Before diving into the practical, let's understand the three stages of this process as given below:
- Scrapping
In this stage, we try to extract the masked phone number(example: 123XXX789) from the victim's email address. Later use this masked phone number in the next stage,
- Generate
In this stage, we have to generate a wordlist of possible phone numbers with the help of masked phone number.
- Bruteforce
In this stage, we bruteforce target email using that wordlist and try to find which is a valid associated phone number with that email address.
I hope now you have an understanding of what we are actually going to do and it's time to do some hands-on Linux.
If you see any environment error on the terminal then you have to install requirements.txt file packages manually using the following command
Now all the helping commands are visible on the terminal. Let's take an example email and phone number to demonstrate this tool usage.
Suppose we get a masked phone number: 1234xxx258
Now you get a wordlist file in the directory of possible phone numbers
Now brute-forcing process will be started and the speed of it depends on your Internet connection and system. It's time to wait until you get the final results or final valid phone number.
I hope this information is helpful for you, make sure to save bookmarks for future posts and join our complete real-world hacking course if you want to enhance your hacking skills or even if you don't know anything about hacking.
Get 10% off to enroll today