gather information with osint Latest osint search query osint search using apis OSINT-Search osint-search techniques Reconnaissance Scanning Tutorials

Find information about all mobile phone numbers, email addresses, IP addresses worldwide (step by step)

Find information about all mobile phone numbers, email addresses, IP addresses worldwide (step by step)

OSINT (Open Supply Intelligence) is a solution to gather information from public sources. There are lots of instruments and methods which might be capable of gathering information from public sources, being part of the ethical hacking courses of the International Cyber ​​Security Institute (IICS). In principle, it’s all the time essential to collect information about your aim before the attack. So totally different domains, sub-domains, open ports, providers and different particulars are collected. In line with the Worldwide Security Institute (IICS) ethical hacker, numerous serps are used for scanning / intelligence, corresponding to – shodan, censys

At present we got here with another OSINT software used to collect knowledge. It’s common for OSINT instruments for use for menace intelligence or cybersecurity. OSINT Search Description is a small python script used to extract knowledge utilizing the varied search engine and developer API keys. Python script designed to search for public email addresses, domains, and phone numbers.

OSINT Practical Presents: –

  • Find private information akin to – identify, gender, GPS location, age, languages, social network profiles, and so on.
  • Information related to knowledge violation.
  • Search outcomes for Google hacker methods.
  • Find outcomes for domains or IP addresses.
  • Seek for digital certificates for a selected area.
  • Find a CMS for a specific web site. 19659005] Find DNS data and the zone will transfer the info of a specific domain.
  • Find a Facebook ID and Facebook page that is filled with photographs once you get the URL on your Fb profile.
  • Seek for URLs on some websites.
  • Search URL

Seek for OSINT Installation Description: –

  • Kali Linux 2019.1 for testing amd64. The device was examined with Kali Linux 2019.1 Stay Boot.
  • Earlier than Putting in OSINT Search. Ensure that python3 is put in. Python-type sudo apt-get replace & sudo apt-get set up python3 set up Because the device works with python3.
  • If python3 is put in. Write sudo apt-get set up python3-dev

root @ Kali: ~ / Downloads # apt-get replace
Search: 1 http://ftp.yzu.edu.tw/Linux/kali Kali-Rolling InRelease [19659020] Search: 2 http://ftp.yzu.edu.tw/Linux/kali Kali-Rolling / fundamental Sources [12.8 MB] e amd64 packages [187 kB] Searched 30.4 MB in 14s (2120 kB / s)
Studying Package deal Lists… Completed

Root @ Kali: ~ / Downloads # apt-get set up python3
Reading Package deal Lists… Finished
Building Dependence Tree
Reading Status Information… Executed
The following packages have been routinely installed and they are not wanted:
libpython3.6 libpython3.6-dev python3.6-dev
Use & # 39; apt autoremove & # 39; button to take away them.
The following further packages are installed:
libpython3 -dev libpython3-stdlib libpython3.7 libpython3.7-dev libpython3.7-minimal libpython3.7-stdlib python3-dev
python3-distutils python3 minimal python3.7 python3 .7-dev python3.7-minim
Instructed package deal es:
python3-doc python3-tk python3-venv python3.7-venv python3.7-doc
The next new packages shall be put in:
libpython3 .7-dev python3.7-dev [19659023] Set up the pip3 version. For this sort sudo apt-get install python3-pip

  • Sort git-clone https://github.com/am0nt31r0/OSINT-Search.git [19659019] root @ Kali: ~ / Downloads # git-clone https: // github .com / am0nt31r0 / OSINT-Search.git
    Cloning for OSINT Search…
    distant management: Numbering of objects: 30, made.
    remote management: Calculate objects: 100% (30/30), made by
    remote control: Packing gadgets: 100% (30/30), made.
    remote control: complete 171 (delta 8), reuse 0 (delta 0), re-packed 141
    Acquired gadgets: 100% (171/171), 61.15 KiB | 279.00 KiB / s, made
    Resolving the Decks: 100% (55/55), made
    • Sort cd OSINT Search & Sort chmod u + x requir.txt & sort chmod u + x osintS34rCh.py [19659005] Sort ls-ltr to verify your rights.

