Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated:
1
00:00:12,100 --> 00:00:16,780
Hi and welcome back to another episode of How to Hack, and they were discussing about how we could
2
00:00:16,780 --> 00:00:23,560
actually get the geolocation device information of an Android device by using social engineering attack
3
00:00:23,560 --> 00:00:24,850
as well as technical attack.
4
00:00:25,240 --> 00:00:30,250
And of course, in today's case, we'll be using a wonderful tool that can actually help us fake the
5
00:00:30,250 --> 00:00:33,030
Google Drive access and to file sharing.
6
00:00:33,160 --> 00:00:37,780
And once the user gets social engineer, they would actually click and allow access.
7
00:00:37,780 --> 00:00:43,450
And once they click on allow access immediately, we'll be able to gain a lot of critical information,
8
00:00:43,450 --> 00:00:45,710
including the geolocation of the Android device.
9
00:00:46,240 --> 00:00:49,530
So without further ado, let us get started on today's tutorial.
10
00:00:49,870 --> 00:00:54,760
So unless I was going to actually have clinics running and on the right side of screen, I have a Android
11
00:00:54,760 --> 00:00:56,520
mirroring into the desktop.
12
00:00:56,530 --> 00:00:58,420
So this is a live Android device.
13
00:00:58,990 --> 00:01:03,550
So the past couple of tutorials, I was using a virtual Android device and it was a lot of questions
14
00:01:03,550 --> 00:01:08,280
about the IP address being one that is provided by the Internet service provider.
15
00:01:08,290 --> 00:01:10,490
So in this case, we are using mobile data.
16
00:01:10,870 --> 00:01:15,940
So over here you can actually see that we have the mobile data are being selected instead of Wi-Fi,
17
00:01:16,450 --> 00:01:20,920
because if you're using Wi-Fi and of course the Internet service provider IP address will be the one
18
00:01:20,920 --> 00:01:21,400
in use.
19
00:01:22,210 --> 00:01:24,430
So the first thing you can do is open up terminal.
20
00:01:24,430 --> 00:01:29,830
And of course, we can zoom in a little on colonics and we can enter IAFF config to see the internal
21
00:01:29,860 --> 00:01:30,730
IP address.
22
00:01:31,360 --> 00:01:35,920
And of course, in this case, the internal IP address is one or two one six eight one one four.
23
00:01:36,370 --> 00:01:40,810
And of course, once you have the internal IP address, we can actually go into the home page where
24
00:01:40,810 --> 00:01:45,890
I'll have downloaded Sikka so I can go to KDDI Seeker and we can enter that shell.
25
00:01:46,360 --> 00:01:49,930
So over here we can actually see all the information regarding Seka.
26
00:01:49,960 --> 00:01:53,890
So of course, there was a couple of things that we wanted to try.
27
00:01:53,900 --> 00:01:59,790
So you could put slash, for example, DCPI running on Wighton, go ahead and hit enter on that.
28
00:01:59,800 --> 00:02:03,160
And of course, is checking for updates, checking on these serve your status.
29
00:02:03,490 --> 00:02:06,100
And of course, in this case, the service status is down.
30
00:02:06,550 --> 00:02:11,020
So in order for us to get this working, we have to select the manual option.
31
00:02:11,030 --> 00:02:19,840
So by entering dogge secret python and followed by Dashty and followed by a manual followed by Dash
32
00:02:19,900 --> 00:02:25,030
K, followed by Tarsa Kemel, and you can hit, enter and add immediately.
33
00:02:25,240 --> 00:02:27,930
And once you have hit that enter, you will check for updates.
34
00:02:28,270 --> 00:02:33,760
But in this case you will manually run your Anji Rock service, which is why we've been using a lot
35
00:02:33,760 --> 00:02:38,380
of engie rock and we have even started Engie Rock to target for you so that you can understand how Engy
36
00:02:38,380 --> 00:02:39,100
Rock works.
37
00:02:39,730 --> 00:02:44,890
So of course we will actually select number two on Google Drive and of course we can actually enter
38
00:02:44,890 --> 00:02:45,280
the file.
39
00:02:45,280 --> 00:02:45,490
Your.
40
00:02:45,490 --> 00:02:49,810
Oh, I'm just going to do you want to treat four, five, six hit enter on debt and of course it will
41
00:02:49,810 --> 00:02:55,950
start up the server so I can actually go ahead and open up another terminal for us to start Engy Rock.
42
00:02:55,990 --> 00:03:00,970
So remember to look out for the energy rock tutorial that has been uploaded I think just a couple of
43
00:03:00,970 --> 00:03:01,660
days back.
