A walkthrough of the open-source OSINT tool 'Hound' on Kali Linux, demonstrating how a deceptive link can capture a target's GPS location and device details by tricking them into granting browser location permissions. The tool uses a PHP server with a Cloudflare tunnel to generate a shareable link disguised as a legitimate page. Results are visualized via Google Maps and Google Earth. The video also covers defensive measures such as avoiding unknown links and disabling browser location access.

6m watch time

Sort: