Information Gathering

AVOSINT – Harnessing Aviation Intelligence From Open Sources

A tool to search Aviation-related intelligence from public sources. AVOSINT is a cutting-edge tool designed to extract and analyze aviation-related intelligence from public sources.

It utilizes powerful OSINT techniques to monitor aircraft movements, gather historical data, and retrieve detailed aircraft information.

This article explores how AVOSINT can be deployed and its various capabilities in aviation intelligence gathering.

Usage

Launch parsr docker image (for pdf-file stored registers)

docker run -p 3001:3001 axarev/parsr

Launch Avosint

./avosint.py [--action ACTION] [--tail-number TAIL-NUMBER] [--icao ICAO]

With ACTION being either ICAOtailconvertmonitor

tail – Gather infos starting from tail number. Option --tail-number is required.

convert – Convert USA hex to ICAO. Option --icao is required.

monitor – Gathers positionnal information from osint sources and detects hovering patterns. Requires --icao number

Returns the following informations when possible:

  • Owner of the aircraft
  • User of the aircraft
  • Aircraft transponder id
  • Aircraft manufacturer serial number
  • Aircraft model
  • Aircraft picture links
  • Aircraft incident history

The following display is then presented:

Current Status: [Done]
Last action: tail
Current tail: {tail_n}
==========================================
✈️ Aircraft infos:

        Manufacturer: {}
        Manufacturer Serial Number: {}
        Tail Number: {}
        Call Sign: {}
        Last known position: {}
        Last known altitude: {}
        
???? Owner infos

        Name: {} 
        Street: {}   
        City: {} 
        ZIP: {}
        Country: {}
            
New Action [ICAO, tail, convert, monitor, exit, quit] (None):

Dependencies

Install Python Requirements

pip install -r requirements.txt

This tool also uses the OpenSkyApi available. Install it using:

git clone https://github.com/openskynetwork/opensky-api 
pip install -e /path/to/repository/python

Install Parsr Docker Image

docker run -p 3001:3001 axarev/parsr

Parsr

As some registers are in the form of a pdf file, AVOSINT uses parsr Due to a bug in the current version of the parsr library (axa-group/Parsr#565 (comment)) it is necessary to apply the following fix in the parsr-client python library:

return {
- 'file': file,
- 'config': config,
+ 'file': file_path,
+ 'config': config_path,
  'status_code': r.status_code,
  'server_response': r.text
}

Tamil S

Tamil has a great interest in the fields of Cyber Security, OSINT, and CTF projects. Currently, he is deeply involved in researching and publishing various security tools with Kali Linux Tutorials, which is quite fascinating.

Recent Posts

Exploit Street – Navigating The New Terrain Of Windows LPEs

Exploit-Street, where we dive into the ever-evolving world of cybersecurity with a focus on Local…

1 day ago

ShadowDumper – Advanced Techniques For LSASS Memory Extraction

Shadow Dumper is a powerful tool used to dump LSASS (Local Security Authority Subsystem Service)…

2 days ago

Shadow-rs : Harnessing Rust’s Power For Kernel-Level Security Research

shadow-rs is a Windows kernel rootkit written in Rust, demonstrating advanced techniques for kernel manipulation…

2 weeks ago

ExecutePeFromPngViaLNK – Advanced Execution Of Embedded PE Files via PNG And LNK

Extract and execute a PE embedded within a PNG file using an LNK file. The…

3 weeks ago

Red Team Certification – A Comprehensive Guide To Advancing In Cybersecurity Operations

Embark on the journey of becoming a certified Red Team professional with our definitive guide.…

3 weeks ago

CVE-2024-5836 / CVE-2024-6778 : Chromium Sandbox Escape via Extension Exploits

This repository contains proof of concept exploits for CVE-2024-5836 and CVE-2024-6778, which are vulnerabilities within…

4 weeks ago