Metagoofil is an information gathering tool designed for extracting metadata of public documents (pdf,doc,xls,ppt,odp,ods) availables in the target/victim websites.
It will generate a html page with the results of the metadata extracted, plus a list of potential usernames very useful for preparing a bruteforce attack on open services like ftp, pop3,web applications, vpn, etc. Also it will extract a list of disclosed PATHs in the metadata, with this information you can guess OS, network names, Shared resources, etc.
This new version extracts MAC address from Microsoft Office documents. Now you can have an idea of what kind of hardware they are using.
All this information should not be available on the net, but most of the companies doesn't have policies about information leaking... and most of them don't know this information exists. So you can show them what information an attacker can obtain, with this simple technique.
1- Search in google, for interesting documents in the target site. Example: site:victim.com filetype: pdf
2- Download all files founded, to local disk and extract metadata, filtering interesting information.
3- Results example, extracted metadata of a file:
Results example, list of path disclosure found on all analyzed files:
Now with all the information, you can prepare better your penetration tests.
The Windows and osX version of the tool libextractor (dependency) doesn't work fine. On windows you have to copy lib\libextractor\*.dll to bin\ first, and if still doesn't work, try appending "-l libextractor_ol2" in the extcommand variable on the metagoofil.py file.
And on osX by default does not support Office documents.
-d: domain to search
-f: filetype to download (all,pdf,doc,xls,ppt,odp,ods, etc)
-l: limit of results to work with (default 100)
-o: output file, html format.
-t: target directory to download files.
metagoofil.py -d microsoft.com -l 20 -f all -o micro.html -t micro-files
This video will show how to get Metagoofil up and running under Ubuntu Linux.
Dim lights Embed Embed this video on your site