-->

Thursday, 5 December 2019

How to track peoples device using trape


How to track peoples device using trape



So, Today in this blog i will going to show you How to track peoples device using trap then you can attack it from your kali linux operating system and through the termux application of your Android phone. This method is used by me and i will do this attack on my personal device  so, i will not harm anyone.so, first of all we know what is kali linux and github ? what is trape in hacking ? Requirements ? Installing and Run ?
Kali linux hacking tool



What is Kali linux ?

Kali Linux is a Debian-derived Linux distribution designed for digital forensics and penetration testing. It is maintained and funded by Offensive Security Ltd.

Kali Linux has over 600[14] preinstalled penetration-testing programs, including Armitage (a graphical cyber attack management tool), Nmap (a port scanner), Wireshark (a packet analyzer), John the Ripper password cracker, Aircrack-ng (a software suite for penetration-testing wireless LANs), Burp suite and OWASP ZAP web application security scanners.[15][16] Kali Linux can run natively when installed on a computer's hard disk, can be booted from a live CD or live USB, or it can run within a virtual machine. It is a supported platform of the Metasploit Project's Metasploit Framework, a tool for developing and executing security exploits.



What is github ?

GitHub is an American company that provides hosting for software development version control using Git. It is a subsidiary of Microsoft, which acquired the company in 2018 for $7.5 billion. It offers all of the distributed version control and source code management (SCM) functionality of Git as well as adding its own features. It provides access control and several collaboration features such as bug tracking, feature requests, task management, and wikis for every project.Trap peoples

GitHub offers plans for free, professional, and enterprise accounts. Free GitHub accounts are commonly used to host open source projects. As of January 2019, GitHub offers unlimited private repositories to all plans, including free accounts. As of May 2019, GitHub reports having over 37 million users and more than 100 million repositories[10] (including at least 28 million public hacking tutorials repositories), making it the largest host of source code in the world.


 what is Trape in Hacking ?



Trape is an OSINT analysis and research tool, which allows people to track and execute intelligent social engineering attacks in real time. It was created with the aim of teaching the world how large Internet companies could obtain confidential information such as the status of sessions of their websites or services and control their users through their browser, without their knowlege, but It evolves with the aim of helping government organizations, companies and researchers to track the cybercriminals. How to track peoples device using trape




SEE ALSO :


 1.  Brute Force Attack on Instagram 

 2.  The Linux Choice Saycheese [ Hack Android Camera ] 

 3.  Sender Policy Framework [ SPF ]

 4.  Bypass Facebook Profile Security Guard

 5.  Kali Undercover Mode setup in kali linux 2019.4

 6.  Trape peoples Device





Requirements

Before executing to script, we first have to install some specific requirements.
To install them, simply type :

pip install -r requirements.txt

If you don't have the requirements, then it will automatically get the requirements, and if you already have them installed like me, then there is nothing to worry about.





Install and Run

 step 1 :-  git clone https://github.com/jofpin/trape.git




  • ls




  • cd trape







Step 2 :- Installing the requirements


Before executing to script, we first have to install some specific requirements.
To install them, simply type :

  • pip install -r requirements.txt

If you don't have the requirements, then it will automatically get the requirements, and if you already have them installed like me, then there is nothing to worry about.












Step 3 :-

Unlike the other scripts like Metasploit, Trape is controllable on the web.
(It's beginner friendly!)
But first, execute the script.
You can execute the script by :

  • python trape.py -u URL -p PORT

Don't type it exact as mine.
In the URL, you have to put the url that you want to clone.
(So if I put https://www.google.com int the URL,then the phishing web will look like Google Homepage)
In the PORT, put your port.
I did it like this.






Step 4 :- setup a Ngrok token






 NGROK TOKEN


In the next section you must enter your Ngrok token, if you do not have
one register at (https://ngrok.com), this data is necessary for the generation of public network tunnels



Put the Ngrok Token and Hit Enter.






