Author Topic: The Art of Doxing  (Read 5219 times)

0 Members and 2 Guests are viewing this topic.

Offline Endorphine

  • NULL
  • Posts: 4
  • Cookies: 3
  • Endo@ParrotSec
    • View Profile
The Art of Doxing
« on: July 03, 2015, 12:32:59 am »
   ,--,                                                 ,----,                     
,---.'|                                               ,/   .`|                     
|   | :                                 ,--,        ,`   .'  :                     
:   : |                               ,--.'|      ;    ;     /                     
|   ' :                               |  | :    .'___,/    ,'        .---.   ,---. 
;   ; '                 .---.         :  : '    |    :     |        /. ./|  '   ,'\
'   | |__   ,---.     /.  ./|  ,---.  |  ' |    ;    |.';  ;     .-'-. ' | /   /   |
|   | :.'| /     \  .-' . ' | /     \ '  | |    `----'  |  |    /___/ \: |.   ; ,. :
'   :    ;/    /  |/___/ \: |/    /  ||  | :        '   :  ; .-'.. '   ' .'   | |: :
|   |  ./.    ' / |.   \  ' .    ' / |'  : |__      |   |  '/___/ \:     ''   | .; :
;   : ;  '   ;   /| \   \   '   ;   /||  | '.'|     '   :  |.   \  ' .\   |   :    |
|   ,/   '   |  / |  \   \  '   |  / |;  :    ;     ;   |.'  \   \   ' \ | \   \  /
'---'    |   :    |   \   \ |   :    ||  ,   /      '---'     \   \  |--"   `----' 
          \   \  /     '---" \   \  /  ---`-'                  \   \ |             
           `----'             `----'                            '---"               
                        - Doxing
                     SSL - irc.anonops.com 6697
                         #LevelTwo
====================================================================================

[Useful Links]

https://www.hanzresolver.com/skype2 - Skype Resolver (Skype to IP)
https://pipl.com/ - Database search (by Name, Email, Username, Phone or Location)
http://com.lullar.com/ - Profile search (by Name, Email or Username)
http://www.tineye.com/ - Reverse Image Search (Allows you to find other places that particular photo has been used)
http://www.blackbookonline.info/ - Illegal Activity Lookup
http://www.iplocation.net/ - IP Location Finder (by IP address)
http://www.who.is/ - IP, Website and Domain Search
http://blasze.com/ - IP Logger
http://skypegrab.net/resolver.php - Skype Resolver (IP to Skype and Skype to IP)

====================================================================================

[Dox Layout]

The form below is the typical form used when doxxing, Obviously it is changable and you
dont have to follow that strict order.

-Full Name:
-Age:
-Date of Birth:
-IP Address:
-ISP (Internet Service Provider):
-Email Address:
-Social Networking Profiles:
-Phone Number(s):
-Home Address:
-Town/City:
-School (if applicable):
-Work (if applicable):
-Family Member(s) List:
-Relationship:

====================================================================================

[Gathering Information]

from them. It shouldn't really be that difficult, if you act friendly and nice they should give away this information without any issues.
Be creative is my only advice.
Only you have their Social networking profile you can go ahead and fill out any information you can find.

You then have some choices:
1). Make a fake Facebook account, make "friends" with your target and use Social Engineering to manipulate them into giving you answers
2). Use Google to find information and hope they're stupid enough to have revealed it.

====================================================================================

[Facebook Social Engineering]

Social Engineering in general in one of the most tools for hackers, and even better: it requires nothing but your brain, which everyone has! .. I think
One of the first things you want to do is gain the IP address of the target. Why? Because this will gain information about the target, such as:
ip address, location, postal/zip code, internet service provider, phone model, browser used, etc.

there's alot of complicated ways through using the command prompt, and other programs but we're going to be using the typical IP LOGGER.
Lets navigate to http://blasze.com/
We're going to be using this website to make a false link, which when the target clicks on it, it'll redirect it to a link of your choice but store information regarding their device.
So overall. You would give this link to your victim and make them click it via Social Engineering.
Once you've encouraged them to click on that link, you could use tools such as http://www.iplocation.net/ or http://www.who.is to figure out where they live.
Please bare in mind this is not always 100% accurate.
A good way to get your victim to click your link is to use the google url shortening service, as most people trust google.

====================================================================================

[Using Google]

This option in my opinion is based all around luck. If the person isn't very smart,
it'll be really easy to find information regarding them however if they're semi-intelligent it'll be a nightmare.

I won't be sharing every technique in the book, otherwise it'll become overused and become worthless to myself and other doxers.
But - you're pretty much using websites which search through social media sights, databases, and so fourth to find more information regarding your victim.

