Seeker Accurately Locate Smartphones using Social Engineering
>> YOUR LINK HERE: ___ http://youtube.com/watch?v=MSoVm-413xo
Interested in game hacking or other InfoSec topics? โ https://guidedhacking.com/ • Accurately Locate Smartphones using Social Engineering using Seeker I will be showing you how to set up Seeker and locate smartphones using it outside the network. Seeker is almost the grabify alternative! • --- Download Steps -- • 1.git clone https://github.com/thewhiteh4t/seeker... • 2.cd seeker/ • 3.apt update • 4.apt install python3 python3-pip php • 5.pip3 install requests • The concept behind Seeker is simple, just like we host phishing pages to get credentials why not host a fake page that requests your location like many popular location-based websites. Read more on thewhiteh4t's Blog. Seeker Hosts a fake website that asks for Location Permission and if the target allows it, we can get : • Longitude • -Latitude • -Accuracy • -Altitude - Not always available • -Direction - Only available if user is moving • -Speed - Only available if user is moving • -Along with Location Information we also get Device Information without any permissions : • Unique ID using Canvas Fingerprinting • Device Model - Not always available • Operating System • Platform • Number of CPU Cores - Approximate Results • Amount of RAM - Approximate Results • Screen Resolution • GPU information • Browser Name and Version • Public IP Address • Local IP Address • Local Port • Automatic IP Address Reconnaissance is performed after the above information is received. • This tool is a Proof of Concept and is for Educational Purposes Only, Seeker shows what data a malicious website can gather about you and your devices and why you should not click on random links and allow critical permissions such as location, etc. • #Tracking #SocialEngineering #Seeker • Enjoying my content? It would be appreciated if you drop a like ๐ , Subscribe โค๏ธ , and sharing my content is a plus ๐ค. • Worried about missing any new content? make sure to turn on the notifications, by pressing the bell icon ๐. • โญ Digital Ocean 100$ Free Credit โญ : https://bit.ly/3kdSW07โโ • ๐ข Join Fiverr Now and get Upto 100$ FREE๐ข: https://bit.ly/3c7Zx9Iโโโ • ๐ธ Feel Free To Donate ๐ธ : https://bit.ly/2FF7fw2โโโ • ๐ Join My Discord Server ๐ : / discord • ๐ต Follow Me on Twitter ๐ต: / exploitedsystemโโโ • ๐ด Follow Me on Instagram ๐ด : / systemexploitedโโโ • ๐ฑ Linkedin: https://bit.ly/2AH3HqDโโโ ๐ฑ • ๐ฅ About Me ๐ฅ • My name is Hussein Muhaisen, since 7 years old, I found interest in playing video games, since then every time I play a video game I wondered how these things are built and made? that interest turned into an obsession in learning how computer systems work, how to test them, break them and fix them! Right now I am following my passion doing what I love, improving, and learning as I move on. I Also love making content ( videos, articles) it really helps with learning new things, I try to document my journey by making content, it motivates me when I look back and see improvements I made through my journey. Lastly, I always love giving back, I follow one rule which I created ” give to be given” simple as it sounds • โ ๏ธโ ๏ธโ ๏ธ All The Content/Videos in My Channel are Made for Educational Purposes only I am Not Responsible for Any Damage Caused. โ ๏ธโ ๏ธโ ๏ธ • Disclaimer: • This Video is for informational and educational purposes only. I believe that ethical hacking, information security, and cybersecurity • should be familiar subjects to anyone using digital information and computers. I believe that it is impossible to defend yourself • from hackers without knowing how hacking is done. This video is only for those who are interested to learn about ethical hacking, Security, • , Penetration Testing, and Other Cyber security-related resources. Please regard the word hacking as ethical hacking or penetration testing every time this • word is used. I do not promote, encourage, support, or excite any illegal activity or hacking without written permission in general. If you plan to use the information for illegal purposes, please leave this video now. I cannot be held responsible for any misuse of the given information. • Compliance with YouTube policy • According to the YouTube Community Policy • We do not urge people to use this software • We advise against using this bad software • We waive any responsibility for misconduct or use of these beta videos • ๐ Timestamps click them to jump into the topic. ๐ • 0:00 - Introduction • 1:34 - Installation • 3:34 - Basic Seeker Commands • 4:20 - Running Seeker and NGROK • 5:12 - Capturing User data • 7:00 - Testing with different templates • 7:55 - Talking about Grabify • 8:25 - Ending
#############################
