Hey Folks, in this tutorial we are going to talk about an another open source information gathering tool called βquasarβ. Quasar is an information gathering framework for penetration testers coded by belahsan ouerghi. You can read the top leading features of this tool below.
Lets take a look π !!
You donβt need to do much because it will automatically configure itself using the bash command, but before that we have to download it from github and go to the directory of this tool.
git clone https://github.com/TunisianEagles/quasar.git
cd quasar
bash install.sh
Hmmm π !! The complete setup of this tool will take some time.
Done π After doing all the above process we can easily boot this tool using the following command. Now for demonstrate purpose we will choose option first.
bash quasar.sh
As you can see how many tools we get in the information gathering option of this tool. Now we will select the first option and try to dump the domain name server details of the target website.
Nice π !! As you can see it works fine and gives us precise details about the target we want.
Similarly, we come back to the home and checked the email verification by choosing second option and it gives impressive results
Similarly, this tool has various options that you can try one by one yourself and gather more information about the target.
A keen learner and passionate IT student. He has done Web designing, CCNA, RedHat, Ethical hacking, Network & web penetration testing. Currently, he is completing his graduation and learning about Red teaming, CTF challenges & Blue teaming.
Hey Folks :) !! In this article, we present the "Termux Cheat Sheet for Hackers"…
Amid the rapid advancement of technology, the significance of human involvement in cybersecurity frequently goes…
Hey Folks, we are back today after such a long break, but don't worry we…
The security of your API should be one of the top priorities of companies. Without…
Hey Folks, In today's business world, it is essential to have an online presence. However,…
Hey Folks, Is your business prepared in case of a cyber attack? Many companies don't…
This website uses cookies.