Dating websites allow you to see a person in a very intimate context, framing their successes in addition to accomplishments in life to an important audience. The information contained in these profiles often can’t be found elsewhere, offering a unique look into the personal life of the user.
If you know where a person hangs out, you can use a GPS-spoofing extension from the Chrome browser to locate their Tinder profile by Windows or macOS.
by the point of view of an open-source intelligence (OSINT) researcher or hacker conducting recon, dating websites are a unique collection of searchable databases. Researching a target via dating websites can reveal a few kinds of information in which are useful for a hacker.
People often use the same screen names, in addition to you can often track a person across the internet just by finding a frequently used alias. Since many users also link their Instagram profile, intercepting a screen name can be the key to someone’s entire online existence if they tend to reuse the same one.
Another factor in which you can use to dig deeper into a person’s life can be the profile pictures on Tinder. The dating app allows several photos to be posted, thus gives many opportunities to reverse image search each profile photo to locate additional accounts, even if they have different screen names. in which can lead to a break like another alias or additional more official accounts.
Finally, people don’t tend to be very creative when in which comes to their personal descriptions. Often, they will simply copy in addition to paste them, which can make in which easy to use the same mistakes or grammar from the text to locate them on additional websites. Most people have mistakes they constantly make while typing, in addition to these can tie them to additional accounts when they reuse portions of text with unique misspellings in addition to mistakes that has a regular Google search.
Dating Profiles Are a Lot More Public Than You Think
While Tinder has long been available as a mobile app, most users aren’t aware the site today allows access by a desktop computer in a web browser. We can use in which access to quickly spoof our location in Google Chrome, allowing us to appear near where we expect a user to be in addition to begin filtering through profiles. Since we can do in which easily by anywhere, the only information we need to start in which kind of attack can be an idea of what the target looks like in addition to a general idea of where they live, work, or hang out.
While many dating services can be rather creepily abused on the API level, Tinder allows us to do some basic investigations in a web browser in which even a beginner can get started off with. To get started off, you’ll need to have downloaded in addition to installed the Google Chrome browser, as well as an extension called Manual Geolocation.
Step 1: Install the Location Spoofing Extension
The first step will be enabling our computer to “lie” about its location to Tinder. in which can be important, as in which gives us the ability to search a specific area for a person or persons. If our goal can be simply to identify employees of a company, placing ourselves directly on their company headquarters to discover employees on Tinder might be the way we start.
To do in which, we’ll need to download the Manual Geolocation extension by the Chrome Web Store. Add the extension in addition to accept any permissions in which needs, in addition to you’ll see an icon appear from the top right of your add-ons bar.
Tapping the icon for Manual Geolocation will open a map in which allows us to select the location our browser will report to any website in which visits, in in which case, Tinder. Select the location your target can be in by double-clicking the location on the map.
You can grab the map with the mouse in addition to move in which to refine your location. Lastly, click the on/off switch at the top right of the Manual Geolocation window to switch the extension on.
today our browser will give in which information as its location when we visit any website, in addition to Tinder will think we are from the location we’ve specified. We can also adjust the accuracy here if you’re less sure of the area.
When in which can be done, navigate to Tinder in addition to wait until the page below loads.
Click on “Log in with phone number” to create our account. You can use a Google Voice number here, as services like Burner won’t work.
Once you enter your Google Voice number, in which will send you a text that has a code to confirm you own the number. When you receive in which, enter in which in in which field.
Step 4: Create a Profile with Your Target in Mind
You’ll need to consider your target in addition to enter information in which will pass without a second glance if you only want to passively surveil the target. If you want the target to interact with you, then in which’s best to create a profile in which will wildly excite them.
Below, you’ll see my secret template for the ultimate honeypot profile. In general, men like a woman who can be classy, however approachable, experienced, in addition to perhaps a little sad. Make sure to use a free-domain image to do in which, as we’ve picked an image by Flickr in which’s free to use (photo by Quinn Dombrowski via CC BY-SA 2.0).
Once you’ve created a profile, click “Continue” to fire up your brand new identity. Edith hits the streets like a hustler, sweeping up the profiles of nearby lonely hearts in addition to thrillseekers.
Our Edith profile will just grab anyone nearby, so we’ll need to let Tinder in on what our profile can be interested in seeing. Click on “My Profile” on the top left corner to open our filter settings.
