FB Youtube Twitter

Free Facial Recognition Tool Can Track People Across Social Media Sites.

Ashraf Ali S

Security researchers at Trustwave have released a new open-source tool that uses facial recognition technology to locate targets across numerous social media networks on a large scale.

Dubbed Social Mapper, the facial recognition tool automatically searches for targets across eight social media platforms, including—Facebook, Instagram, Twitter, LinkedIn, Google+, the Russian social networking site VKontakte, and China’s Weibo and Douban—based on their names and pictures.

The tool’s creators claim they developed Social Mapper intelligence-gathering tool predominantly to help pen testers and red teamers with social engineering attacks.

Although the searches of names and pictures can already be performed manually, Social Mapper makes it possible to automate such scans far faster and “on a mass scale with hundreds or thousands of individuals” at once.

How Social Mapper Open Source Intelligence Tool Works

Ashraf Ali S

But, “What if it could be automated and done on a mass scale with hundreds or thousands of individuals?”

Social Mapper works by running through three stages:


Stage 1—The tool creates a list of targets (consisting of a name and a picture) based on the input you give it. The list can be provided via links in a CSV file, images in a folder or via people registered to a company on LinkedIn.

Stage 2—Once the targets are processed, the second stage of Social Mapper kicks in that automatically starts searching social media sites for the targets online.

The researchers suggest running the tool overnight with a good internet connection as the search could take over 15 hours for lists of 1,000 people and use a significant amount of bandwidth.

Stage 3—After searching, the third stage of the Social Mapper starts generating reports such as a spreadsheet with links to the profile pages of the target list, or a more visual HTML report that also includes photos for quickly checking and verifying the results.

The company further proceeded to outline some nefarious-sounding uses of Social Mapper, which are limited “only by your imagination,” once you have the end result in your hand, suggesting that it can be used to:
Create fake social media profiles to “Friend” targets and then send them links to downloadable malware or credential capturing landing web pages.

Trick targets into disclosing their emails and phone numbers with vouchers and offers to pivot into “phishing, vishing or smishing.”
Create custom phishing campaigns for each social media platform, making sure that the target has an account, and make these more realistic by including their profile picture in the email. Then capture the passwords for password reuse.

View target’s photos looking for employee access card badges and familiarise yourself with building interiors.

Well, that sounds horrible, but Trustwave researchers emphasized the use of Social Mapper for ethical hacking.

Trustwave has made Social Mapper available on GitHub and making it available to everyone for free.

Trustwave’s Jacob Wilkin is going to present Social Mapper at the Black Hat USA conference this week, where IBM Research is detailing its highly evasive and highly targeted AI-powered malware called DeepLocker.

Categories: Technology


Download Lock File Of Pc · 11th September 2018 at 9:13 pm

This bⅼog was… how do you say it? Relevant!! Finally I’ve found somethіng that helped
me. Cһeers!
More Bonusеs : How Ꭲo Password Protеct FolԀer And Influence

Lilliana · 19th September 2018 at 5:30 pm

Greatе post. Keep writing sucһ kind of info on your site.
Im really impressеd by your bloɡ.
Hey there, Уou have done an incгedible job. І will certainly digg it
and in my view recommend to my friends. I am confident they will be benefited from tһis website.

he said : Top Encryption Software Tips! & How To How To Encrypt A Password For Fгee
And Іnfluence People

http://techjad.blogspot.com · 21st September 2018 at 4:44 am

Ꮋello, its fastidiօus parаgrapһ concerning media print,
we all be familiar with media іs a great source of facts.

click this site : Nine Wɑys To Improve Encryption Software & Nine Enticing Tips To
How To Еncrypt A Password For Free Like Nobody Elѕe

ergfirnolikz · 10th January 2019 at 10:04 am

I like the valuable info you provide in your articles. I’ll bookmark your weblog and check again here regularly. I’m quite certain I will learn many new stuff right here! Good luck for the next!

Leave a Reply

Your e-mail address will not be published. Required fields are marked *