
#HoneyBot It’s been a long time since I taught anyone how to identify Telegram users. We will talk about active OSINT using decoy bots (I call them HoneyBot).
🕵️♂️ To make HoneyBot we need two services:
▫️https://t.me/FleepBot (chatbot constructor with the ability to request the user’s phone number and geolocation)
▫️https://t.me/BotFather (API registrar for bots and their editing)
The process of creating HoneyBot is in the video and includes creating a chat bot that imitates a bot for dialing a phone number (there may be variations here). Your task is to convince the user to enter any phone number, and then click on the <TRY> button (or whatever you call it). Then confirm sending (YOUR, not the entered) phone number to you. A similar scheme can be used to obtain geolocation data.

#HoneyBot 🕵️♂️ To strengthen your HoneyBot you will need logging services:
▫️ https://canarytokens.org/
▫️ https://iplogger.org/
You should prepare in advance an html file that has a built-in tracking pixel. In response to a user’s request to HoneyBot, you can send him (this is a chatbot) a created file under the guise of a report (data upload). When a user opens it, you will receive data about his connection and device in the logger administrator’s personal account.

You must be logged in to post a comment.