Skip to main content

HOW TO FIND THE ACCURATE LOCATION OF VICTIM




Seeker – Accurately Locate Smartphones using Social Engineering

Locate Smartphones: Seeker comes preinstalled in BlackArch Linux. If you are using Kali Linux, Parrot OS or another Linux based distribution see install information below.

Seeker is developed by thewhiteh4t. Seeker is a Proof of Concept and is for Educational Purposes Only, Seeker shows what data a malicious website can gather about you and your devices and why you should not click on random links and allow critical permissions such as Location etc. Concept behind Seeker is simple, just like we host phishing pages to get credentials why not host a fake page that requests your location like many popular location based websites.Seeker Hosts a fake website on In Built PHP Server and uses Serveo to generate a link which we will forward to the target, website asks for Location Permission and if the target allows it, we can get :
  • Longitude
  • Latitude
  • Accuracy
  • Altitude – Not always available
  • Direction – Only available if user is moving
  • Speed – Only available if user is moving
Along with Location Information we also get Device Information without any permissions :
  • Operating System
  • Platform
  • Number of CPU Cores
  • Amount of RAM – Approximate Results
  • Screen Resolution
  • GPU information
  • Browser Name and Version
  • Public IP Address
  • IP Address Reconnaissance
This tool is a Proof of Concept and is for Educational Purposes Only, Seeker shows what data a malicious website can gather about you and your devices and why you should not click on random links and allow critical permissions such as Location etc.



How is this Different from IP GeoLocation

  • Other tools and services offer IP Geolocation which is NOT accurate at all and does not give location of the target instead it is the approximate location of the ISP.
  • Seeker uses HTML API and gets Location Permission and then grabs Longitude and Latitude using GPS Hardware which is present in the device, so Seeker works best with Smartphones, if the GPS Hardware is not present, such as on a Laptop, Seeker fallbacks to IP Geolocation or it will look for Cached Coordinates.
  • Generally if a user accepts location permsission, Accuracy of the information recieved is accurate to approximately 30 meters, Accuracy Depends on the Device.

Note : On iPhone due to some reason location accuracy is approximately 65 meters.

Tested On :

  • Kali Linux 2019.2
  • BlackArch Linux
  • Ubuntu 19.04
  • Kali Nethunter
  • Termux
  • Parrot OS

Kali Linux / Ubuntu / Parrot OS

git clone https://github.com/thewhiteh4t/seeker.git
cd seeker/
chmod 777 install.sh
./install.sh

BlackArch Linux

pacman -S seeker

Docker

# Install docker

curl -fsSL https://get.docker.com -o get-docker.sh
sh get-docker.sh

# Build Seeker

cd seeker/
docker build -t seeker .

# Launch seeker

docker run -t --rm seeker

# OR Pull from DockerHub

docker pull thewhiteh4t/seeker
docker run -t seeker

Termux

git clone https://github.com/thewhiteh4t/seeker.git
cd seeker/
chmod 777 termux_install.sh
./termux_install.sh

Usage

python3 seeker.py -h

usage: seeker.py [-h] [-s SUBDOMAIN]

optional arguments:
  -h, --help                              show this help message and exit
  -s SUBDOMAIN, --subdomain Subdomain  Provide Subdomain for Serveo URL ( Optional )

# Example

python3 seeker.py --subdomain google

Known Problems

  • Services like Serveo and Ngrok are banned in some countries such as Russia etc., so if it’s banned in your country you may not get a URL, if not then first READ CLOSED ISSUES, if your problem is not listed, create a new issue.

Comments

Popular posts from this blog

HACK GMAIL ACCOUNT PASSWORD USING TERMUX LATEST 2020

HACK GMAIL ACCOUNT PASSWORD  Open Termux $ pkg update $ pkg upgrade $ pkg install python $ pkg install python2 $ pkg install git $ git clone  https://github.com/ALKR-HACKHECKZ/alkrmail.git $ ls $ cd alkrmail $ ls $ python alkrmail.py An Inter Face will open as "amailhack' Enter 1 For Starting Attack Enter The password File I Have Added My File Pass.txt  You Can Add Your File...Or you Can Add mine Wait For The Right Password  Enjoy🤩 Youtube Video Tutorial : https://youtu.be/N90zM_pB0co

HOW TO HACK INSTAGRAM USING TERMUX LATEST 2020 WOKING TRICK

HACK INSTAGRAM BRUTEFORCE  WOKING TRICK Steps: Termux App link :  https://play.google.com/store/apps/details?id=com.termux&hl=en Open termux: $ pkg upgrade $ pkg update $ pkg install python $ pkg install python3 $ pkg install git $ git clone  https://github.com/ALKR-HACKHECKZ/alkrinsta.git $ ls $ cd alkrinsta  $ ls $ pkg install pip $ pip install requests $ pip install bs4 You can either create a password list using cupp or you can download other password lists. To make Password list using Cupp Follow steps Below $ python3 cupp.py $ python3 cupp.py -i 🤔Give the Needed Information Of Victim and create the password list  🧐To run the created password list you have to rename the file to "pass.txt" $ mv filename.txt pass.txt     {filename.txt= your created password list you can see your password list name by  ls command } $ cat pass.txt $ pyth...

How to hack screelock pin/password using termux

HACK PHONE LOCK PIN/PASSWORD COMMANDS apt update apt upgrade pkg install git git clone  https://github.com/ALKR-HACKHECKZ/lockphish.git cd ls chmod +x * [ TURN ON HOTSPOT ] cd lockphish Pkg install bash bash lockphish.sh Copy link send it to victim Get the ip adress of victim Get the screelock password Get the Device Information Done Enjoy🤩🤩 Youtube Video Tutorial :   https://youtu.be/5U_GFIqtwuI