Table of Contents
Getting started with Infooze
Infooze is an open source intelligence tool made with Nodejs and automates the information gathering process helping the user gather information in a quicker and effective way. Information gathering is always vital before launching any attack as it helps us know more about thee target. Some of the features of the Infooze tool include;
- Insta Recon
- Subdomain Scanner
- Ports Scan
- User Reconnaissance
- Mail Finder
- URL Scanner
- Exif metadata extract
- Whois Lookup
- IP Lookup
- Header Info
- Domain Age
- DNS lookup
- User Agent lookup
- Git Recon
- Expand URL
- Instagram Display Picture Viewer
- Saving results to a file
In this guide, we shall be demonstrating on how to use the infooze tool to gather different types of information from different sources available online.
- Have a running Linux instance(You can choose to run the Kali Linux instance from a USB drive or in a virtual box).
- Be comfortable with using the terminal.
- Have targets to run the attacks on. (Make sure you obtain consent where need be)
- Have Nodejs installed.
Infooze tool can be used on the most common operating systems; Linux, android while using termux and windows platforms. In our guide we will be installing infooze tool on Linux. To install infooze we will first download it fro m its official GitHub repository using the command below.
git clone https://github.com/7ORP3DO/infoooze.git
After the download is complete, we navigate into the downloaded folder from where we will run the command to install infooze tool as shown on the image below.
Make sure when installing infooze on your Kali machine you are connected to the internet so to ensure all the required packages are installed. After the installation is complete, a thank you message from our tool will be display on the terminal as shown ont the image above. Now we can reconnaisance on our target. To launch the tool, you ust type ‘infooze’ on the terminal and click enter. The tool's main page has around 15 distinct options to use while carrying out reconnaissance as shown below.
Port scanning using infooze
To perform a port scan on the tool, we will choose option 7 as shown on the image above. In this guide, we will use metasploitable, which we had installed in our hacking lab. We provide its IP address as the website domain address.
Finding browser information on infooze
Infooze has an option which can be used to extract important browser information from the user-agent string. To use this option, we chose option three which requires us to provide the user agent string which we has been acquired using other tools used for collecting such information for example the BeEF tool or using other similar tools. In this guide, we provided user agent details from a random capture and the output from our tool is as shown on the image below.
There are different user agent string from different devices on this website which can be used for the purpose of practicing.
Image forensic analysis
Previously, we had a guide on how to hide information within an image file using steghide. Infooze has option which helps a forensic investigator to perform image forensic analysis. It makes infooze tool a must have tool for the investigator for its many and diverse capabilities especially during OSINT information collection. To perform image forensic analysis, we open our terminal and launch infooze. On the options list, we choose option 14 which has the name “Exif Metadata”.
On clicking enter, we have to provide the location on the computer of the image we want to analyze by providing a path and click enter for the analysis to begin as shown on the image below.
As shown on the image above, the image we were analyzing did not have any exif segment. For a case where the image has some hidden information, The tool will notify the user in order for him/her to take action.
Scanning website for viruses and malwares
Another use of the infooze tool is to scan a website for malicious files and links. Infooze has an option to perform the scan under option 10. To use this scanner, we fire up our tool on the terminal and when we are requested to choose an option we choose option 10. You will be required to provide a link for the website we are to scan and then press enter to start the scan as shown on the image below.
As shown on the image above, infooze uses different scanners to detect viruses and malwares on a website. Different scanners use different detecting mechanisms hence combining them makes infooze website scanner more powerful. It should however be noted that warnings from different scanners should be used to make a final decision considering the overall scanner rating.
Using infooze for username reconnaissance
Infooze tool can be used to find a certain username on different popular platforms on the internet. This reduces the time taken to manually locate and confirm a username on these platforms. With this tool, we are able to automate this process, we are only required to provide the username we want to hide and sit back as we wait for the tool to do the finding as shown on the image below.
The option for username reconnaissance on the tool is the first option on the window to choose our options based on what we want to use infooze for.
As shown on the image above, we were able to locate various accounts having “hacker” as their user name. The provided results are links to the specific accounts found. Links in green represent where the username has been found and the links in red are for the platforms where no user name was found.
In the above guide we were able to learn of different open source intelligence tools that can be found under this tool. This tool is a great intelligence and reconnaissance tool especially for the forensic investigators as it has different tools under one roof, from image forensics, to user name reconnaissance to port scanning. Another great advantage of this tool is the fact that all the results from scans made using this tool are saved and can be accessed by the user on a later date without having to run the tests again.
It should however be noted that this tool should not be used to exploit or perform attacks on unknowing individuals or systems which the attacker does not have permission to.