    root @ Kali: ~ / Downloads # cd OSINT-Search /
    root @ Kali: ~ / Downloads / OSINT search # chmod u + x requir.txt
    root @ Kali: ~ / Downloads / OSINT search # chmod u + x osintS34rCh.py
    root @ Kali: ~ / Downloads / OSINT search # ls -ltr
    Complete 52
    -rwxr– r – 1 root roots 145 Might 1 : 05 requir.txt
    -rw-r – r– 1 root root 4317 Might 1 05:05 README.md
    -rwxr – r– 1 root root 40432 Might 1 05:05 osintS34rCh.py

    • Sort pip3 install -r requir.txt

    root @ Kali: ~ / Downloads / OSINT search # pip3 set up -r requir.txt
    Assortment git + https: //github.com/abenassi/Google -Search-API (-r requir.txt (line 3))
    Cloning https://github.com/abenassi/Google-Search-API to / tmp / pip-req-build-f4j93eyc
    Amassing validate_email (from -r requir.txt (line 1))
    Download https://files.pythonhosted.org/packages/84/a0/cb53fb64b52123513d04f9b913b905f3eb6fda7264e639b4573cc715c29f/validate_email-1.3.tar.gz CP19399010 r requir.txt (line 2) )
    Downloading https://files.pythonhosted.org/packages/25/cc/b3bdfedabcf0d0b9b2438dd00d1f65ca8d2d691ba24030cc544a6a0114e8/opencnam-0.6-py3-none-any.whl
    r requir.txt (line Four))
    Obtain https://files.pythonhosted.org/packages/33/07/fcfdd7a2872f5b348953de35acce1544dab0c1e8368dca54279b1cde5c15/pyfiglet-0.8.post1-py2.py3-none-a ny.whl (865kB)
    100% | ████████████████████████████████ | 870kB 908kB / s

    • Sort pip3 install git + https: //github.com/abenassi/Google-Search-API – update

    root @ Kali: ~ / Downloads / OSINT search # pip3 installation git + https: // github . com / abenassi / Google-Search API update
    Amassing + https: //github.com/abenassi/Google-Search-API
    Cloning https://github.com/abenassi/Google-Search -API – / tmp / pip-req-build-b5sd1rin
    Requirement already met, skip replace: beautifulsoup4 / usr / lib / python3 / dist packages (from Google Search API == 1.1.14) (4.6.Three)
    The claim has already been met, skip the replace: fake-useragent /usr/native/lib/python3.7/dist-packages (Google Search API == 1.1.14) (0.1.11)
    The declare has already been met, the update is ignored : The Future in / usr / lib / python3 / dist packages (from Google Search API == 1.1.14) (Zero.15.2)
    Requirement already met from / usr / lib / python3 / dist packages (Google Search API = = 1.1.14) (2.20.Zero)
    Requirement already met, skip replace: selenium = 2.44.0 /usr/native/lib/python3.7/dist-packages (from Google Search API == 1.1. 14) (2.53.6)

    • Sort pip3 set up https://github.com/PaulSec/API-dnsdumpster.com/archive/master.zip

    root @ Kali: ~ / Downloads / OSINT-Search # pip3 install https: // github.com/PaulSec/API-dnsdumpster.com/archive/grasp.zip –user
    Accumulating https://github.com/PaulSec/API-dnsdumpster.com/archive/master.zip
    : / /github.com/PaulSec/API-dnsdumpster.com/archive/grasp.zip
    266 kB 21.Three MB / s
    bs4 assortment (dnsdumpster == 0.5)
    https: // – downloading information .pythonhosted.org / package deal / 10 / ed / 7e8b97591f6f456174139ec089c769f89a94a14025fe967691de971f314 / bs4-Zero.0.1.tar.gz
    The claim is already fulfilled: Requests at / usr / lib / python3 / dist packages (dnsdumpster == 0.5) (2.20 Zero.0)

