The capability to process and search data is limited since it does not rely on a DB.As any OSINT tool, it tends to break constantly as it depends on the UI elements of many websites which tend to change over time.The tool is useful but I wrote it mostly as a PoC due to some caveats: It bruteforces password resets using the list of phone numbers and correlates the displayed partial email to a given one for a match.It generates a list of valid phone numbers using open source data published by the organization in charge of the countries Phone Numbering Plan.It scrapes websites to collect phone number digits from password reset attempts.A new OSINT toolĭuring the presentation, I demoed and later published email2phonenumber, a tool that automates the entire process described above. This list can be used to bruteforce password reset attempts to find out the target’s true phone number.Ĭonfused? Seriously, read the post or watch the talk before continuing. If you insist on a TL DR, I demonstrate how the lack of standardization in masking PII during the password reset process coupled with the knowledge of the Phone Numbering Plan of the target’s country, can be used to generate a list of valid phone numbers that are candidates to be the target’s number. Last year, at DEF CON‘s Recon Village and Bsides Las Vegas, I gave a talk explaining a new OSINT technique to obtain a target’s phone number by knowing their email address.įeel free to read the detailed post explaining the techniques or watch the talk.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |