Your AI powered learning assistant

Track Phone & Computers on The Internet 🌎

intro

00:00:00

Finding the exact location of a phone or computer is achievable using specific tools, though many fail frequently. The process isn't overly complex and can be mastered step by step. By learning these techniques, one gains skills that extend beyond just locating devices.

Where have I been?

00:00:36

The recent lack of content is due to being occupied with releasing new hacking hardware, a masterclass on hacking, and live hacking sessions on Discord. Followers are encouraged to stay updated via social media for the latest activities at Z Security.

Thanks to Linode :)

00:01:12

Linode, a user-friendly cloud provider, offers new users $100 in free credit through the provided links. This credit enables hosting web applications, storing files online, or running continuous internet-connected machines. Examples include setting up personal VPNs and utilizing powerful GPUs for tasks like rapid WPA cracking.

Creating HTML page.

00:02:05

Creating and Modifying an HTML Page The process begins by downloading a website or creating content, such as a meme, tailored to the target's interests. To download a site like Z Security for modification, save it as "complete" in your directory and edit its HTML file using any text editor. Alternatively, embed desired content (e.g., memes) into an HTML file with proper extensions (.html). Testing ensures that the page displays correctly on local devices before proceeding.

Hosting Content Online for Accessibility To make the created webpage accessible via URL, upload it to cloud hosting services like 000webhost.com. This free service allows you to host files online without needing personal servers unless advanced customization is required. Once uploaded successfully through their File Manager tool, anyone connected online can access this hosted page containing either modified websites or embedded media.

Adding tracking code.

00:05:20

Implementing GPS Location Tracking in HTML To track a target's location, JavaScript code from W3Schools is utilized. The process involves copying the provided script and embedding it into an existing locate.html file within the body tag for visibility. Adjustments are made to remove user interaction requirements by replacing onClick with onLoad, ensuring automatic execution of the getLocation function upon page load. This function retrieves GPS coordinates directly if available on devices like phones or laptops equipped with GPS.

Displaying Coordinates Automatically Upon Page Load The modified HTML displays latitude and longitude at the bottom of a webpage as soon as it's loaded without requiring any button clicks. By leveraging device capabilities such as built-in GPS systems common in modern smartphones and many laptops, accurate geolocation data can be obtained seamlessly when users access this page.

Storing GPS location.

00:09:22

Hiding and Sending GPS Coordinates The process involves modifying a webpage to send user GPS coordinates secretly to the hacker's server instead of displaying them. Using JavaScript, data is sent via GET requests by editing functions in locate.html. The latitude and longitude values are captured from the user's device using navigator.geolocation, then passed as variables into a URL targeting store.php.

Creating PHP File for Data Storage A new file named store.php is created on the webserver to handle incoming location data. This script uses PHP methods like fopen() and fwrite() to write received latitude and longitude values into a text file called location.txt. Variables holding these coordinates are extracted from GET request arguments (lat & long) sent by locate.html.

Writing Location Data with Concatenation In store.php, concatenation techniques combine static text labels ('Latitude:', 'Longitude:') with dynamic coordinate values before writing them into location.txt. A newline character ensures each entry appears neatly formatted within this log file for easier readability later.

'Testing Functionality of Tracking System' 'After implementing changes,' refreshing locate.html confirms that it no longer displays visible coordinates but sends them directly through HTTP requests.' Opening generated files verifies successful storage of target locations.'

Plotting GPS coordinates on map.

00:20:38

To accurately map a target's location, input latitude and longitude coordinates into Google Maps. Copy the values from your source, paste them into the tool to pinpoint an exact address—unlike approximate IP-based locations. This method works seamlessly on mobile devices but requires user consent for sharing their location via prompts on websites or apps designed to request such data.

Finding the target's IP.

00:22:23

If a target denies sharing GPS coordinates, their IP address can still be obtained and used to approximate their location. By utilizing PHP code from W3Schools, the server's remote address is accessed and stored alongside latitude and longitude values in a file. This data allows retrieval of an approximate location by converting the IP into geographical information using online tools like "IP Lookup." The approximation provides nearby latitude and longitude details even without direct GPS access.

Finding the target's OS.

00:25:00

Extracting Target's Operating System via User Agent The operating system of a target computer can be identified using the user agent, which browsers send when loading websites. By editing locate.html and adding JavaScript code to capture navigator.useragent, this information is sent as part of a GET request to store.php. The data is then stored in location.txt for analysis, revealing details like Windows NT or iPhone OS versions.

Enhancing Believability and Delivery Methods for Phishing Links To make phishing links more convincing, purchasing a domain name allows linking it directly to web hosting services. URL manipulation techniques further enhance credibility by making URLs appear legitimate; these methods are easily accessible online. Additionally, spoofed emails or SMS messages can deliver such links effectively while appearing trustworthy.