    • Sort python3 osintS34rCh.py

    root @ Kali: ~ / Downloads / OSINT Search # python3 osintS34rCh.py

    _ __ __________ __ __ ________
    ____ _____ (_) ___ / / _ / ___ / __ // // _____ / ____ / / _
    / __ / ___ / / __ / __ / __ _ </ // / _ / ___ / / / __
    / / _ / (__) / / / / / _ ___ / / __ / / __ __ / / / / ___ / / / / /
    ____ / ____ / _ / _ / / _ / __ // ____ / ____ / / _ / / _ / ____ / _ / / _ /

    [-] The next procedure is required to save lots of the API keys …
    [-] Enter should you shouldn’t have the keys.
    [-] The information is written to a file named [/osintSearch.config.ini] which might be edited
    [?] What’s a PIPL API key?

    • Now enter the API keys which are required for the following URLs:
    • Create an account at every of the next URLs and replica their APIs to the following subject in the required area https://pipl.com/api

    https://www.opencnam.com
    https://www.shodan.io
    https://whatcms.org/API
    https://censys.io/register
    https://dashboard.fullcontact.com/consents

    • After Copy Sort python3 osintS34rCh.py

    [?] What is a PIPL API Key?
    gm ##################### yj9 [19659039] What’s the FullContact API key?
    Uh ############ H9rPOez ########### sz
    [?] What is your CNAM account?
    AC1 ############## 88d73e0 ##########
    [?] What is CNAM AUTH_TOKEN?
    A ############ ### c403d9 ############ fe5
    [?] What is Shodan's API Key?
    a ############### wlcjD #### ############### rM
    [?] What’s WhatCMS API Key ?
    2 ################################ ###### ac5376ef9f2d ####### ########### ce2c40 ####### d2
    [?] What is your Censys API ID?
    6 ## ##### Eight – #### – 4723 – #### – ######### bc4e
    [?] What’s the secret of the Censys API?
    ######## ####### 2HyMxEOYrY ##############
    [?] What is the TowerData API Key?
    c6 ############## ##### 3b09a0 ############ aa8a

    • Sort python3 osintS34rCh.py -h

    root @ Kali: ~ / Downloads / OSINT-Search # python3 osintS34rCh.py -h
    osintS34rCh v1.0

    USAGES
    E-mail
    ./osintS34rCh -e # All Searches: Pipl, FullContact, Haveibeenpwnded Knowledge Breaches and Credentials Pastes, TowerData – Validate Email
    ./osintS34rCh -e –pipl # Pipl

    domain
    ./osintS34rCh.py -t # All Searches: Shodan Recon, crt.sh, DNSDumpster, All Google Hacking Dorks, HackerTarget – DNS Zonetransfer
    ./osintS34rCh.py -t –shodan # Shodan Recon

    P.M
    ./osintS34rCh.py -t # All Searches: Shoda and Censys Recon
    ./osintS34rCh.py -t –shodan # Shodan Recon

    URL
    ./osintS34rCh.py -u # WhatCMS Evaluation, HackerTarget – Unzip URLs
    ./osintS34rCh.py -u –cms # WhatCMS Examine

    URL
    ./osintS34rCh.py -u # WhatCMS Assessment, HackerTarget – Unzip URLs
    ./osintS34rCh.py -u –cms # WhatCMS Examine

    Search for email accounts

    • Sort python3 osintS34rCh.py -e abh#########a6##@gmail.com –pwned
    • -e is used to retrieve information from emails. [19659005] abh ######### a6##@gmail.com is the vacation spot email handle. For safety causes, we’ve got hidden the e-mail account and because this e-mail account has been created particularly for the IT Security Courses of the Worldwide Security Middle
    • – pwned is a question to search for knowledge safety.

    root @ Kali: ~ / Downloads / OSINT Search # python3 osintS34rCh.py -e abh##########a6##@gmail.com –pwned

