How to Track Anyone’s IP using Images

INFORMATION GATHERING

Winston. I

2/26/20243 min read

Today, I'll guide you through a fascinating method of tracking anyone's IP using Transparent Images. We'll delve into the concept, followed by a step-by-step tutorial to execute it seamlessly.

Note: This is for educational purposes only.

While manually tracking IPs with custom-developed payloads is possible, I'll show you a much simpler approach. Let's embark on this learning journey together.

Understanding Canarytokens

Canarytokens act as digital traps within computer systems, monitoring specific actions like file reads, database queries, or process executions. They function similarly to tracking pixels in emails, detecting activities within your system.

Employing Canarytokens is akin to installing alarms in different areas of your house, offering a clever way to safeguard your systems from unauthorized access.

Why bother with Canarytokens, you ask? Well, cyber-attacks are prevalent across all sectors, and timely detection is crucial. Canarytokens offer a free, quick, and effective means to alert you of any suspicious activity, providing an early warning system against potential threats.

Here's a range of Canarytoken options available:

- Web bug / URL token

- DNS token

- AWS keys

- Azure Login Certificate

- Sensitive command token

- Microsoft Word / Excel document

- Kubeconfig token

- WireGuard VPN

- Cloned website

- QR code

- MySQL dump

- Windows folder

- Log4Shell

- Fast redirect

- Slow redirect

- Custom image web bug

- Acrobat Reader PDF document

- Custom exe / binary

- Microsoft SQL Server

- SVN

- Unique email address

Each token serves as a proactive measure to safeguard your systems and provide timely alerts in the event of unauthorized access or suspicious activity.

Step-by-Step Usage

Head over to canarytokens.org and select your Canarytoken. Think of it as setting a digital trap. Enter an email address where you’d like to receive notifications, and jot down a note to help you remember where you’ve placed it.

Sure, let’s create a Fast redirect Canarytoken. Think of it as crafting a secret link that will sound the alarm if anyone clicks on it. In this blog, I’ll demonstrate how to set up a Fast redirect as an illustration.

Once you’ve generated the Canarytoken, place it in a strategic location and send it to your target. This could be within an email, a document, or even embedded in an image. If the target interacts with it, you’ll receive an email notification, signaling that something is amiss.

Once the link has been clicked.

If your target accesses the URL or file, similar to the example provided earlier, your token becomes activated and triggers an alert via email or webhook, as demonstrated below:

You can rename the generated PDF, Excel, or Word document without impacting its functionality.