Working With MetaFinder Tool in Window
Example 1: Domain to Search
In this example, we will be specifying the domain target for which we need to crawl or find the metadata in the form of documents. So for this example, our Target domain is w3wiki.org
metafinder -d w3wiki.org -go -o \tmp -l 50
Example 2: Setting Up Output Path
In the above Example, our Output Location was \tmp so in this example we will change the output Location to D:\MetaFInder
metafinder -d w3wiki.org -go -o D:\MetaFInder -l 50
Example 3: Setting Up Maximum Limit of Documents
In this example, we will specify the number of documents to be crawled from our target domain( w3wiki.org). We will change it to 20. By default, we can crawl 250 documents.
metafinder -d w3wiki.org -go -o D:\MetaFInder -l 20
Example 4: Specifying Threads
In this example, we will specify the number of threads for crawling the documents in a more efficient way. We have specified threads value as 4.
metafinder -d w3wiki.org -go -o D:\MetaFInder -l 50 -t 4
Example 5: Specifying Search Engines
MetaFinder has the capability to crawl the documents from various search engines, So in this example, we will specify google and bing search engines.
metafinder -d w3wiki.org -go -bi -o D:\MetaFInder -l 20
File Downloaded from w3wiki.org:
Example 6: Displaying MetaFinder Version
In this example, we will check the MetaFinder tool Version, using the following command or tag.
metafinder -v
MetaFinder – Search For Documents In A Domain Through Google
Metadata is simple data described as raw values that need to be processed to generate information and deriving knowledge. Metadata is commonly described as ‘data about data’. These data often include various pieces of information that describe the document, including the file name, the file size, the file owner or user name of the person who created the file, and the location or path where the user saved the file. This process occurs automatically without any user input or communication. The capability of an attacker to read this information may present some unique penetrations into the target organization, including user names, computer or server names, network paths, files shares, and other goodies.