    _ __ __________ __ __ ________
    ____ _____ (_) ___ / / _ / ___ / __ // // _____ / ____ / / _
    / __ / ___ / / __ / __ / __ _ Outcomes of infringement
    [@] Aim: abh ########### a6 ## @ gmail.com
    [] Privateness: Digimon [] Title: Digimon
    [] Region: digimon.co.in [] Date of infringement: 2016-09-05
    [] Variety of violations: 7687679 [] Description: In September 2016, more than 16 GB of digimon.co.in have been acquired – service, in all probability probably the most unsafe Mongo DB instance. The service stopped working quickly after, and there’s no information about its actual nature. Surveys by way of Twitter seem to have been a mail service, probably based mostly on the PowerMTA service and used to ship spam. The logs contained information that contained 7.7 M distinctive email recipients (names and addresses), email server IP addresses, email subjects, and monitoring information, similar to e-mail opening and clicks.
    [] Emblem picture from Digimon: Pictures / PwnedLogos / Email.png [] Infringement: E-mail addresses
    [] Infringement: E-mail [] Infringement: IP Addresses
    [*] Infringement: Names
    [] Privacy Policy : Dubsmash [] Title: Dubsmash
    [] Area: dubsmash.com [] Date Added: 2018-12-01
    [] Number of Damaged Accounts: 161749950 [] Description: In December 2018, video messaging service Dubsmash suffered from knowledge safety. The occasion revealed 162 million unique email addresses along with consumer names and PBKDF2 password alerts. In 2019, the info was released for sale at the hours of darkness on-line market (together with a variety of different major offenses) and commenced to spread more extensively. The information was offered to HIBP from a source that requested it to level to "BenjaminBlue@exploit.im".
    [] Emblem image of Dubsmash: https://haveibeenpwned.com/Content/Images/PwnedLogos/Dubsmash.png [] Breaked knowledge: Email addresses
    [] Infringement: Geographical places [] Infringement: Names
    [] Knowledge breached: Passwords [] Infringement: Phone numbers
    [] Information breached: Languages ​​spoken []: Consumer names
    [] Privateness: MySpace [] Title: MySpace
    [] Area: myspace.com [] Date of violation: 2008-07-01
    [] Number of Breaches: 359420698 [] Description: In 2008, MySpace suffered from knowledge safety that revealed almost 360 million accounts. In Might 2016, the information was provided for sale on the "Real Deal" product market and included email addresses, consumer IDs, and SHA1 distributions of the first 10 characters of the password which were transformed into small letters and stored with out salt. The exact date of the infringement isn’t recognized, however the analysis of the info means that it was Eight years before the release.
    [] Emblem image of MySpace: https://haveibeenpwned.com/Content/Images/PwnedLogos/MySpace.png [] Breaked knowledge: Email addresses
    [] Infringement: Passwords [] Infringement: Consumer names
    [] Privateness : Tumblr [] Title: Tumblr
    [] Area Identify: tumblr.com [] Date of Violation: 2013- 02-28
    [] Number of Damaged Accounts: 65469298 [] Description: Tumblr suffered knowledge protection initially of 2013 that led to over 65 million accounts. Later, the info was bought on the dark market community and included email addresses and passwords that have been saved as salty SHA1.
    [] Emblem image from Tumblr: https://haveibeenpwned.com/Content/Images/PwnedLogos/Tumblr.png [] Infringement: Email Addresses
    [*] Infringement: Passwords

    • The above end result indicates that 3 knowledge has been violated on the above email handle. The primary is the DUBMASH communication software.
    • The video broadcasting software skilled knowledge protection in December 2018 with over 162 million e-mails. Later information containing consumer names and passwords was bought at the hours of darkness community
    • The opposite is the best way previous but efficient privateness is Myspace. MySpace is a well-liked social networking website with photographs, music, video, and networking with associates. In accordance with the above privacy violation, this website information was also found on sale on REAL DARK.
    • The third is the Tumblr infringement, where it suffered about 65 million copies of a privateness breach that was bought on the dark market.

