You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
 
 
 
 
 
 
nprimo 7a7eddc9cf docs(passive): clarify audit question 10 months ago
..
audit docs(passive): clarify audit question 10 months ago
README.md feat(passive): improve subject 1 year ago

README.md

Passive

Introduction

Information gathering is one of the most important steps during a pentest, it can be considered the longest step.

Objective

The goal of this project is for you to become more comfortable with open source investigative methods

Advice

Before asking help, ask yourself if you have really thought about all the possibilities.
https://en.kali.tools/all/?category=recon
https://github.com/topics/osint-tools
https://en.wikipedia.org/wiki/Open-source_intelligence
https://en.wikipedia.org/wiki/Doxing

Guidelines

You are going here to create your first passive recognition tool, you have the choice of language, however your program will have to recognize the information entered (FULL NAME, IP, @login).

For the case of the full name, it will have to recognize the entry: "Last name" and "First name", and then look in the directories for the telephone number and the address.

If it is the IP address, your tool should display at least the city and the name of the internet service provider.

If it is a username, your tool will have to check if this username is used in at least 5 known social networks.

The result should be stored in a result.txt file (result2.txt if the file already exists)

Bonus

You can add more API features

Usage

$> passive --help

Welcome to passive v1.0.0

OPTIONS:
    -fn         Search with full-name
    -ip         Search with ip address
    -u          Search with username

$> passive -fn "Jean Dupont"
First name: Jean
Last name: Dupont
Address: 7 rue du Progrès
75016 Paris
Number: +33601010101
Saved in result.txt

$> passive -ip 127.0.0.1
ISP: FSociety, S.A.
City Lat/Lon:	(13.731) / (-1.1373)
Saved in result2.txt

$> passive -u "@user01"
Facebook : yes
Twitter : yes
Linkedin : yes
Instagram : no
Skype : yes
Saved in result3.txt

Submission and audit

Files that must be inside your repository:

  • Your program source code.
  • A README.md file, which clearly explains how to use the program.

Don’t hesitate to double-check the names of your folders and files to ensure they are correct!

These methods and tools are for educational purposes only, so that you have a better understanding of how to protect against similar vulnerabilities. You must ensure that you do not attempt any exploit-type activity without the explicit permission of the owner of the machine, system or application. Failure to obtain permission risks breaking the law.