Raven is a Linkedin information gathering tool that can be used by pentesters to gather information about an organization employees using Linkedin. Usage of this is application is pretty simple. It requires at least three parameters. The first one is the company name , the second one is the country initials and the domain name. Please do not use this program to do stupid things. The author does not keep any responsability of what damage has been done by this program.
- Run setup.sh as root
- Adjust Linkedin credentials in raven.py or pass them as parameters.
- If you are running in Kali Linux , to avoid problems with selenium update firefox to the latest version.
raven.py [-h] -c COMPANY -s STATE -d DOMAIN [-p PAGES] [-lu LUSERNAME] [-lp LPASSWORD] -c COMPANY, --company COMPANY Input the Company name. Ex: Pizzahut -s STATE, --state STATE Input the State initials. Ex: uk , al , etc... -d DOMAIN, --domain DOMAIN Input the domain name. Ex: gmail.com -p PAGES, --pages PAGES Number of google pages to navigate. Ex: 3 -lu LUSERNAME --lusername LUSERNAME The linkedin username to use. -lp LPASSWORD, --lpassword LPASSWORD The linekdin password to use.
For example , if the company that you want to search is Evil Corp and the state is Albania the parameters would be:
python raven.py -c 'Evil Corp' -s al -d evilcorp.al
You can also specify how many pages of Google Search you want to search with the -p parameters
python raven.py -c 'Evil Corp' -s al -d evilcorp.al -p 3
The command above will search for results on 3 first pages of google.
The tool actually is a scraper that works with selenium. It uses a google dork to extract the LinkedIn url’s and then it exctracts data from them. As you may know Linkedin has different subdomains for country-s.
For example : al.linkedin.com is for Albania, uk.linkedin.com is for United Kingdom etc.
The state parameter is actually the subdomain of the LinkedIn website.
- Automatically check found emails in haveibeenpwned.com
- Output in CSV format (For using with GoPhish)