    Search for servers, public keys

    • Sort python3 osintS34rCh. py -t certifhacker.com
    • is used to search for domain-related information.
    • certifhacker.com is the target website.

    root @ Kali: ~ / Downloads / OSINT-Search # python3 osintS34rCh.py t certifhacker.com

    _ __ __________ __ __ ________
    ____ _____ (_) ___ / / _ / ___ / __ // // _____ / ____ / / _
    / __ / ___ / / __ / __ / __ _ Shodan results
    -> Shodan outcomes
    [@] Item: certifhacker.com
    [!] Shodan: no information on Certifhacker.com

    -> CRT.sh results
    [@] Objective: certifhacker.com
    [-] URL: https://crt.sh/?q=%25certifiedhacker.com Three.19659061] Artist CA ID: 16418 [] Issuer Identify: C = US, O = Let's Encrypt, CN = Let's Encrypt Authority X3
    [] Identify: events.certifiedhacker.com [] Online: 2019-03-07T17: 07: 30.61
    [] Earlier than: 2019 – 03-07T16: 07: 29 [] After: 2019-06-05T16: 07: 29
    [] Issuer CA ID: 16418 [] Issuer's Identify: C = US, O = Let's Encrypt CN = Let's Encrypt Authority X3
    [] Identify: fleet.certifiedhacker.com [] Online: 2019-03-07T17: 07: 30.61
    [] Earlier than: 2019-03-07T16: 07: 29 [] After: 2019-06 -05T16: 07: 29
    [] Issuer CA ID: 16418 [1 9459043] Issuer's identify: C = US, O = Let's Encrypt, CN = Let's Encrypt Authority X3
    [] Identify: iam.certifiedhac ker.com [] Online: 2019-03-07T17 : 07: 30.61
    [] Earlier than: 2019-03-07T16: 07: 29 [] After: 2019-06-05T16: 07: 29

    ] -> DNAdumpster outcomes
    [@] Merchandise: certifhacker.com
    [*] DNS Servers
    Domain Identify: ns2.bluehost.com
    IP: 162.159.25.175
    Reverse DNS: ns2.bluehost.com
    AS: AS13335
    ISP: Cloudflare Inc
    Nation: United States
    Title:
    Area: ns1.bluehost.com
    IP: 162,159,24,80
    Reverse DNAs1. bluehost.com
    AS: AS13335
    ISP: Cloudflare Inc
    Nation: United States
    Title:
    [*] MX Data
    Domain: 0 mail.certifiedhacker.com.
    IP: 162.241.216.11
    Reverse DNS: box5331.bluehost.com
    AS: AS20013
    ISP: CyrusOne LLC
    Nation: United States
    Title: mail.certifiedhacker.com.
    [*] TXT Data
    "v = spf1 a mx ptr contains: bluehost.com? All"
    [*] Host Information
    Area: soc.certifiedhacker.com
    IP: 162.241.216.11
    DNS: field5331.bluehost.com
    AS: AS20013
    ISP: CyrusOne LLC
    Country: United States
    Title: nginx / 1.12.2HTTPS: nginx / 1.12.2FTP: 220 —– — – Welcome to Pure-FTP [privsep] [TLS] ———- // 220-You’re the number one 150.//220-The local time is now 23:54. Server port: 21.//220-IPv6 connections are additionally welcome on this server.//220 You’ll be disconnected after 15 minutes of inactivity .//SSH: SSH-2.0-OpenSSH_5.3TCP8080: nginx / 1.12.2
    Area: www .soc.certifiedhacker.com
    IP: 162.241.216.11
    Reverse DNS: field5331.bluehost.com
    AS: AS20013
    ISP: CyrusOne LLC
    Country: United States
    Title: nginx / 1.12.2HTTPS: nginx / 1.12.2FTP: 220 ———- Welcome to Pure-FTPd [privsep] [TLS] ———- // 220-You are the consumer's number one 150. // 220-Local time is now 23:54. Server port: 21.//220-IPv6 connections are additionally welcome on this server.//220 You may be disconnected after 15 minutes of inactivity .//SSH: SSH-2.0-OpenSSH_5.3TCP8080: nginx / 1.12.2
    Domain: itf .certifiedhacker.com
    IP: 162.241.216.11
    Reverse DNS: field5331.bluehost.com
    AS: AS20013
    ISP: CyrusOne LLC
    Nation: United States
    Title: nginx / 1.12 .2HTTPS: nginx / 1.12.2FTP: 220 ———- Welcome to Pure-FTP [privsep] [TLS] ———- // 220-You’re a consumer no 1 150 allowed.// 220-Local Time is now 23:54. Server port: 21.//220-IPv6 connections are also welcome on this server .//220 You may be disconnected after 15 minutes of inactivity .//SSH: SSH-2.0-OpenSSH_5.3TCP8080: nginx / 1.12.2 [19659106] -> Zone Switch Outcomes
    ; <> DiG 9.11.3-1ubuntu1.7-Ubuntu <> axfr @ ns2.bluehost.com certifhacker.com
    ; (Discovered 1 server)
    ;; international choices: + cmd
    ; Did not transfer
    ; <> DiG 9.11.Three-1ubuntu1.7-Ubuntu <> axfr @ ns1.bluehost.com certifhacker.com
    ; (Discovered 1 server)
    ;; international choices: + cmd
    ;

