How to get someones ip address from an embedded image
In this video I will show you how to easily get someones ip address by embedding an image in html. If you have any question or comments please leave them ...
It depends on what you mean sent over. The image must be directly loaded by the targeted user, so you could post a link and have them click it or find an xss in one of those sites. As a general rule though unless you have the user click a link the ip you will get is the one of the company not the target user.
Hi Hope you are well. I have a question. If Mr A send Mr B, a photo. It was
not Mr B photo. And Mr B post it on social media. Will I be able to find
out who Mr A is? Thanks
if Mr A is the one who uploaded the photo presumably, Mr A would be the only one with the password. As a result only Mr A can see the logs and is the only one will know from what ip the photo was loaded. hope that answers your question.
+Nina K the user you want the ip of must load the image for it to work. As a general rule if the image is viewed by any person an IP will show up in the log however it could be some form of proxy service.
+Penetration Testing with Kali LinuxThanks, by the way do you know how to use the new cloning system in setoolkit (credentials) the index.html doesn't work and there are no tutorials on the internet yet for 2.0 SET, do you maybe know how cloning websites works?
if I want Hack WAN and exploits asks me SVRHOST and SVRPORT and for example
I write
1) LHOST=public IP=132.23.4.3.4(fake)
2)LPORT=doesn't matter which 4444
3)svrhost=? what? kali machine IP?=192.32.344.24(fake)
4)SVRPORT=? what ? same as LPORT? 4444?
Hey your lazy ass forgot port 4444? My question isn't about what port is doing what, I knew it my question was if SVRPORT is same as LPORt while exploiting...
+Zuka Phertsuliani You aren't hacking. You are exploiting a vulnerability.Also, you set the port according to the service you are exploiting. You are welcome for this information. Next time don't be a sorry lazy ass and research it for yourself. You will never be a pentester if you cannot locate basic need-to-know information on your own.Here is a list that your lazy ass could have found with a single google search to know what services use which ports.20/21 – File Transfer Protocol (FTP): used for uploading and downloading files to and from a server.25 – Simple Mail Transfer Protocol (SMTP): used for sending emails through a server.53 – Domain Name System (DNS): Used for the translation of domain names to the IP addresses they are assigned to, employing the use of Name Servers.80 – Hyper-Text Transfer Protocol (HTTP): used for serving Hyper-Text Markup Language (HTML) based web pages, and other types of web site files, such as Active Server Pages (ASP).110 – Post Office Protocol (POP): Used for receiving emails from a server.137, 138, 139 – Network Basic Input/Output System (NetBIOS): NetBIOS allows applications on separate computers to communicate over a local area network.143 – Internet Message Access Protocol (IMAP): Alternate method used for receiving emails from a server, similar to the POP protocol.161 – Simple Network Management Protocol (SNMP): Used primarily for the remote network monitoring of a server or cluster of servers, to ensure up-time and responsiveness.443 – Secure Socket Layer (SSL): Used for securing and encrypting the connection from a user’s computer to a server in order to protect the packet data being transmitted.445 - Server Message Block (SMB): Used for Microsoft Windows Networking communication. Essential for File and Printer Sharing, and connecting to a server’s shared resources via Uniform Naming Convention (UNC) path. It is also essential for network communication on servers utilizing Active Directory.587 – Alternate SMTP: Commonly used as a viable alternative to port 25, as some Internet Service Providers choose to block connectivity on port 25.1167 – Continuous Data Protection (CDP): Used for the R1Soft Backup Agent for processing automated off-site server backups.2433 – Microsoft Structured Query Language Server (SQL Server): Used for database connectivity between server and client computers. The port historically used for SQL communications is 1433, however port 1433 is often the subject of brute-force attacks, thus, we at Server Intellect choose to alter the SQL port to 2433 in an effort to reduce the amount of attacks against our servers.3389 – Remote Desktop Protocol (RDP): Used for connecting remotely to a server or client computer via Windows Remote Desktop.