Recovering a Stolen Car Using Code

August 24, 2017 | Views: 3289

Begin Learning Cyber Security for FREE Now!

FREE REGISTRATIONAlready a Member Login Here

Just a fun article on how basic technical and networking tools can help an information technology help desk recover a stolen automobile and laptop.


Scenario: The call could come in like this

“Yeah, Hello? Yeah I had my company car stolen.”

Okay, thank you for confirming your identification.

Was your automobile lo-jacked? “No.”


Okay, when you are done with your laptop do you power it down or just close the lid?

When an automobile is lost or stolen, and there is a laptop within the car is on but not logged out, that piece of equipment may still be on a network. If the laptop is on a network the equipment must report in from time to keep logged in and authenticated on a secure network.

Obviously from a security stand point:

Step 1:  Using Microsoft Server

  • Check the user’s property issued by the company. This information should be cataloged in the server information under user and assets. The MAC Number and IP number should show.

Step 2: Ask if the laptop was in the trunk of the automobile.

  • Reason being if the automobile was recently stolen the battery may be still charged and the thief may not realize that a laptop is on board.

Step 3: Determining if the laptop is available via a virtual terminal.

  • If the laptop can be remotely accessed and the desktop can be accessed, software can be deployed to open onboard camera, microphone, and technical support may be able to view the desktop remotely and collect evidence.

Step 4: From Command Prompt (using Windows O/S)

  • A. From bottom left of screen, or find your menu by using the Windows™ key.
  • B. In the search box; Type “CMD” A black box will appear. This is where you will “speak” to your computer and ask it top perform tasks.
  • C. Taking the IP number from the Microsoft Server asset information for the assigned laptop for the employee. (Hopefully it carries a static internet protocol address.) using the IP number we should be able to determine where the laptop is and if it is receiving information on the network.
  • D. Important things to remember include if the laptop is on a network behind a proxy, behind a jump box for another network or possesses a firewall that will not allow traffic this may be difficult.
  • E. To set a PING command to allow for a EKG type data packet delivery to the IP number type “ping 9the IP Number) -t Example: ping -t will allow for a constant ping or sending of a small packet of information to a set location on a network. The information that is sent back includes bytes’ time in MS and TTL. You now know that the piece of equipment is online.
  • F. A standard trace program is called tracer. Using out again we can the the location of the I number. This tool will also allow for checks of latency between hops, or digital locations on a network.


So, if we type tracert during this test, I see 13 hops out of a total possible 30 hops. I see that I am on the Sprint network, and that is

If we want to see on a map where is there are several ways to perform this. Now keep in mind, many technical support people frown on using third party websites (or non-peer reviewed websites as tools) but, one cannot argue with consistent success either.

  • A. will show you a world map to locate your target IP Number. As we can see here the driveway of Google.
  • B.     Now If we did the same thing, well, with a popular government website we may see an address in Wilmington, Delaware and an address Englewood, CO. Now if were to run a trace route for the same website we may see that their network is a type of spoke and wheel format that links the major offices nationwide. (Think Mulder and Skelly).
  • C.      The Visual Traceroute may offer you a map, local streets, landmarks and details to offer police to locate and recover a company car and the laptop that may be in the trunk.
  • D.     In addition to the location of the automobile, you may be able to pull a physical address. If you place the address into the service will give you the exact longitude and latitude @37.4225781,-122.0833012 kind of a fun fact.

This article is written as an inspiration to others. Technology used in an ethical and positive way can save lives and property, inspire the ideas of tomorrow and save lives. It is the generations to come to perfect the tools we have today. We have to motivate those with the talent to become more then they are.

Share with Friends
Use Cybytes and
Tip the Author!
Share with Friends
Ready to share your knowledge and expertise?
  1. Really awesome article.

  2. Thanks for the feedback on my first post.

  3. It is possible to monitor e-mails, but keep in mind the longer you are security exposaed, the longer your intellectual and IT properties are exposed to risk. Keeping in mind people accept email as if it is your voice, as if you are the one sending email. It coild be an issue. It is better to contact security, use a program like Fortress when you deploy the IT Asset and brick it.

    Never apologize for being new – we have all been there – I am confident there are people who knew more then the next expert and that expert may be eclipsed by another expert we have not heard from, yet. Just don’t rely completely on those 49.99 thick text books, the books don;t teach the culture of I.T. why people do what they do, any system dependent on people is fail-able.

    We are all enthusiasts

  4. Really good to know information. Just out of curiosity.

    Will I be able to ping the laptop if the laptop lid is close but turned on and login? Also, what if they have VPN installed on their laptop? Thank you. Keep posting.

    • im just a rookie that’s why I’m asking because ive just been hijacked my laptop

    • Good Question and maybe why I was able to do it. I was on the same network at the Help Desk. So If the laptop was connected to our network then the laptop could have been connected via VPN, and there was nop issue with proxy. The lid was closed and the power was on, the person never logged out so, in this case the laptop still showed online using the Microsoft Authentication Server. So at anytime, I could have locked that laptop so, just because the laptop is not specifically in the company control, using Fortress can brick the laptop on the next bootup, if it is part of the BIOS.

  5. amazing piece of knowledge.

Comment on This

You must be logged in to post a comment.

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Support Cybrary

Donate Here to Get This Month's Donor Badge



Is Linux Worth Learning in 2020?
Views: 742 / December 14, 2019
How do I Get MTA Certified?
Views: 1314 / December 12, 2019
How much does your PAM software really cost?
Views: 1751 / December 10, 2019
How Do I Get into Android Development?
Views: 2141 / December 8, 2019

We recommend always using caution when following any link

Are you sure you want to continue?