    • The above output exhibits that Shodan could not discover every thing on the goal website. Then Crt.sh finds the URLs because the target website. Crt.sh displays area and subdomains of the goal website. Crt.sh (Certificates Transparency) has been developed to increase public key safety
    • When opening the primary link from crt.sh. It exhibits links in addition to the goal website (licensed by hacker.com)
    • The link above exhibits the identical link as licensed hacker.com. Opening the first link will display the general public key of the URL, generally referred to as Encrypt Authority.

    ————————————————– SNIP ————— ———-

    • It additionally displays the URLs which might be granted. It then shows URL authentication.
    • Most crt.sh URLs present the same authentication.
    • DNSdumpster is designed to seek out found hosts related to domains. DNSdumpster finds all the seen hosts on the attackers.
    • Within the above output, Dnsdumpster has collected 5 host books and other goal website areas. There are various ways to gather any domain hosts. We’ve proven how NSLOOKUP is used to collect totally different hosts.
    • Then it displays the totally different areas of the target website that include inverse dns, nation, IP handle, ISP, and dns header.
    • The output above the OSINT search has been compiled in a different way
    • Then it shows the server identify in the zone shift, but was unable to maneuver any a part of the file.

    Discovering Open Ports

    • Sort python3 osintS34rCh.py -t 162.241.216.11
    • is used to enter an IP handle.
    • 162.241.216.11 is the destination IP handle.

    root @ Kali: ~ / Downloads / OSINT-Search # python3 osintS34rCh.py -t 162.241. 216.11

    _ __ __________ __ __ ________
    ____ _____ (_) ___ / / _ / ___ / __ // // _____ / ____ / / _
    / __ / ___ / / __ / __ / __ _ Shodan results
    [@] Aim: 162.241.216.11
    [] City: Provo [] Country: United States
    [] ZIP Code: 84606 [] Longitude: -111.6133
    [] Latitude: 40.21809999999999 [] Operating System: None
    [] Group: CyrusOne LLC [] ISP: Unified Layer
    [] Port: 465 [] Port: 443
    [] Port: 2096 [] Port: 8080
    [] Port: 995 [] Port: 993
    [] Port: 22 [] Port: 587
    [] Port: 53 [] Port: 25
    [] [] Port: 2222
    [] ] Port: 2087 [] Harbor: 5432
    [] Harbor: 2082 [] Harbor: 2083
    [] Harbor: 26 [] Hostname: field5331.bluehost.com

