Available In: Thewhiteh4t's Blog
Available In: Thewhiteh4t's Blog
Available in
Concept behind Seeker is simple, just like we host phishing pages to get credentials
why not host a fake page that requests your location like many popular location
based websites. Read more on thewhiteh4t's Blog .Seeker Hosts a fake website
which asks for Location Permission and if the target allows it, we can get :
Longitude
Latitude
Accuracy
Altitude - Not always available
Direction - Only available if user is moving
Speed - Only available if user is moving
This tool is a Proof of Concept and is for Educational Purposes Only, Seeker
shows what data a malicious website can gather about you and your devices
and why you should not click on random links and allow critical permissions
such as Location etc.
Templates
Available Templates :
NearYou
Google Drive (Suggested by @Akaal_no_one)
WhatsApp (Suggested by @Dazmed707)
Telegram
Zoom (Made by @a7maadf)
Tested On :
Kali Linux
BlackArch Linux
Ubuntu
Kali Nethunter
Termux
Parrot OS
OSX - Monterey v.12.0.1
Installation
BlackArch Linux
sudo pacman -S seeker
Docker
docker pull thewhiteh4t/seeker
OSX
git clone https://github.com/thewhiteh4t/seeker.py
cd seeker/
python3 seeker.py
In order to run in tunnel mode, install ngrok by running this command in the
terminal:
Usage
python3 seeker.py -h
options:
-h, --help show this help message and exit
-k KML, --kml KML KML filename
-p PORT, --port PORT Web server port [ Default : 8080 ]
-u, --update Check for updates
-v, --version Prints version
##################
# Usage Examples #
##################
###########
# Options #
###########
# Step 1
$ docker network create ngroknet
# Step 2
$ docker run --rm -it --net ngroknet --name seeker thewhiteh4t/seeker
# Step 3
$ docker run --rm -it --net ngroknet --name ngrok wernight/ngrok ngrok http
seeker:8080
Local Tunnels
Use