• We just launched and are currently in beta. Join us as we build and grow the community.

PhoneInfoga – OSINT Tool for Phone Numbers

Maatn

Skit Designer
M Rep
0
0
0
Rep
0
M Vouches
0
0
0
Vouches
0
Posts
139
Likes
28
Bits
2 MONTHS
2 2 MONTHS OF SERVICE
LEVEL 1 500 XP
Red-and-White-Dating-Presentation.png


Hey Folks, In the tutorial we are going to talk about an OSINT tool that will help us gather information on phone numbers. Sometimes we get some fake numbers or calls asking about our account details or personal details even most people give details of them, as a result of which they have to compromise their account. After that we start that browse and no one site can be found that can give details about fake calls. Hence in this tutorial we will learn how we can information gathering through the “PhoneInfoga” tool and get the exact details against the target.

Lets do it 🙂 !!

Installation

Installation is quite simple, but we will make it quite difficult due to the docker installation 🙂 because it is not possible that you already have a docker. But first we will download it from the github page and after the installation we will got zip file that we have to unzip by using the following command.

wget https://github.com/sundowndev/PhoneInfoga/archive/v2.0.10.zip
unzip v2.0.10.zip
cd PhoneInfoga-2.0.10/1234wget https://github.com/sundowndev/PhoneInfoga/archive/v2.0.10.zipunzip v2.0.10.zipcd PhoneInfoga-2.0.10/

1-12.png

Docker

Docker is a set of platform and as a service products which use OS-level virtualization to deliver software in packages.
We will download the docker service on the terminal by using the following command.

ap-get install docker.io1ap-get install docker.io

2-12.png


Enable and start the docker service by using the following command.

systemctl start docker
systemctl enable docker12systemctl start dockersystemctl enable docker

3-14.png


Compose has to be downloaded as it will configure the application with the help of “.YML” file.

apt install docker-compose1apt install docker-compose

4-13.png


Now just we will execute the following command and it will automatically complete all the process like compiling, creation and hosting of application on Apache server

docker-compose up -d1docker-compose up-d

5-11.png


Complete 🙂 Here you can see that the application is successfully hosted with bind address. Now we will browse the following location.

docker ps
localhost:8012docker pslocalhost:80

6-11.png


Test time !! Here we have to give the number we want to find out. It is not mandatory to provide the number with the country code, just you can enter the number. As soon as we enter the number on it we got lot of information about the target such as : social media profiles, country code location etc. with the help of google dork.
Note : We are sorry but we cannot show everything, showing someone’s number can be against the security conditions.

7-10.png

Local Scan

In this result we get important details, but we think it may not be that much usage data. Let’s move on

8-8-1024x160.png

Google Search – Dork

As we know how important Google dork is if we are Footprinting, so it also uses this technique to get more information about the target. Lets open the links.

9-7.png


Nice 🙂 As we can see that if the target number would be associated with a social media handler or website, it would definitely indicate the results.

10-8.png

Social Network Footprinting

The best part of this tool comes from here because now it will give all the results separately. Here you can get profile information if the target is available on social media then it will catch it.

11-6.png

Individual Footprinting

Now it will separately execute the dork on Google and give us the result.

12-6.png

Repuatation Footprinting

It will get the details about the target through the reputed website where footprinting can be done manually.

13-5.png

Temporary number providers

Most of the time attackers take temporary numbers to deceived the people so it also gets details from the following services.

14-5.png
About the AuthorShubham Goyal Certified Ethical Hacker, information security analyst, penetration tester and researcher. Can be Contact on Linkedin.
 

436,452

314,393

314,402

Top