    > Censys Outcomes
    [] IP: [] Protocol: 806 / http
    [] Minutes: 3306 / mysql [] Minutes: 8080 / http
    [] Minutes: 993 / imaps [] Minutes : 465 / smtp
    [] Minutes: 995 / pop3s [] Minutes: 110 / pop3
    [] Pr Minutes: 21 / ftp [] Minutes: 143 / imap
    [] Minutes: 53 / dns [] 587 / smtp
    [] Protocol: 443 / https [] Minutes: 22 / ssh
    [] Minutes: 5432 / postgres [] Country: United States
    [] Registered Nation: United States [] Longitude: -111.6442
    [] Latitude: 40.2342 [] Mainland: North America
    [] Timezone: America / Denver [] AS Identify: UNIFIEDLAYER-AS-1 – Unified Layer
    [] AS Code: US [] AS Description: UNIFIEDLAYER-AS -1 – Unified Layer

    [] Service: https / 443 [] Certificates DNS Names: [‘.bluehost.com’, ‘bluehost.com’] [] Publisher: & # 39; common_name & # 39 ;: [‘COMODO RSA Domain Validation Secure Server CA’] & # 39; nation & # 39; : [‘GB’] & # 39; [‘Salford’] "Province": [‘Greater Manchester’] "Organization": [‘COMODO CA Limited’]

  • []
    [] Service: dns / 53 [] Open Resolver: True [19659058] Lookup Answers: & # 39; sort & # 39 ;: & # 39 ;, & # 39; identify & # 39 ;: & # 39; c.afekv.com & # 39; Reply & # 39 ;: & # 39; 162.241.216.11 & # 39; [19659106] [*] Updated: 2019-05-01T08: 18: 45 + 00: 00

    • The output above exhibits open shodan ports that include the registered land on latitude and longitude.
    • Censys has additionally found widespread listed gateways utilized in knowledge assortment strategies
    • All these methods are the curriculum for moral hacking courses at the Worldwide Institute.

    Disassembling URLs

    • Sort python3 osintS34rCh.py -u Certifitech.com
    • -u is used to write down a website identify.
    • certifhacker.com is the identify of the target space.

    root @ Kali: ~ / Downloads / OSINT-Search # python3 osintS34rCh.py -u Certifitech.com

    _ __ __________ __ __ ________
    ____ _____ (_) ___ / / _ / ___ / __ // // _____ / ____ / / _
    / __ / ___ / / __ / __ / __ _ URL outcomes
    Visible hyperlinks
    http://certifiedhacker.com/
    http://certifiedhacker.com/ icons / lock-ja-avain-110.png
    http://certifiedhacker.com/
    http://certifiedhacker.com/sample-login.html
    http://certifiedhacker.com / P -folio / index.html
    http://certifiedhacker.com/photographs/slideshow/slide-1.png
    http://certifiedhacker.com/Online Reserving / index.htm
    http: // certifiedhacker.com/pictures/slideshow/slide-2.png[19459011OAhttp://certifiedhackercom/corporate-learning-website/01-homepagehtml[19459011OAhttp://certifiedhackercom/images/Slideshow/slide-3png
    http://certifiedhacker.com/Actual Estates / index.html
    http://certifiedhacker.com/pictures/slideshow/slide-Four.png
    http: / / certifiedhacker .com / Recipes / index.html
    http://certifiedhacker.com/photographs/slideshow/slide-5.png
    http: // certifie dhacker.com/Social Media / index.html
    http: // ce rtifiedhacker.com/pictures/slideshow/slide-6.png
    http://certifiedhacker.com/Turbo Max / index.htm
    http://certifiedhacker.com/photographs/slideshow/slide-7.png
    http://certifiedhacker.com/Beneath Development / index.html
    http://certifiedhacker.com/pictures/slideshow/ slide-Eight.png
    http://certifiedhacker.com/Beneath Timber / index.html
    http://certifiedhacker.com/pictures/slideshow/slide-9.png
    http: // certifiedhacker .com /

    • When a URL query has been scanned, the OSINT search has collected all links on the target website.

