Google search result

How A Hacker Can Actually Reach Your Place

An information from scratch can be used to gather certain information that can be really astonishing. Here in this post I will show you how a person can reach your place ifย  he/she has your IP address or domain name. Here I will demonstrate using a spam email which deliberately flooded my inboxย  from a particularย sender and show you how we can reach his house. So lets start….

Disclaimer: This post is actually to aware people about there online privacy rather misuse this trick.

Information Gathering :

  • From the email I got the “Domain Name” and name of the person and used it do the whois. As you all can see I got the address, phone no, fax etc from the image below. You can also use the IP address from the email header to obtain the information.

Whois of the domain name

  • Then I opened Google Maps to find the street view of the above obtained address. As you all can see I reached the street of the person and the desired place is approximately near to it.

Google map image

  • I will show you what more info I got, I used his name,city and country to find info about his family from here as shown below.

  • Then using his name and location in Google search I found his MySpace account as shown below and got to see his face.

Google search result

Countermeasures:

#1 – One should always use “Tor” like anonymous tools while browsing and especially using email accounts.

#2 – Keep the information of your Domain name set to private.

#3 – Keep the information on your Social Networking sites set to private.

#4 – Take care while sharing your Phone no or Fax no with any stranger or unknown website.

This guest article is written by Satyajit Das, Author and Owner of SecurityHunk. He is a 23 years old ethical hacking enthusiast and a part time blogger. If you wish to write for us, kindly check this.

Published by

Satyajit@SecurityHunk

A 23years old ethical hacking enthusiast and a part time blogger who blogs at SecurityHunk.I completed my Graduation in Electronics and Communication in 2010 and really passionate about "Hacking" and "Computer Security" related stuffs. Now I am continuing my extended reading and research on "Malware analysis".

43 thoughts on “How A Hacker Can Actually Reach Your Place”

  1. Well, the country level domain can't be set for private registration …so their respective address are open to all just, in the name of nation's security ๐Ÿ™

  2. When we register domain we are required to provide basic information about add, phone no, and email ids. But, after that how can we change or make it private, so that it will not be visible to others?

  3. Hi satyajit, I think you have great knowledge on hacking. Good work.
    Can you identify frm which place this comment has come. ha..ha..

  4. Hi satyajit, I think you have great knowledge on having. Good work.
    Can you identify frm which place this comment has come. ha..ha..

    1. First I would like to thank for your comment ๐Ÿ™‚

      One thing you should not forget when you comment using a unmasked Ipaddress on this blog or many other then the commenter’s Ipaddress is noted…hehehe….so i feel you have got the answer to your query… lol ๐Ÿ˜€

  5. Its really great you have shared it here. I really traced one of my friends blackmailer suing this method. Though I extracted the IP using a demo website which logged his ip when he visited it..:D

    1. It can be done in many ways…here i have tried to show the readers with a simple example… ๐Ÿ™‚ it can be done more extensively….and can give more scary outcomes…which may be out of expectation…… ๐Ÿ™‚

      Thanks… ๐Ÿ™‚

  6. Hello Satyajit,

    Indeed, very intelligent tricks for finding out someone’s identity. But also, this kind of stuff isn’t ok at all, the privacy is violated through information leaks, these social network websites are way too insecure and you can easily be found, with the name and the email address/telephone number you can find out everything about someone’s identity, almost everything. I recommend setting the privacy level very high, try to anticipate this kind of things, these leaks of information can be very dangerous and you can risk to be black-mailed in some cases by ‘the bad guys’. So it is better to keep your identity as hidden as possible, especially on the social network websites, where ANYONE can see your name and details about your life + pictures, it’s way too dangerous and useless, you never know what could happen so it’s better to be cautious. Keep up the good work, excellent article, good informations, I hope the people will start being more attentive with their privacy.

    Best regards,

    Maria

  7. Hi Satyajit,

    Very informative post and I really don’t have idea about it. Now I’ll be more careful. Thanks for sharing your experience.

  8. Nice post mate ! but i dont think google maps such clear and crisp images for India ( i mean he wont get clear view of the house) but still address is enough to catch us ! Should stay safe

  9. Privacy should be maintained.
    Its a way too risky, hope I may never become their target ๐Ÿ˜€

    1. Yeah that can be a void attempt in that case to some extent but as you can see here i have used the domain name….rather than the Ipaddress…. ๐Ÿ™‚ for example your domain name is “theitechblog.com” i may do the “whois” and then proceed… ๐Ÿ™‚
      I have shown a simple example by picking an email from the spamโ€ฆit can be more scaryโ€ฆif done in an elite wayโ€ฆ. ๐Ÿ˜€

      Thanks ๐Ÿ™‚

  10. Great article Satyajit. I think social media has made hacking and getting personal information of people even more easier than ever before. It is really important that one should be pretty aware while revealing personal information in the internet or web.

  11. Important Article first off. Whois protection is something you gonna be looking into seriously. Because nowadays people the Internet well enough & even a novice can find out certain basic info abt u.

  12. Nice post satyajit really interesting to read ๐Ÿ˜€ loved it and yes this is how we’re exposing our info. on internet ? ๐Ÿ˜ฎ

  13. this is the First Step in Hacking called Reconissance and next leads to Social Engineering…Nice Share Satyajit…

    1. This method is actually called as “DOXING” I have shown a simple example by picking an email from the spam…it can be more scary…if done in an elite way…. ๐Ÿ™‚

      Thanks… ๐Ÿ™‚

Leave a Reply

Your email address will not be published. Required fields are marked *