Basic Information in Kali linux using OSINT Framework, Sherlock, Profiler, Phoneinfoga, Paksim.info

 All the content provided in that post is only for educational purposes. Don’t use it for illegal purposes. We will not be responsible for any wrong activity or black hat hacking.

In this post we will learn how to collect basic information by using username, phone number or email address of target victim and we will learn to search the presence of the target victim on famous websites like Facebook, GitHub, yahoo, twitter, etc. We will discuss some famous websites and tools of kali Linux to find the basic information of the target for further penetration testing.

1.      1. OSINT FRAMEWORK

It is not a tool of kali Linux but a website to collect information about the target. To start ethical hacking you must learn OSINT framework first because it provides information about the username, phone number, email address, ip address, domain name etc. It provides a lot of help in information gathering. To access this open your web browser and search (OSINT framework) then you will see a website at the top named as (OSINT Framework). So open it and use it. It is consist of branches and sub branches that will help us in criminal’s tracking and penetration testing. It looks like as shown in the figure.                                                      

                                                       (OSINT Framework)

.      2. SHERLOCK:

It is one of the best python script that is used to search information about the username of the target victim. Let suppose that you did not know anything about your victim except name then you can find your target victim account on different websites like Facebook, twitter, yahoo, and lot of other websites using Sherlock. It is a powerful tool of kali Linux and very important to learn that will help us to find the detail of the criminal’s social media accounts.

INSTALLATION PROCESS:

To install it open the terminal and execute the given commands.

(git clone https://GitHub.com/sherlock-project/sherlock.git)

Then open the (sherlock) folder where you cloned it. 
(Open terminal here) and type command.                
(python3 -m pip install -r requirements.txt)
RUNNING SHERLOCK:
Then again open the (sherlock) folder in in (sherlock) folder. 
Here you will see a file (sherlock.py).
(Open terminal here) and run this file using command.
(python3 sherlock.py) 
ESSENTIAL COMMANDS TO FIND CRIMINAL’S DETAILS:
Now we will see the top commands of the sherlock to use it.
TO SEE ALL OPTIONS: 
(python3 sherlock.py --help)
TO SEARCH A USERNAME ON DIFFERENT SITES: 
(python3 sherlock.py +username) e.g. (python3 sherlock.py shahswar)
TO SAVE OUTPUT IN A FILE:
(python3 sherlock.py +username -o +filename) e.g. (python3 sherlock.py shahswar -o sha.txt)
TO SEARCH MULTIPLE NAMES ON DIFFERENT SITES: 
(python3 sherlock.py USERNAMES +usernames) e.g. (python3 sherlock.py USERNAMES sumair shahswar baby boby)
TO SAVE THE OUTPUT OF ALL USERS INA FOLDER: 
(python3 sherlock.py USERNAMES +usernmames -fo +folde rname) e.g. (python3 sherlock.py USERNAMES sumair shahswar baby boby -fo admin)
TO SEARCH A USERNAME ON A SPECIFIC SITE: 
(python3 sherlock.py +username --site +sitename) e.g. (python3 sherlock.py boby --site facebook)
TO SEARCH USING PROXY: 
(python3 sherlock.py +username -p +proxy url) e.g. (python3 sherlock.py baby -p socks5://127.0.0.1:1080)
TO SET A TIME IN SECONDS TO SEACH: 
(python3 sherlock.py +username --timeout +time)
e.g. (python3 sherlock.py boby --timeout 10) 
 
TO SEE ONLY SITES WHERE THE GIVEN USERNAME IS PRESENT: 
(python3 sherlock.py +username --print-found) e.g. (python3 sherlock.py shahswar --print-found)
                                                                  Sherlock working
3. PROFILER:
It is also a one of the best python script that is used to search a username on different websites. It works same as Sherlock but it has less resources than Sherlock. If you want to search a username on a limited websites then it will be best choice for you or you can use both if you want more correct and useful information of criminal. It is so easy to use and very powerful tool of the kali Linux. It is used to search our victim on lot of websites on different sites like Facebook, Instagram, GitHub, Twitter etc.
INSTALLATION PROCESS:
To install and use it open the terminal and type command.
(git clone https://GitHub.com/Rog3rSm1th/Profil3r.git)
Then open the folder where you cloned it and open the (Profil3r) folder.
(Open terminal here) and type command.
(python3 setup.py install)
RUNNING PROCESS:
Then run the file (profiler.py) using command.
(python3 profil3r.py)
USEFUL COMMANDS TO COLLECT INFORMATION OF CRIMINAL:
Now if we see the top commands of profil3r it has two options.
TO SEE HELP: 
(python3 profil3r.py -h)
TO SEARCH A USERNAME ON DIFFERENT SITES:
 (python3 profil3r.py -p +username) e.g.
 (python3 profil3r.py -p boby)
Then select a separator as you wish.
Then select the websites where you want to search the given username and press (Enter)
It will tell you about the username on different sites which you selected.
                                                    Profil3r working
4. PHONEINFOGA
It is also a best python tool of the kali Linux and it provides information about the phone number of criminal in crime detection. It is used when phone number of target criminal is known. It tells about the country of victim, presence of victim on different sites.
INSTALLATION PROCESS: 
To install it open your browser and search (PhoneInfoga GitHub)
Open the top website of (GitHub.com).
Then click on (Documentation) then click on (Installation) 
Copy the commands one by one as shown in the figure and paste in terminal.
                                                 Click on documentation
                                         Installation commands of Phoneinfoga
After this Phoneinfoga will install in kali Linux and you can use it. 
COMMANDS TO FIND THE DETAILS OF PHONE NUMBER:
Now we will see the top commands Phoneinfoga to use it.
TO SEE THE OPTIONS: 
(phoneinfoga --help)
TO SCAN A PHONENUMBER: 
(phoneinfoga scan -n +phone number with country code) e.g. (phoneinfoga scan -n +923406770648)
                                              Phoneinfoga working method
Carefully install it and enjoy it to scan phone numbers. Click on different sites to see more information about given phone number of criminal.
5. PAKSIM.INFO
It is a website and you cannot access it by (Firefox) or (google chrome) web browser. You can access it by (UC browser) or by using (VPN). It can be accessed by free proxy sites also. So,
Open it and first time it will ask you some basic settings. Then it will show interface as shown in the figure. 
USAGE METHOD AND RESULT:
Enter your phone number without zero an click on (search). 
This will tell you the name, address, ID card number, SIM service of victim.
But there is a disadvantage of this website that it did not give you information of new numbers and only tells you about old numbers. But mostly it is useful during crime discovery.
                                              Paksim.info working method
                                                            Paksim.info output

 

Post a Comment

Previous Post Next Post