- Recommended Websites-

https://pipl.com/ - Database search (by Name, Email, Username, Phone or Location)
http://com.lullar.com/ - Profile search (by Name, Email or Username)
http://www.tineye.com/ - Reverse Image Search (Allows you to find other places that particular photo has been used)
http://www.blackbookonline.info/ - Illegal Activity Lookup

Reverse Image Lookup is used by browsing for an image saved on your computer's hard drive and it searches website's databases to find matching images.
This can be used to find other social networking sites which have the potential to hold more information about your target.

Now there's a chance that you won't find anything using the method above.
You can do something very similar and just as effective. It's called using Google.

Type the person's name in on Google, type in their ip address, type in their usernames, type in their email and just see what comes up.
It could link you to a whole different site which they used the same email address or username with which has the potential to have loads of important data.

====================================================================================

[Skype]

You can use a Skype resolver to gather the ip address of the target.
Website - https://www.hanzresolver.com/skype2 - Skype Resolver (Skype to IP)

If you have the ip address of a target, you can search for a matching Skype account associated with that ip address.
This website also resolves ip addresses.
Website - http://skypegrab.net/resolver.php - Skype Resolver (IP to Skype and Skype to IP)

You can also possibly sometimes get Facebook profiles through Skype.
To do this you would create a Fake Facebook account, link it to your Skype and click "Find Friends".
To find this interface go here: https://www.facebook.com/?sk=ff

====================================================================================

[The E-mail Address]

If you have your victim's Social Networking profile(i.e - Facebook) you need to create a fake account and add them.
Once you've got them added you need to create a Yahoo account.
You then import your contacts from Facebook.
To do this, simply create a Yahoo account, login to it, click the large "IMPORT CONTACTS" button and select Facebook
To find the email address, go onto your list of contacts.
Then find the person's real life name and you should be presented with their email address.
Now you have your victim's email address. You can use these on websites listed above to search for information.

====================================================================================

[Bringing It All Together]

Now once you feel you have enough information you can attempt to make a password restore.
When doing this attempt to make it look like you haven't just doxed the person, because it's a known technique in the world.
You would contact Customer Support for the service, and tell them that don't remember the password/email address/security question answers.
If you're good enough at Social Engineering (which is required) and you have collected a solid dox you should have the account with little effort.

If and when you gain access to their account, you can search through all their private messages to uncover even more information against them.
If you're looking for content to black mail your target it'll be there, I'm sure.
Gaining access to their account is the easiest and most effective way of collecting your data.

====================================================================================

[END]

Thank you for reading.
Join us on IRC.
Connect via SSL at:
irc.anonops.com 6697
#leveltwo

~Endorphine.
« Last Edit: July 03, 2015, 04:34:43 am by Endorphine »
@_anonendo

Offline dotszilla

  • Peasant
  • *
  • Posts: 68
  • Cookies: -61
  • ..you'll either LOVE me or HATE me..
    • View Profile
Re: Doxing
« Reply #1 on: July 03, 2015, 02:00:45 am »
not bad... not really into doxing but theres some good info on there.. thanks
"The box said 'Requires Windows XP or better'. So I installed LINUX..."

Offline Endorphine

  • NULL
  • Posts: 4
  • Cookies: 3
  • Endo@ParrotSec
    • View Profile
Re: Doxing
« Reply #2 on: July 03, 2015, 04:25:35 am »
Thank you. I appreciate it.

This tutorial is for those information hungry pals out there ;)
« Last Edit: July 03, 2015, 04:27:30 am by Endorphine »
@_anonendo

Offline cr4zi8

  • Serf
  • *
  • Posts: 29
  • Cookies: 26
    • View Profile
Re: The Art of Doxing
« Reply #3 on: July 09, 2015, 05:29:34 pm »
Calling doxing an art is like calling a hitman your PR officer...

Offline iTpHo3NiX

  • EZ's Pirate Captain
  • Administrator
  • Titan
  • *
  • Posts: 2920
  • Cookies: 328
    • View Profile
    • EvilZone
Re: The Art of Doxing
« Reply #4 on: July 09, 2015, 06:15:25 pm »
Calling doxing an art is like calling a hitman your PR officer...

Came for this.

Anyways good doxing resources though
[09:27] (+lenoch) iTpHo3NiX can even manipulate me to suck dick
[09:27] (+lenoch) oh no that's voluntary
[09:27] (+lenoch) sorry

Offline eVad3r

  • /dev/null
  • *
  • Posts: 9
  • Cookies: -10
  • "I'm not a hacker, I'm a security professional"
    • View Profile
Re: The Art of Doxing
« Reply #5 on: August 04, 2015, 05:24:00 am »
I have been looking for a fairly detailed post on doxing forever, thanks very much!
Hi, how are ya?