• We just launched and are currently in beta. Join us as we build and grow the community.

Seeker – A Geolocation Stealer with High Accuracy

madman333

Brute Force Master
M Rep
0
0
0
Rep
0
M Vouches
0
0
0
Vouches
0
Posts
83
Likes
76
Bits
2 MONTHS
2 2 MONTHS OF SERVICE
LEVEL 1 300 XP
Red-and-White-Modern-Corporate-Sports-Youtube-Outro-1.png.webp


Hey Folks, in this tutorial we are going to discuss on an interesting tool called “seeker” through which we can get exact location and more thing about the target. Concept behind Seeker is simple, just like we host phishing pages to get credentials why not host a fake page that requests your location like many popular location based websites. Seeker Hosts a fake website on In Built PHP Server and uses Serveo to generate a link which we will forward to the target, website asks for Location Permission and if the target allows it, we can get :

  • Longitude
  • Latitude
  • Accuracy
  • Altitude – Not always available
  • Direction – Only available if user is moving
  • Speed – Only available if user is moving

Let’s take a look 🙂 !!

Installation

Simply download the tool using the git command and then go to the directory. After all, execute the bash command to setup it completely.

git clone https://github.com/thewhiteh4t/seeker.git
cd seeker/
chmod 777 install.sh
bash install.sh1234git clone
https://github.com/thewhiteh4t/seeker.gitcd seeker/chmod777install.shbash install.sh

1-22.png

Error

Done 🙂 !! make sure you must have python3 tools pre-installed on your system to boot this tool. OPPS 🙁 !! We got an error so we have to use an alternative method to use this tool.

python3 seeker.py1python3 seeker.py

2-21.png

Ngrok Setup

To solve this error we have to setup ngrok service. Now firstly we will go to ngrok’s web page, create an account and download ngrok service. After downloading is done then we will unzip the file and start the ngrok service by using the following command.

cd < location of downloaded file >
unzip ngrok-stable-linux-amd64.zip
./ngrok http 80801234
https://ngrok.comcd<location of downloaded file>unzip ngrok-stable-linux-amd64.zip./ngrok http8080

3-22.png


As you see the ngrok service is finally running in our localhost machine. The highlighted URL will be used to send the victim.

4-20.png


Done 🙂 !! All things are ready now we need to create a phishing template to get sensitive information of the victim. We will execute the following command to select any phishing template.

python3 seeker.py -t manual1python3 seeker.py-tmanual

5-17.png


After selecting the template you need to enter the details according to you.

6-19.png


Move 🙂 !! Now we will go back to the ngrok terminal and copy the highlighted URL to send to the victim.

7-15.png


As soon as the victim opens the attacker’s link, the interface of the phishing template will look like the image below.

8-14.png.webp


After clicking on the “view in telegram” button the error will show on the browser but in reality the victim will allow an attacker to grab their exact location and device details.

9-12.png


BOOM 🙂 !! As you can see that after clicking the button all the sensitive details of the victim have come to us.

10-10.png


Even this gives us the link from which we can see the exact location of the victim without using any longitude, latitude. Great 🙂 !!

11-7.png.webp


Similarly, you can cheat the victim by sending such fake phishing page and get more information about him.

12-6.png
About the AuthorShubham Goyal Certified Ethical Hacker, information security analyst, penetration tester and researcher. Can be Contact on Linkedin.
 

439,009

316,008

316,017

Top