Information Gathering

AVOSINT – Harnessing Aviation Intelligence From Open Sources

A tool to search Aviation-related intelligence from public sources. AVOSINT is a cutting-edge tool designed to extract and analyze aviation-related intelligence from public sources.

It utilizes powerful OSINT techniques to monitor aircraft movements, gather historical data, and retrieve detailed aircraft information.

This article explores how AVOSINT can be deployed and its various capabilities in aviation intelligence gathering.

Usage

Launch parsr docker image (for pdf-file stored registers)

docker run -p 3001:3001 axarev/parsr

Launch Avosint

./avosint.py [--action ACTION] [--tail-number TAIL-NUMBER] [--icao ICAO]

With ACTION being either ICAOtailconvertmonitor

tail – Gather infos starting from tail number. Option --tail-number is required.

convert – Convert USA hex to ICAO. Option --icao is required.

monitor – Gathers positionnal information from osint sources and detects hovering patterns. Requires --icao number

Returns the following informations when possible:

  • Owner of the aircraft
  • User of the aircraft
  • Aircraft transponder id
  • Aircraft manufacturer serial number
  • Aircraft model
  • Aircraft picture links
  • Aircraft incident history

The following display is then presented:

Current Status: [Done]
Last action: tail
Current tail: {tail_n}
==========================================
✈️ Aircraft infos:

        Manufacturer: {}
        Manufacturer Serial Number: {}
        Tail Number: {}
        Call Sign: {}
        Last known position: {}
        Last known altitude: {}
        
???? Owner infos

        Name: {} 
        Street: {}   
        City: {} 
        ZIP: {}
        Country: {}
            
New Action [ICAO, tail, convert, monitor, exit, quit] (None):

Dependencies

Install Python Requirements

pip install -r requirements.txt

This tool also uses the OpenSkyApi available. Install it using:

git clone https://github.com/openskynetwork/opensky-api 
pip install -e /path/to/repository/python

Install Parsr Docker Image

docker run -p 3001:3001 axarev/parsr

Parsr

As some registers are in the form of a pdf file, AVOSINT uses parsr Due to a bug in the current version of the parsr library (axa-group/Parsr#565 (comment)) it is necessary to apply the following fix in the parsr-client python library:

return {
- 'file': file,
- 'config': config,
+ 'file': file_path,
+ 'config': config_path,
  'status_code': r.status_code,
  'server_response': r.text
}

Varshini

Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies.

Recent Posts

Cybersecurity – Tools And Their Function

Cybersecurity tools play a critical role in safeguarding digital assets, systems, and networks from malicious…

7 hours ago

MODeflattener – Miasm’s OLLVM Deflattener

MODeflattener is a specialized tool designed to reverse OLLVM's control flow flattening obfuscation through static…

7 hours ago

My Awesome List : Tools And Their Functions

"My Awesome List" is a curated collection of tools, libraries, and resources spanning various domains…

7 hours ago

Chrome Browser Exploitation, Part 3 : Analyzing And Exploiting CVE-2018-17463

CVE-2018-17463, a type confusion vulnerability in Chrome’s V8 JavaScript engine, allowed attackers to execute arbitrary…

7 hours ago

Chrome Browser Exploitation, Part 1 : Introduction To V8 And JavaScript Internals

The blog post "Chrome Browser Exploitation, Part 1: Introduction to V8 and JavaScript Internals" provides…

7 hours ago

Chrome Browser Exploitation, Part 3: Analyzing and Exploiting CVE-2018-17463

The exploitation of CVE-2018-17463, a type confusion vulnerability in Chrome’s V8 JavaScript engine, relies on…

10 hours ago