Information Gathering

AVOSINT – Harnessing Aviation Intelligence From Open Sources

A tool to search Aviation-related intelligence from public sources. AVOSINT is a cutting-edge tool designed to extract and analyze aviation-related intelligence from public sources.

It utilizes powerful OSINT techniques to monitor aircraft movements, gather historical data, and retrieve detailed aircraft information.

This article explores how AVOSINT can be deployed and its various capabilities in aviation intelligence gathering.

Usage

Launch parsr docker image (for pdf-file stored registers)

docker run -p 3001:3001 axarev/parsr

Launch Avosint

./avosint.py [--action ACTION] [--tail-number TAIL-NUMBER] [--icao ICAO]

With ACTION being either ICAOtailconvertmonitor

tail – Gather infos starting from tail number. Option --tail-number is required.

convert – Convert USA hex to ICAO. Option --icao is required.

monitor – Gathers positionnal information from osint sources and detects hovering patterns. Requires --icao number

Returns the following informations when possible:

  • Owner of the aircraft
  • User of the aircraft
  • Aircraft transponder id
  • Aircraft manufacturer serial number
  • Aircraft model
  • Aircraft picture links
  • Aircraft incident history

The following display is then presented:

Current Status: [Done]
Last action: tail
Current tail: {tail_n}
==========================================
✈️ Aircraft infos:

        Manufacturer: {}
        Manufacturer Serial Number: {}
        Tail Number: {}
        Call Sign: {}
        Last known position: {}
        Last known altitude: {}
        
???? Owner infos

        Name: {} 
        Street: {}   
        City: {} 
        ZIP: {}
        Country: {}
            
New Action [ICAO, tail, convert, monitor, exit, quit] (None):

Dependencies

Install Python Requirements

pip install -r requirements.txt

This tool also uses the OpenSkyApi available. Install it using:

git clone https://github.com/openskynetwork/opensky-api 
pip install -e /path/to/repository/python

Install Parsr Docker Image

docker run -p 3001:3001 axarev/parsr

Parsr

As some registers are in the form of a pdf file, AVOSINT uses parsr Due to a bug in the current version of the parsr library (axa-group/Parsr#565 (comment)) it is necessary to apply the following fix in the parsr-client python library:

return {
- 'file': file,
- 'config': config,
+ 'file': file_path,
+ 'config': config_path,
  'status_code': r.status_code,
  'server_response': r.text
}

Varshini

Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies.

Recent Posts

How Does a Firewall Work Step by Step

How Does a Firewall Work Step by Step? What Is a Firewall and How Does…

16 hours ago

ROADTools: The Modern Azure AD Exploration Framework

ROADTools is a powerful framework designed for exploring and interacting with Microsoft Azure Active Directory…

4 days ago

How to Enumerate Microsoft 365 Groups Using PowerShell and Python

Microsoft 365 Groups (also known as M365 Groups or Unified Groups) are at the heart…

4 days ago

SeamlessPass: Using Kerberos Tickets to Access Microsoft 365

SeamlessPass is a specialized tool designed to leverage on-premises Active Directory Kerberos tickets to obtain…

5 days ago

PPLBlade: Advanced Memory Dumping and Obfuscation Tool

PPLBlade is a powerful Protected Process Dumper designed to capture memory from target processes, hide…

5 days ago

HikPwn : Simple Scanner For Hikvision Devices With Basic Vulnerability Scanning

HikPwn: Comprehensive Guide to Scanning Hikvision Devices for Vulnerabilities If you’re searching for an efficient…

6 days ago