names, usernames and networks. Let’s start our search with a domain name first.

Spiderfoot 5 1024x637

After entering the name of the scan and the scan target scroll down a bit.

Spiderfoot 6 1024x569

There are various ways you can search with for any target using SpiderFoot. You can also search based on what you require about the target.

Spiderfoot 7 1024x566

You can also search based on required module (more about modules later).

Spiderfoot 8 1024x567

I select “All” and click on “Run scan now”. The scan starts and may look empty at the beginning.

Spiderfoot 9 1024x567

As the scan progresses, your screen will be filled with bars as shown below.

Spiderfoot 10 1024x639
Spiderfoot 11 1024x567

While the scan is still running, you can view the findings of the scan by going to the “Browse” tab as shown below.

Spiderfoot 12 1024x637

You can view each of the entries to find out what spiderfoot has detected.

Spiderfoot 13

For example, in this case, the target website is hosted in USA. Now, let’s search for a “Name” say “kalyan”. The good thing about spiderfoot is that it will automatically detect the type of target based on format of your input.

Spiderfoot 14
Spiderfoot 15 1024x635

Here’s the result.

Spiderfoot 16 1 1024x345
Spiderfoot 17 1
Spiderfoot 19 1024x371

You can see all the scans you performed in the “scans” section.

Spiderfoot 20

Another important tab here is the “settings” tab. It consists of settings for this tool. But just not that. Remember, I told you at the beginning of this article that Spiderfoot can collect information from almost all data sources. These data sources are listed here to the left in settings section.

Spiderfoot 21
Spiderfoot 22

Almost all sources are free, but some need APIs belonging to that particular service (Did you see the lock sign next to some services?).

Spiderfoot 23

Follow Us