Facebook is one of the biggest companies with a huge user database and that is why it is the first choice for hackers to gather information about a person.
Many people on Facebook do not care about privacy and that is the golden point for hackers. The users put their phone numbers, E-mails, and make them public. This makes it easier for hackers to gather these things.
That is why Facebook face data breaching problem a lot.
Here on this topic, we are going to do the same. We are going to use a tool called OSIF(Open Source Information Facebook) which is really a good tool to save our valuable time.
OSIF can extract the E-mails, phone numbers, usernames from the profiles of your friend list. This tool is written in python by Ciku370.
We don’t recommend you to use these tools for illegal purposes. We are here to raise the security awareness of people.
Let’s get into how we can configure OSIF on Kali Linux.
Configure OSIF in Kali Linux
Fire up your Kali Linux machine, open up the terminal, change the directory to the Desktop and clone the tool from https://github.com/CiKu370/OSIFGithub.
git clone https://github.com/CiKu370/OSIF.git
Now change the directory to the OSIF folder and expand it. Here you can see a script named osif.py which will launch the tool. Before launching the tool, we need to satisfy some requirements to make the tool run properly. Follow the commands-
pip install -r requirements
The last command will install all the necessary packages required to run the tool without error. Now its time to launch the tool. Run it by the command-
We’ve successfully launched the tool. To get the options we can use to extract information type help in the terminal and hit enter.
Here you can see we got the list of options we can use. To use them you need to log in to your Facebook account to get the friend list. You have to log in to your account through the tool. To do that type-‘token’ in the terminal and hit enter. This command will generate an access token for your account.
Here we’ve put the username and password of an account. Now launch the tool again and type help again in the terminal and hit enter.
Now we would like to collect the phone numbers from the friend list of the account we’ve chosen previously.
The collected phone numbers are saved in an output text file in the OSIF folder. These are very sensitive information and don’t use them for illegal purposes.
There is nothing more to explain about the tool. Just type the commands given in the help option to get the information you need.
Information Gathering is the first step for hackers to know a person and prepare an attack on the basis of his/her interest.
These tools play a big role in the field of Information Gathering. If we talk about OSIF, its targeting Facebook to get information. The creator knows Facebook is the easiest target where we can get maximum information about a person.
We must thank the creator of OSIF to give us an awesome tool.
Also, let us know what do you think about the tool in the comment box. Your valuable comment inspires us to let you know about more amazing tools.
The tutorial you found on this website is only for educational purposes. Misuse of this information can lead you to jail or punishment. Anything you damage, we are not responsible for that. Do use it on your own property. If you want to test it on other’s property, take written permission from them.