Skip to content

Commit

Permalink
Delete todo list
Browse files Browse the repository at this point in the history
  • Loading branch information
sundowndev committed Dec 9, 2018
2 parents 1b456e3 + 7a02a9f commit faffddb
Show file tree
Hide file tree
Showing 12 changed files with 497 additions and 5,068 deletions.
56 changes: 40 additions & 16 deletions README.md
Original file line number Diff line number Diff line change
@@ -1,25 +1,22 @@
# PhoneInfoga

Advanced information gathering & OSINT reconnaissance tool for phone numbers. Designed for Social Engineering and red teaming.

### Hello, friend. Next time cover your tracks.

<img src="https://images.complex.com/complex/images/c_limit,w_680/f_auto,fl_lossy,pg_1,q_auto/robotophone_egpp8m/mr-robot-elliot-on-phone" width="350" />
Information gathering & OSINT reconnaissance tool for phone numbers. Designed for Social Engineering and red teaming.

## The project

Building the most advanced tool to scan phone numbers using only free resources. The goal is to first identify basic informations such as country, area, carrier and line type on any international phone numbers with a very good accuracy, and then detect the VoIP provider or search for footprints on search engines to try identify the owner.
Building one of the most advanced tools to scan phone numbers using only free resources. The goal is to first gather basic information such as country, area, carrier and line type on any international phone numbers with a very good accuracy. Then try to determine the VoIP provider or search for footprints on search engines to try identify the owner.

**This tool requires python 2.x**

## Features

- Check if phone number exists
- Check if phone number exists and is possible
- Gather standard informations such as country, line type and carrier
- Check several numbers at once
- Set an output for result(s)
- Check if number is from a VoIP provider
- OSINT reconnaissance using external APIs, Google Hacking, phone books & search engines
- Use custom formatting for more effective OSINT reconnaissance

![](https://i.imgur.com/bWx79dy.png)

## Formats

Expand Down Expand Up @@ -70,10 +67,16 @@ optional arguments:
-u, --update Update the tool & databases
```

Example :
Example (quotes are optional, use it when typing special formats) :

```
python phoneinfoga.py -n "(+42)837544833"
```

Check for a number range on OVH :

```
python phoneinfoga.py -n +42837544833
python phoneinfoga.py -n +42837544833 -s ovh
```

Check several numbers at once :
Expand All @@ -82,10 +85,12 @@ Check several numbers at once :
python ./phoneinfoga.py -i numbers.txt -o results.txt
```

Check for a number range on OVH (just put some zeros) :
**Note: `--osint` is not compatible with `--output` option.**

Use all scanners and run OSINT reconnaissance :

```
python phoneinfoga.py -n +42837544833 -s ovh
python phoneinfoga.py -n +42837544833 -s all --osint
```

## Formatting
Expand All @@ -109,16 +114,35 @@ In the UK, and many other countries internationally, local dialing may require t

For example, here’s a UK-based number in standard local formatting: 020 7183 8750

![](https://i.imgur.com/WdXKSZY.png)

Here’s the same phone number in E.164 formatting: +442071838750

![](https://i.imgur.com/Ovso0w2.png)
## Dealing with Google captcha

PhoneInfo use a workaround to handle Google bot detection. When running OSINT scan, you will usually be blacklisted very easily by Google, which will ask the tool to complete a captcha.

>When you search on Google using custom requests (Google Dorks), you get very easily blacklisted. So Google shows up a page where you have to complete a captcha to continue. As soon as the captcha is completed, Google create a cookie named "GOOGLE_ABUSE_EXEMPTION" which is used to whitelist your browser and IP address for some minutes. This temporary whitelist is enough to let you gather a lot of information from many sources. So I decided to add a simple user manipulation to bypass this bot detection. [...] So I'll just try make requests and wait until I get a 503 error, which means I got blacklisted. Then I ask the user to follow an URL to manually complete the captcha and copy the whitelist token to paste it in the CLI. The tool is now able to continue to scan!
![](https://i.imgur.com/qbFZa1m.png)

### Steps

- Follow the URL
- Open the dev tool (F12 on most browsers)
- Go to **Storage**, then **Cookies**
- Copy the value of the *GOOGLE_ABUSE_EXEMPTION* cookie and paste it in the CLI

![](https://i.imgur.com/KkE1EM5.png)

## Custom formatting

...

## License

This tool is licensed under the GNU General Public License v3.0.

----

## Resources

Regular expression : `^[+]*[(]{0,1}[0-9]{1,4}[)]{0,1}[-\s\./0-9]*$`
Expand Down
Loading

0 comments on commit faffddb

Please sign in to comment.