GET IP ADDRESS OF ANY TELEGRAM USER
☣Find out the IP address via Telegram☣
No iploggers or anything else. Call only, telegram and wireshark:
1. Download wireshark, open it and in the filter we must specify the protocol we need - STUN
2. Click on the "magnifying glass" (Find a package) and see how we will have a new line with parameters and a search line. There we select the parameter String
3. In the line we write XDR-MAPPED-ADDRESS
4. Turn on wireshark and call via Telegram. As soon as the user answers the call, we will immediately start displaying data and among them will be the IP address of the user who was called.
5. To understand what kind of IP we need, click on the already configured search engine Find, look in the line XDR-MAPPED-ADDRESS and what comes after it is the IP we need.
Use wisely. Or don't use it, but at least protect yourself by disabling the ability to receive calls in the settings, or by transferring all "important" conversations to secret chats. 👌
What traces do we leave on the web.
What traces do we leave on the web. When visiting any site, we leave a lot of data about ourselves, starting with the IP address and ending with digital prints, which are formed from all available data about the system, browser and plugins.
These fingerprints are called “fingerprints” .it They are unique identifiers of 32 characters and are formed from several types of data: language settings, fonts installed on the system, time zone, browser plugins, screen resolution, etc. Thus, it is possible to identify a specific user simply by comparing the fingerprints obtained by the site. At the same time, changing the IP address does not affect the print in any way! About 90% of all browsers are unique! And the only thing we can do is get into the largest category possible.
If you have a standard browser installed, without extensions, etc., then you will be identical to about 800 thousand users! Each next add-on makes you more unique.
For example, installing the NoScript plugin reduces the uniqueness by 50%. All information about the system is hidden in the TOR browser, but this backfires and makes the user stand out from the rest, although it provides a minimum of information to sites. For example, when JS is enabled, the site can see your screen resolution (you may have seen a warning pop up in the browser itself, which is open in full screen). Here is a list of the main fingerprints: • Canvas fingerprint - obtained using JavaScript. Different systems and browsers render images in different ways. Based on this, a unique imprint is formed; • Screen Size and Color Depth - screen resolution;
• Browser Plugin Details - information about installed plugins;
• Time Zone - Time zone;
• ETag - identifier that is formed from the contents of the browser cache;
• Language - system language;
• Hash of WebGL fingerprint - information about 3-D graphics. Contains information about the video card, etc.
• Font Fingerprints - fonts, installed on the system; How to protect yourself from identification?
• Disable JavaScript (we will immediately remove Canvas prints, WebTRC);
• Disable saving cookies and cache;
• To change information about the browser, for example, there is a plug-in Random Agent Spoofer;
• Use a clean browser without unnecessary add-ons. Sites where you can view your prints:http://ipleak.com/
BrowserLeaks.com - Web Browser Security Checklist for Identity Theft Protection How to find and check IP address.
Comments
Post a Comment