is a technique of tracing someone or gather information about an individual using sources on the internet. Its name is derived from “Documents” or “Docx”. Doxing method is based purely on the ability of the hacker to recognize valuable information about his target and use this information to his benefit. It is also based around the idea that, “The more you know about your target, the easier it will be to find his or her flaws
”. This article gives you a brief explanation about doxing and explains how to hack user accounts using doxing
Information that You Can Find Using Doxing
People using internet usually left their information in some website and mostly in social networking site like Facebook, Twitter, Google Plus, etc. Information that you can find using doxing technique are given below.
- Contact Information
- IP – Address
- Personal Information
- Social Networking Site Profiles
- Website and many more. . .
Useful Website for Doxing
Pipl - Most of the higher quality information about people is simply "invisible" to a regular search engine. Unlike a typical search-engine, Pipl is designed to retrieve information from the deep web. Pipl robots are set to interact with searchable databases and extract facts, contact details and other relevant information from personal profiles, member directories, scientific publications, court records and numerous other deep-web sources.
Wink - It’s similar to Pipl to find people by name and get their phone number,
Address, Websites, photos, work, school and more.
123people - 123people is a real time people search service that looks into nearly every corner of the Web. Using 123people proprietary search algorithm, you can find comprehensive and centralized name related information consisting of images, videos, phone numbers, email addresses, social networking and Wikipedia profiles plus and much more.
Zaba Search - Information found using ZabaSearch is all available elsewhere on the web and is all public information. ZabaSearch is a search engine, not a database and does not house, create or manage the information in the search results.
WHOIS – Domain Tools provides a directory that serves as a comprehensive snapshot of past and present domain name registration and ownership records. Most Domain hacking is done by gathering information in this website
Social Networking Site - Social networking site is website where individuals can set up an online profile, describing his/her interests, and add links to other profiles. Social Networking is one of the major source for doxing technique. Some social networking sites like Facebook, Google Plus, Hi5, LinkedIn, MySpace, and Twitter contains lot of information about victim.
Search Engine - Search engine is designed to search for information on the World Wide Web and FTP servers. Information may consist of web pages, images, information and other types of files. Some top search engines for doxing are Ask, Bing, Google, Yahoo!.
Useful Tools for Doxing
Maltego - Maltego is an open source intelligence and forensics application. It will offer you timeous mining and gathering of information as well as the representation of this information in an easy to understand format.
Creepy - Creepy is an application that allows you to gather geolocation related information about users from social networking platforms and image hosting services. The information is presented in a map inside the application where all the retrieved data is shown accompanied with relevant information to provide context to the presentation.
How Doxing is Used for Hacking?
- Hackers can gather information about the victim and create a dictionary file for a target person alone. Using that dictionary file, he can crack your passwords.
- Hacker can get the victim's security question answer using doxing.
Doxing needs Intelligence and searching ability. You have to guess where to search and what to search about person. Depending on searching ability, you will get what you required. Doxing is used mainly by Cyber Crime Experts and Hackers. Overall doxing is a powerful hacking technique. If you like this article please leaves your small comment/feedback below..