Step 5 :- GOOGLE API



You must register with the Google Console, and get an API for maps and another for shortening.
By having these data you complete the settings





Step 6 :- Login in google console and get a Google Map API key https://console.cloud.google.com/apis/credentials







Step 7 :- Enter your google shortener API key, lets visit this link and get a google shortener API key https://developers.google.com/url-shortener/v1/getting_started
















Step 8 :- Enter your Ip geolocation API key, lets visit this link and get a IP geolocation API key https://app.ipgeolocation.io/














Step 8 :- python trape.py -u www.google.com -p 8080 and click hit ente.







it will show 3 things

The link to lure the victims, The control panel link, and the access key to it.

If you think that the victims will think suspicious, then you can shorten the link using bit.ly, ad.fly, all those things.

Now, copy and paste the Control Panel link on the web.






    LOCAL INFORMATION
    -------------------
    >-=[ Link for the users: http://192.168.42.199:8080/www.google.com
    >-=[ Your REST API path: http://192.168.42.199:8080/3a8c1bc3471c.js
    >-=[ Control Panel Link: http://127.0.0.1:8080/69dae1c
    >-=[ Your Access key: 706957988271371afd9c50f3








Control Panel Link: http://127.0.0.1:8080/69dae1c




And put the access key it gave you in the terminal.
Let me just copy and paste that.








And send the link to the victim.
Takes a bit of social engineering, I sent it to my brother
Link for the users: http://192.168.42.199:8080/www.google.com
and then,

Got him!
You could have just sent a real meme site to make it look real, but I just said that I trolled him.
And haha his profile pic is the skeleton from TrackURL(We have the same icloud account so....)
He went in, so we can see everything.
















I have changed my location because for some privacy reason
In the Attacks Hook button next to the Information, you can download files and send messages and do stuff!


If you want to hack the victim's device perfectly, you can make a website and make the victim redirect to your website, you can just let the victim download a payload made by Metasploit and take control completely!(There is a button for these)

Sorry, I can't show you those because I forgot to take snaps of those attacks (and I am lazy)
Did It Work?

Please comment down below for where to improve, and some suggestions to what I can do next!
If you need help, comment, I will try my best to help you!


Disclaimer


All video’s and tutorials are for informational and educational purposes only. We believe that ethical hacking, information security and cyber security should be familiar subjects to anyone using digital information and computers. We believe that it is impossible to defend yourself from hackers without knowing how hacking is done. The tutorials and videos provided on www.hackingtruth.in is only for those who are interested to learn about Ethical Hacking, Security, Penetration Testing and malware analysis. Hacking tutorials is against misuse of the information and we strongly suggest against it. Please regard the word hacking as ethical hacking or penetration testing every time this word is used. how to install shellphish in termux


All tutorials and videos have been made using our own routers, servers, websites and other resources, they do not contain any illegal activity. We do not promote, encourage, support or excite any illegal activity or hacking without written permission in general. We want to raise security awareness and inform our readers on how to prevent themselves from being a victim of hackers. If you plan to use the information for illegal purposes, please leave this website now. We cannot be held responsible for any misuse of the given information.


- Hacking Truth by Kumar Atul Jaiswal



 

Video Tutorial :- 




        



My Self Kumar Atul Jaiswal Urf HackerboY and Kumar Atul Jaiswal is a name among millions who struggled failed and surged ahead in search of how to become a Hacker ( passionate about Hacking just like profession an entrepreneur ), just like any middle class guy, he too had a bunch of unclear dreams and a blurred version of his goals in life 😊.

4 comments:

  1. sir i cant access in trape tool . because when it asks for google url shortener after that it is also asks for what is your ip info api key . please sir help me

    ReplyDelete
    Replies
    1. I think we have already talked about this topic on facebook and youtube commanet section so i will try my best to solve your problem...

      Thank you so much 💖

      Delete
  2. Hello

    I dont know what i am doing wrong , trape not detecting lure users when accesing link

    ReplyDelete
  3. Hey am getting an error smtg like

    __init()__ error version

    Whenever I try to run python trape.py -u -p

    ReplyDelete

Contact

Send Us A Email

Search This Blog

Address

Contact Info

The page name itself is a call-to-action; Treat it with some respect.!

Address:

15, Ranchi, India, 834002

Phone:

404

Email:

kumaratuljaiswal222@gmail.com

atulthehacker222@gmail.com