magnifying-glass-locationFinding Someone's Location with Seeker

πŸ“ How to Use Seeker to Get Location via Social Engineering (Educational Purpose)

⚠️ Disclaimer:

This guide is for ethical hacking and cybersecurity learning only. Always obtain permission from targets. Misuse may result in legal consequences.


πŸ› οΈ What is Seeker?

Seeker is an open-source tool developed by TheWhiteH4t that can generate a fake web page to socially engineer and capture the victim’s location using their device’s geolocation feature.


🧰 Requirements

  • Linux OS (Kali Linux or Ubuntu preferred)

  • Python 3

  • Git

  • Ngrok (for hosting externally)


πŸͺœ Step-by-Step Guide

πŸ”Ή 1. Install Seeker

Open your terminal and run:

πŸ”Ή 2. Run Seeker

Make sure Python 3 is installed, then run:


🌐 Setting Up External Access with Ngrok

πŸ”Ή 3. Download Ngrok

Open a browser and visit https://ngrok.comarrow-up-right. Sign in or register, then:

  • Copy the download link for Linux.

  • In the terminal, run:

πŸ”Ή 4. Authenticate Ngrok

Get your auth token from your Ngrok dashboard and run:


🎯 Create a Phishing Page

You can use custom templates in Seeker.

  • Seeker will ask for a YouTube video link (for disguise).

  • Paste the link when prompted.

  • Provide a site name and title (e.g., β€œWatch Now”, β€œTrending Video”).

  • Optionally, add an image URL and description.


🌍 Expose Localhost to the Internet

In a new terminal window:

Ngrok will generate a public forwarding link. This is the URL you will share with your "victim" (legally and ethically!).


Options:


πŸ“Œ Capture Location Data

Once the target opens the link and gives browser permission:

  • Seeker logs their latitude, longitude, device info, and ISP details

  • A clickable Google Maps link will be available


πŸ“Œ Note for Cybersecurity Students

This is a classic social engineering attack using a fake landing page. It’s commonly used in red teaming and penetration testing assessments to test user awareness.


πŸŽ“ Educational Use Only

Do NOT use Seeker for:

  • Stalking

  • Unauthorized tracking

  • Spying

Use it in legal penetration tests, CTFs, and lab environments only.

Last updated