Seeker is simple, just like we host phishing pages to get credentials why not host a fake page that requests your location like many popular location based websites.
It Hosts a fake website on In Built PHP Server and uses Serveo to generate a link which we will forward to the target, website asks for Location Permission and if the target allows it, we can get :
Along with Location Information we also get Device Information without any permissions :
This tool is a Proof of Concept and is for Educational Purposes Only, it shows what data a malicious website can gather about you and your devices and why you should not click on random links and allow critical permissions such as Location etc.
Also Read – Brave Browser – Secure, Fast & Private Web Browser with Adblocker
How is this Different from IP GeoLocation?
Note : On iPhone due to some reason location accuracy is approximately 65 meters.
Tested On :
Installation
Kali Linux / Ubuntu / Parrot OS
git clone https://github.com/thewhiteh4t/seeker.git
cd seeker/
chmod 777 install.sh
./install.sh
BlackArch Linux
pacman -S seeker
Docker
# Install docker
curl -fsSL https://get.docker.com -o get-docker.sh sh get-docker.sh
# Build Seeker
cd seeker/ docker build -t seeker .
# Launch seeker
docker run -t –rm seeker
# OR Pull from DockerHub
docker pull thewhiteh4t/seeker
docker run -t seeker
Termux
git clone https://github.com/thewhiteh4t/seeker.git
cd seeker/
chmod 777 termux_install.sh
./termux_install.sh
Usage
python3 seeker.py -h
usage: seeker.py [-h] [-s SUBDOMAIN]
optional arguments:
-h, –help show this help message and exit
-s SUBDOMAIN, –subdomain Subdomain Provide Subdomain for Serveo URL ( Optional )
-k KML, –kml KML Provide KML Filename ( Optional )
-t TUNNEL, –tunnel TUNNEL Specify Tunnel Mode [manual]
#Example
#SERVEO
##########
python3 seeker.py
#NGROK ETC.
#############
>> In First Terminal Start seeker in Manual mode like this
python3 seeker.py -t manual
>>In Second Terminal Start Ngrok or any other tunnel service on port 8080
./ngrok http 8080
————————————————–
#Subdomain
#############
python3 seeker.py –subdomain google
python3 seeker.py –tunnel manual –subdomain zomato
Known Problems
Demo
shadow-rs is a Windows kernel rootkit written in Rust, demonstrating advanced techniques for kernel manipulation…
Extract and execute a PE embedded within a PNG file using an LNK file. The…
Embark on the journey of becoming a certified Red Team professional with our definitive guide.…
This repository contains proof of concept exploits for CVE-2024-5836 and CVE-2024-6778, which are vulnerabilities within…
This took me like 4 days (+2 days for an update), but I got it…
MaLDAPtive is a framework for LDAP SearchFilter parsing, obfuscation, deobfuscation and detection. Its foundation is…