    Discovering Particulars of Cell Phone Numbers

    • Sort python3 osintS34rCh.py -p +919 #### 677 ## –callerID
    • -p is used to enter a phone quantity, -callerID is a query.
    • +919 #### 677 ## is Target Search. For security causes, the mobile number is hidden. Mobile Phone Number Crime Know-how is a Core Theme within the Cybersecurity Institute of the Worldwide Cyber ​​Security Institute

    root @ Kali: ~ / Downloads / OSINT-Search # python3 osintS34rCh.py -p +918071992699 – callerID

    _ __ __________ __ __ ________
    ____ _____ (_) ___ / / _ / ___ / __ // // _____ / ____ / / _
    / __ / ___ / / __ / __ / __ _ Caller Identification Outcomes
    [] Number: +919 #### 677 ## [] Nation: DELHI IN

    • The output above exhibits the current location of the mobile number.
    • Sort python3 osintS34rCh.py -p +919 #### 254 ## –callerID
    • -p is used to enter a phone quantity.
    • +919 #### 254 ## is the vacation spot mobile quantity. From the security perspective, the mobile quantity is hidden.

    root @ Kali: ~ / Downloads / OSINT Search # python3 osintS34rCh.py -p +919 #### 254 ## –callerID

    _ __ __________ __ __ ________
    ____ _____ (_) ___ / / _ / ___ / __ // // _____ / ____ / / _
    / __ / ___ / / __ / __ / __ _ Caller Identification Outcomes
    [] Number: +919 #### 254 ## [] Nation: DELHI IN

    • The above output exhibits the situation of the mobile phone quantity.
    • Sort python3 osintS34rCh.py -p +52 ######### 78 – the keyword
    • -p is used to enter a phone quantity. -CallerID is a question.
    • +52 ######### 78 is the target mobile quantity. For security reasons, the mobile number is hidden.

    root @ Kali: ~ / Downloads / OSINT-Search # python3 osintS34rCh.py -p + 52 ######### 78 – callerID

    _ __ __________ __ __ ________
    ____ _____ (_) ___ / / _ / ___ / __ // // _____ / ____ / / _
    / __ / ___ / / __ / __ / __ _ Caller Identification Outcomes
    [] Quantity: +52 ######### 78 [] Nation: VARRERA

    • The above output exhibits the situation of the mobile phone number.
    • Sort python3 osintS34rCh.py -p +52 ######## 02 Telephone Quantity
    • -p is used to enter a phone quantity. -CallerID is a question.
    • +52 ######## 02 is the destination mobile quantity. For security causes, the mobile number is hidden.

    root @ Kali: ~ / Downloads / OSINT Search # python3 osintS34rCh.py -p +52 ######## 02 – callerID

    _ __ __________ __ __ ________
    ____ _____ (_) ___ / / _ / ___ / __ // // _____ / ____ / / _
    / __ / ___ / / __ / __ / __ _ Caller Identification Outcomes
    [] Quantity: +52 ######## 02 [] Nation: MIGUEL HIDAL MX

    • Yllä oleva tuotos näyttää matkapuhelinnumeron sijainnin.
    • Jokaista epäilyttävää numeroa voidaan tarkistaa siitä, mistä maasta se kuuluu.
  • (toiminto (d, s, id)
    var js, fjs = d.getElementsByTagName (s) [0];
    if (d.getElementById (id)) return;
    js = d.createElement (s); js.id = id;
    js.src = "//connect.facebook.net/en_US/sdk.js#xfbml=1&version=v2.6";
    fjs.parentNode.insertBefore (js, fjs);
    (asiakirja, käsikirjoitus, facebook-jssdk)) (toiminto (d, s, id)
      var js, fjs = d.getElementsByTagName (s) [0];
    if (d.getElementById (id)) returns;
    js = d.createElement (s); js.id = id;
      js.src = 'https://connect.facebook.net/en_US/sdk.js#xfbml=1&version=v3.2';
    fjs.parentNode.insertBefore (js, fjs);
    (doc, script & # 39; facebook-jssdk & # 39;));