Skip to content

Latest commit

 

History

History
79 lines (62 loc) · 1.77 KB

File metadata and controls

79 lines (62 loc) · 1.77 KB

Call Me Maybe

Social Engineering Attack Suite for the Telephone Network (integrated with Plivo).

Disclaimer 1, this tool is only for use with numbers you are authorised to use. IANAL, check the laws and regulations in your local area.

Disclaimer 2, this is nothing brilliant, it's really a tool to interact with the Plivo API with a certain goal...

Disclaimer 3, this code is bad. I know.

The initial features this tool allows are: Spoofing Phone Calls, Spoofing SMS. Soon: Brute Force Dialling of Phone Number Ranges (to detect valid phone company numbers/extensions and record audio)

There are two versions of the tool, neither written well (IANAD - I am not a dev) There is a ruby version for cli, and a cut-down python version that runs a web interface and supports the spoofing functions only (ideal for mobile access)

Requirements

CLI Version

Public IP Address

Ruby >= 2.0

Plivo >= 4.0.0

(gems as listed below)

Web Version

python3

pip

tornado

plivo

Installation

CLI Version

Required gems

gem install require_all
gem install tty-prompt
gem install builder
gem install rubygems
gem install plivo
gem install net
Add your Plivo API authentication to: ./config/config.rb
AUTH_ID = "<yourIDhere>"
AUTH_TOKEN = "<yourTokenhere>"

Web Version

pip3 install tornado
pip3 install tornado_http_auth
pip3 install plivo
Add your web interface authentication on the "credentials" line.
Add your Plivo API auth:
authid = "<yourIDhere>"
authtoken = "<yourTokenhere>"
Add your public URL to "externalurl"
Add your certfile and key

Launching

CLI Version

ruby main.rb

Web Version

python3 cmm.py

Roadmap

  • 0.0.1
    • Work in progress (spoofing modules built, but brute dialler not done.)