Skip to main content

OSINT tutorial to Find Information from a Phone Number – PhoneInfoga Tool


phone number plays a vital role in the social engineering and the open source intelligence investigation. Everyone carry’s phone, the phone is now linked with an individual life and it has the most important information of a person. In the OSINT investigation, we need to find-out the line type, carrier, location and other relevant information about the subject’s phone number. The number itself shows some information like country, city (landline pattern) and sometimes carrier; while the other information can be extracted by using the open platform available.
 
This tutorial is about PhoneInfoga, as the official doc says:

“PHONEINFOGA IS ONE OF THE MOST ADVANCED TOOLS TO SCAN PHONE NUMBERS USING ONLY FREE RESOURCES. THE GOAL IS TO FIRST GATHER STANDARD INFORMATION SUCH AS COUNTRY, AREA, CARRIER AND LINE TYPE ON ANY INTERNATIONAL PHONE NUMBERS WITH A VERY GOOD ACCURACY. THEN SEARCH FOR FOOTPRINTS ON SEARCH ENGINES TO TRY TO FIND THE VOIP PROVIDER OR IDENTIFY THE OWNER.”

phoneinfoga osint tutorial
As shown in the picture above, the PhoneInfoga utilizes the open source platforms, their APIs and even Google dorks to get the meaningful and relevant information of a phone number. You can search on these platforms individually too; but PhoneInfoga automates the process and we love automation, right?

How to Install PhoneInfoga on Kali Linux?

First of all, you need to download the source code (clone it) and then; get all the dependencies installed.

Requirements:

PYTHON3 AND PYTHON3-PIP OR DOCKER GIT OR WGET AND CURL

Manual installation

Clone the repository

GIT CLONE HTTPS://GITHUB.COM/SUNDOWNDEV/PHONEINFOGA CD PHONEINFOGA/

 

osint tool installation

 

Install requirements

PYTHON3 -M PIP INSTALL -R REQUIREMENTS.TXT –USER

 

Create the config file

CP CONFIG.EXAMPLE.PY CONFIG.PY

See the version using the -v operator to confirm the conversion and installation

PYTHON3 PHONEINFOGA.PY -V

osint phoneinfoga kali linux

Basic scan

PYTHON3 PHONEINFOGA.PY -N “(+42) 837544833”

Country code and special chars such as ( ) – + will be escaped so typing US-based numbers stay easy :

PYTHON3 PHONEINFOGA.PY -N “+1 555-444-3333”

Note that the country code is essential.

Comments

Popular posts from this blog

Turn Windows 8 PC Into Wi-Fi HotSpot

In Windows 8, Microsoft  quietly removed  a useful networking feature: ad-hoc networks. In Windows 7 (and previous OSes), the tool could turn your PC into a Wi-Fi hot spot, allowing it to share its Ethernet or other Internet connection with other devices by broadcasting its own network. So, if you paid for Internet access at a cafe, or you're at work, and want to share your PC's Internet with your phone or tablet, this feature would let you do that. It is very possible to do this in Windows 8, but the built-in method requires fiddling with the command prompt. And for some of us, walking into that black abyss is daunting. Instead, check out  Virtual Router Plus . It's a free, open-source program that does the geek work for you, allowing you to quickly fire up an ad-hoc network whenever you need one. Once you've downloaded the file, extract it, and launch the VirtualRouterPlus file within that folder. There's no real installation here -- the program will simply launch

How to find the password of hacked email addresses using OSINT

https://youtu.be/JAjVwf5NEOk Open-source intelligence or OSINT   is a potent technique, and it can give a lot of valuable information, if implemented correctly with the right strategy and correct tools. In this article, I will show you how a hacker can get passwords of thousands of email addresses without attacking the webserver or without using any other hacking technique; but, just using the power of OSINT. You can implement all the techniques discussed in this article manually; however, to enhance the operation and to maximize the result, we will utilize Maltego along with a web service called Have I been Pwned? Access the Hacked Passwords Systematically Blackhat hackers usually post and publish data after hacking a webserver; for example, they dumped Linkedin hacked accounts and others. Let’s just fetch all this valuable information smartly. Tools used in this article: theHarvester Maltego Have I been Pawned I have discussed the  configuration of Maltego with Have I been Pawned bef