44
00:03:01,660 --> 00:03:06,490
So those will be very, very helpful information for you to understand about how Anjou Rock works,
45
00:03:06,490 --> 00:03:07,600
tunneling and so on.
46
00:03:08,350 --> 00:03:14,850
So moving forward, are we going to do is enter go into the homepage where we have engy rock enter slash
47
00:03:14,920 --> 00:03:16,870
energy rock followed by the port.
48
00:03:17,290 --> 00:03:21,250
All the call of TDP followed by Port eight zero eight zero hit.
49
00:03:21,250 --> 00:03:24,610
Enter on that and we'll get the information regarding the domain name.
50
00:03:25,120 --> 00:03:29,530
So of course here we have the domain name and of course we can go into our routers gateway.
51
00:03:29,860 --> 00:03:34,930
So make sure you go on a firewall configuration on the port forwarding and make sure you've got the
52
00:03:34,930 --> 00:03:40,960
Port eight zero eight zero all the way back into your local IP address of one or two one six eight one
53
00:03:40,960 --> 00:03:41,650
dot one four.
54
00:03:42,250 --> 00:03:47,200
And once you're done with that, going back to colonics, we can actually open up Firefox, for example,
55
00:03:47,200 --> 00:03:54,970
and we can key in the IP address of the forwarding so we can enter slash slash nine zero eight eight
56
00:03:55,290 --> 00:04:01,210
eight f b zero dot energy rock n io hit.
57
00:04:01,210 --> 00:04:04,000
Enter on that and we'll be furnished with the site.
58
00:04:04,210 --> 00:04:10,480
And of course in this case we will actually see the site of Google Drive and you can click request access.
59
00:04:10,480 --> 00:04:16,090
And of course, because it is a social engineering technique, you can click share and of course you
60
00:04:16,090 --> 00:04:18,970
can click, allow or deny in whichever it is the case.
61
00:04:19,330 --> 00:04:22,870
So of course, this would actually allow the site to capture your geolocation.
62
00:04:23,140 --> 00:04:29,620
So, again, a lot of social engineering to be coupled together with the geolocation to identify information
63
00:04:29,890 --> 00:04:32,050
about the target address.
64
00:04:32,560 --> 00:04:38,410
And of course, in this case, we can actually go back and look at the seeker and we can see device
65
00:04:38,410 --> 00:04:38,920
information.
66
00:04:38,920 --> 00:04:45,190
We can look at the operating system, the Linux platform, the CPU course that is running on the GPU,
67
00:04:45,190 --> 00:04:47,170
the Firefox version and so on.
68
00:04:47,560 --> 00:04:51,400
And of course, here we can actually get the latitude and longitude of the information.
69
00:04:51,610 --> 00:04:52,960
So this is really, really helpful.
70
00:04:52,960 --> 00:04:58,480
And we can actually copy the link of the Google Maps and we can actually go under Firefox.
71
00:04:58,480 --> 00:05:04,120
And once we go into Firefox, we can just right click and go and we can actually immediately get the
72
00:05:04,120 --> 00:05:08,350
latitude and latitude information regarding the mobile device in question.
73
00:05:10,140 --> 00:05:15,330
So I understand there's a lot of confusion about the precise location of the Android device, that a
74
00:05:15,330 --> 00:05:20,520
mobile device as a whole and of course, what happened is that depending on what kind of network protocols
75
00:05:20,520 --> 00:05:25,730
that are using, some Internet service provider may be using some kind of soft networking.
76
00:05:25,830 --> 00:05:31,200
Are some of the mobile devices could be connected into the wireless Internet to a different access point.
77
00:05:31,380 --> 00:05:37,740
And all these could pinpoint to a very separate location of these as exposition of the mobile devices,
78
00:05:38,010 --> 00:05:40,800
which is why some of your results could be very different.
79
00:05:41,010 --> 00:05:46,260
So this is some things to take note of, especially if you want to be able to get precise information
80
00:05:46,470 --> 00:05:48,090
regarding the mobile device.
81
00:05:48,630 --> 00:05:51,090
So I hope you learned something valuable in today's tutorial.
82
00:05:51,090 --> 00:05:54,750
And if you have any questions, feel free to leave a comment below and I'll try my best to answer any
83
00:05:54,750 --> 00:05:55,440
of those questions.
84
00:05:55,650 --> 00:06:00,370
And remember to like subscribe to the channel so that you can be kept abreast of the latest cybersecurity
85
00:06:00,370 --> 00:06:00,810
tutorial.
86
00:06:00,990 --> 00:06:02,490
Thank you so much once again for watching.
9764
Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.