Once we’re in our discovery settings, you need to let Tinder know in which Edith can be here to meet people exactly like your target, so input the age of the person you’re looking for here. You’ll need to specify a range, so try to put the actual age of the target from the middle.
Set the maximum distance to 1 unless you’re monitoring a very large area, as you’ll sweep up a lot of random profiles otherwise. Click on the back button from the top left to send Edith on patrol.
We’ll start to see the profiles of anyone from the area in which meets our filter settings. Each profile will allow you to expand in which to see more information, which can be very useful for correlating a person to another site. If we’re a hacker monitoring a company for employees in Tinder, in which gives us the opportunity to find a variety of different vectors to attack.
If we’re searching for a specific person, we’ll need to exhaust the options the current filter set gives us until we’re sure our target isn’t there. We can do in which by swiping left or right, in which doesn’t actually matter. The point can be to keep looking until we find our target. If we don’t, we can also try looking in another location or wait for a while to see if the target logs on.
When we find our target, you can click on their profile to pull up more information. in which can be where you will find additional photos to reverse image search in addition to link to additional profiles. As you can see below, the stock photo we used turned up a lot of results. Finding additional places an image exists can also frequently locate screen names in addition to additional correlating information in which will lead you to additional breadcrumbs of online data.
If you made your account interesting enough to the target, your subject may even contact you. in which allows you to ask questions or take a more active role in finding information, however in which would certainly also make you a catfish. Edith can be just here to look, not touch, so once you cross in which line, you’re no longer conducting passive surveillance.
If, however, you’re concerned about a profile being legitimate or not, or if in which’s simply a torso picture in which could be your target, a direct line of contact to test if they are who they say they are might be your best shot to confirm the information you’ve found. Since in which can be a more active technique, in which falls outside the scope of in which guide.
If your target has moved location or updates social media by tagging themselves somewhere known, you can adjust your location on Tinder by clicking the Manual Geolocation extension icon from the browser toolbar again in addition to selecting the brand new location the way you did before.
Rather than just refreshing, we’ll need to close the tab in addition to open a brand new one. Then, navigate to Tinder again, in addition to your location should be updated with the brand new location Chrome has supplied in which. We can repeat in which process to send Edith on a search of each one-mile radius area we suspect the target may be lingering in, pulling in anyone who matches the age of our target.
Anyone can create a Tinder profile, however most people forget in which they can be found by anyone interested in them specifically (or somewhere they work). While we covered simply finding a profile in a way in which should leave the target no indication they’ve been found, many hackers see dating profiles as a legitimate point of entry for phishing in addition to social engineering attacks. If someone can find you, they can contact you too.
When writing a profile, ask yourself a few things. Where else do I use in which photo? Google image search can be a powerful tool. Where else do I use in which profile text? in addition to finally, do I mention a screen name in which I use in many additional places?
If you work somewhere important in addition to mention in which, in which can also create additional risk. Both hackers in addition to penetration testers love finding a profile stuffed full of information, so don’t make yourself an easy target for a malicious stranger.
in which’s no secret in which dating websites have been used by police, spies, criminals, researchers, in addition to various others for things additional than originally intended since their inception. in which can be undesirable behavior on a site like Tinder, however when done from the context of a researcher, a light touch can go a long way in revealing information about a target.
Building a profile to a human target can be multi-faceted. The best way to thinking about in which can be finding far-flung however connected puzzle pieces of data to fill in an overall picture of what in which person’s actual in addition to perceived life can be like.
Some people may feel very differently about their position in life than the data about them suggests, either because they perceive their own situation radically different than in which can be or because we have incomplete data to understand important details about their outlook. Many times, data found within dating profiles can provide in which missing context to understand how a person thinks.
If you’re interested in learning more about these kinds of research techniques, check out open-source research (OSINT) resources like “Open Source Intelligence Techniques: Resources for Searching in addition to Analyzing Online Information.”
The OSINT community can be awesome in addition to has inspired me to keep doing these tutorials. The best way to be involved can be to be part of the conversation on our Twitter, YouTube, in addition to from the comments below. If you have any questions about in which tutorial, feel free to leave a comment or reach me on Twitter @KodyKinzie. We’ll be doing more guides on OSINT research techniques, so stay tuned.
Don’t Miss: How to Use Google Voice as a ‘Burner’ Number