The most important topic to discuss for them who lost their cellphone and searching the web for the solution to track the phone.
Second, if someone bullying you then it’s become very very important to track him down.
Rex, one of my friends, one day got a call from an unknown number a man spoke to him with very bad language.
He tried to track the phone number but he failed because the service providers do not allow us to do that.
If they don’t, then How can we track a cell phone with our own? This question often comes to our mind when we go to track someone down.
But we forget one thing, i.e. nowadays every single person uses the internet on their mobile. We can track them through the Internet.
Here, we are going to discuss the way using which we can track any cell phone easily using a simple tool and a little social engineering trick. All you need is Kali Linux Installed in your system and an active Internet connection.The tool we’re gonna use here is called Trape. Before beginning the tutorial let’s know a little about it.
A Little About Trape Tool
Trape is a Github script written in python. Using Trape we can generate a tracking URL for the victim. If the victim enters the URL, we will get the IP logs in Trape’s control panel.
Also, we can check the login sessions of the browsers that the victim used. The tool recognizes facebook, Twitter, VK, Reddit, Gmail, Github, etc. popular sessions.
Let’s get to the tutorial.
Configure Trape in Kali Linux
Step 1: Install The requirements
Here, you will see a text file named requirements.txt. This file is needed to install some necessary packages and library files to run Trape properly.
Now proceed to install the requirements, run the file by the command-
pip install -r requirements.txt
This command will install all the necessary packages and subfolders automatically. But it’s not a thing to worry about. Trape will install the requirements on its own but this step will help to speed up the installation process.
Step 2: Load The Tool in The terminal
Now, run the command python trape.py -h to see how to use the tool.
Here it shows the command python trape.py -u <<Url>> -p <<Ports>>. We can use this command to run the tool.
Now let us demonstrate how we can use the tool.
In the command, we are using the URL https://google.com and the Port 8080 as an example. So our command will look like-
python trape.py -u https://google.com -p 8080
(Note: You can take any URL and a Port number you want to use in the command. If you take https://facebook.com in the URL, the browser hooking phishing page will look like the Facebook login page.)
Now type the command and hit enter. The tool will be loaded successfully.
Here our Trape tool is running. Here we got two links and one access key. The first link is to trape the victim, the second is the control panel link and the access key is to access the control panel.
Step 3: Resolve the problems with the IP address
But there is a solution. Shorten the link using Bitly URL shortener.
Ahha! now, all okay. Send the shortened link to the victim and wait for the victim to fall in the trape.
Access localhost over WAN Using Ngrok
Step 4: Login To The Control Panel And Manage the Trapped
Now, copy the control panel link and paste & search in a browser.
And copy the access key from the terminal and paste it to the login page. You will be logged in to the Control Panel Dashboard. Here you can manage the trapped victims.
If someone clicks the link you will get his log in the Dashboard. To test the tool we opened it on another computer and we got the IP log.
Now, look at what you can collect from the trapped IP addresses. Click on ‘DETAILS‘ at the right. You will get the real-time location and the logged-in sessions in the browser.
But the location depends on GPS. If the GPS of the victim is turned on, you will get a real-time location. Also, you will get the details of the device, about the CPU, Operating System, Browser, ISP Name. These details are enough to track someone down.
If the sessions are active then the OFFLINE will become ONLINE. If it comes online click on the session icon to see and use it.
One thing to note down. You can use the trapping link on many people.
Playing with someone’s feelings is not a good thing but that’s what cyberbullies do. It’s not nice mainly for a teenager.
If you liked the tutorial let us know and if you have any problem with the installation or use of this tool feel free to comment us below describing your problem. Stay safe and have a joyful hacking journey.
|Haven't found the solution or are you having an unknown error? Join HackTalkForum.com to start a discussion or join a discussion on it.|