cybersecurity, Downloads, Hacking Tools, Infosec, Recon, Security Tools

InfoHound – An OSINT To Extract A Large Amount Of Data Given A Web Domain Name

During the reconnaissance phase, an attacker searches for any information about his target to create a profile that will later help him to identify possible ways to get in an organization. InfoHound performs passive analysis techniques (which do not interact directly with the target) using OSINT to extract a large amount of data given a web domain name. This tool will retrieve emails, people, files, subdomains, usernames and urls that will be later analyzed to extract even more valuable information.

Infohound architecture

Installation

git clone https://github.com/xampla/InfoHound.git
cd InfoHound/infohound
mv infohound_config.sample.py infohound_config.py
cd ..
docker-compose up -d

You must add API Keys inside infohound_config.py file

Default modules

InfoHound has 2 different types of modules, those which retreives data and those which analyse it to extract more relevant information.

 Retrievval modules

NameDescription
Get Whois InfoGet relevant information from Whois register.
Get DNS RecordsThis task queries the DNS.
Get SubdomainsThis task uses Alienvault OTX API, CRT.sh, and HackerTarget as data sources to discover cached subdomains.
Get Subdomains From URLsOnce some tasks have been performed, the URLs table will have a lot of entries. This task will check all the URLs to find new subdomains.
Get URLsIt searches all URLs cached by Wayback Machine and saves them into the database. This will later help to discover other data entities like files or subdomains.
Get Files from URLsIt loops through the URLs database table to find files and store them in the Files database table for later analysis. The files that will be retrieved are: doc, docx, ppt, pptx, pps, ppsx, xls, xlsx, odt, ods, odg, odp, sxw, sxc, sxi, pdf, wpd, svg, indd, rdp, ica, zip, rar
Find EmailIt looks for emails using queries to Google and Bing.
Find People from EmailsOnce some emails have been found, it can be useful to discover the person behind them. Also, it finds usernames from those people.
Find Emails From URLsSometimes, the discovered URLs can contain sensitive information. This task retrieves all the emails from URL paths.
Execute DorksIt will execute the dorks defined in the dorks folder. Remember to group the dorks by categories (filename) to understand their objectives.
Find Emails From DorksBy default, InfoHound has some dorks defined to discover emails. This task will look for them in the results obtained from dork execution.

NameDescription
Check Subdomains Take-OverIt performs some checks to determine if a subdomain can be taken over.
Check If Domain Can Be SpoofedIt checks if a domain, from the emails InfoHound has discovered, can be spoofed. This could be used by attackers to impersonate a person and send emails as him/her.
Get Profiles From UsernamesThis task uses the discovered usernames from each person to find profiles from services or social networks where that username exists. This is performed using the Maigret tool. It is worth noting that although a profile with the same username is found, it does not necessarily mean it belongs to the person being analyzed.
Download All FilesOnce files have been stored in the Files database table, this task will download them in the “download_files” folder.
Get MetadataUsing exiftool, this task will extract all the metadata from the downloaded files and save it to the database.
Get Emails From MetadataAs some metadata can contain emails, this task will retrieve all of them and save them to the database.
Get Emails From Files ContentUsually, emails can be included in corporate files, so this task will retrieve all the emails from the downloaded files’ content.
Find Registered Services using EmailsIt is possible to find services or social networks where an email has been used to create an account. This task will check if an email InfoHound has discovered has an account in Twitter, Adobe, Facebook, Imgur, Mewe, Parler, Rumble, Snapchat, WordPress, and/or Duolingo.
Check BreachThis task checks Firefox Monitor service to see if an email has been found in a data breach. Although it is a free service, it has a limitation of 10 queries per day. If Leak-Lookup API key is set, it also checks it.

Custom modules

InfoHound lets you create custom modules, you just need to add your script inside infohoudn/tool/custom_modules. One custome module has been added as an example which uses Holehe tool to check if the emails previously are attached to an account on sites like Twitter, Instagram, Imgur and more than 120 others.

Inspired by

Source : KitPloit – PenTest Tools!

Previous ArticleNext Article
Send this to a friend