All About Doxing 2022

All About Doxing 2022

⭕🔱🇰‌🇦‌🇱‌🇮™🔱⭕
@ITS_ME_KALI

Doxing often involves hackers attempting to embarrass or shame individuals by publishing confidential information, images or videos obtained from their personal accounts. Initially, doxxing was used by hackers to "out" the identities of fellow bad actors/hackers. However, more recently, it has been used to attack users with opposing viewpoints.

In a doxing attack, hackers might publish someone's:

👀Real name

👀Telephone number

👀Social Security number

👀Home address

👀Employer

👀Credit card numbers

👀Bank account numbers

👀Personal photographs

👀Social media profiles

How does doxing work

Running a WHOIS search on a domain name

Tracking Usernames

Phishing

Stalking Social Media

Checking Goverment Records

Google Dorking

Tracking IP address

Reverse Mobile phone lookup

Packet Sniffing

 Data Brokers(Leaked Data)

Searching on Darkweb

Examples of Doxing

1. Celebrity Doxxing

It’s not uncommon for journalists to find out a celebrity’s personal life information and to publish such gossip on their media platforms. However, doxxing isn’t your regular entertainment news. Here, the hacker publishes the celebrity’s sensitive information such as their payment card info, email address, social security number or phone numbers.

2. Faulty Doxxing

Sometimes, doxxing is done by internet vigilantes who can’t be bothered to properly research or investigate their victims to ensure they have the right person. Instead, they wrongly link people to activities or situations that are unrelated to them. Due to such “faulty” doxing, hence the name, innocent people face:

  • reputation loss,
  • employment loss,
  • harassment,
  • physical harm, or
  • loss of life.

3. Revenge Doxxing

Sometimes, people use doxing as a means of taking revenge. They publish their enemy’s some publicly identifying information online to cause them shame.

4. Swatting Doxxing

Another method of doxing is known as “swatting.” This occurs when a person wrongly accuses someone of a crime and sends police (or a SWAT team, hence “swatting”) to the victim’s address to cause them harassment. However, often such doxxing can prove fatal for the victim.

5. Crime Doxxing

While the swatting is done for fun, there are some people that use doxxing to execute serious crimes like murder. They reveal their enemies’ personal information online and provoke others to harm them. The motive can be personal revenge or showing disagreement or hatred towards any specific cause, religion, activity or race.


How you get doxxed?


🖤 Username Doxing

username

🖤Whois and Domain More

Whois and Domain

🖤PHISHING

Phishing

🖤Stalking Social Media

Social Media Platforms


SOCMINT

🖤Facebook Doxing

Facebook Doxing

🖤Instagram Doxing

Instagram Doxing

🖤Email Doxing

Email Doxing

🖤Twitter Doxing

Twitter Doxing

🖤Telegram Doxing

Telegram Doxing

🖤Media And Dating Doxing

Media Doxing

🖤LinkedIn Doxing

Linkdin OSINT

🖤Indian Goverment Data Doxing

In Gov Doxing

🖤IP Locators

Ip Location

🖤Ip Hunting

Ip Hunting

🖤Reverse Phone Lookup

Number Lookup

🖤Search Engine Doxing

Search Engine Doxing

🖤Scientific Search Engine

ScienceSearch

🖤Specific Search Engines

Specific Search

🖤Vehicles Search

Vehicle Doxing

🖤Archives Data

Archive Data

🖤Directories

Directories

🖤Mac Address

Mac Address

🖤EXIF Data

Exif Data

🖤Company Search

Company Search

🖤PNG and JPEG Exif

Png and JPEG Doxing

🖤Documents Doxing

Documents Doxing

🖤Crypto Doxing

Crypto Doxing

🖤File Uploader

File Uploaders

🖤Reverse Image Search

Reverse image Search

🖤URL Analysis

Url Doxing

🖤Ebooks and PDFs

Ebooks and Pdfs

🖤Fake Mails

Fake Mails

🖤Maps Data

Maps Data

🖤Data Leaks

Data Leaks

🖤IOT Search Engines

Iot Search

How to clear your tracks?

While doing doxing don't forget to use vpn,and proxies . Some tools that will help you remove your searches

❤️‍🔥 Data Destruction Tools

DBAN https://dban.org

The free version supports HDD only.

Eraser www.heidi.ie/eraser/ Open source; supports SSD.

CCleaner www.piriform.com/ccleaner Drive wiper and Windows trace cleaner.

SDelete https://technet.microsoft.com/

en-us/sysinternals/sdelete.aspx

Erases data according to DOD 5220.22-M.


❤️‍🔥 SSD Data-Erasing Tools

Tool URL

Intel Solid State Drive Toolbox https://downloadcenter.intel.com/download/26574?v=t

Corsair SSD Toolbox www.corsair.com/en-eu/support/downloads

Samsung Magician www.samsung.com/semiconductor/minisite/ssd/download/tools.html

SanDisk SSD https://kb.sandisk.com/app/answers/detail/a_id/16678/~/secure-erase-and-sanitize

How can I protect myself from Doxing?

  •  Adjust your social media settings:Ensure that your profiles, usernames/handles are kept private
  • Remove any addresses, places of work, and specific locations from your accounts
  • Set your posts to “friends only"
  • Avoid discussing personal information that could be used against you, as well as anything that can identify your address, workplace or contact information
  • Use a Virtual Private Network (VPN) and aIf you must use public wi-fi, turn off the public network sharing functionality on your device
  • Use strong passwords
  • Vary usernames and passwords across platforms
  • Hide domain registration information from WHOIS (a database of all registered domain names on the web)
  • Don't be afraid after getting doxed its your publicly shared information, so don't worry about it, otherwise attacker use you, don't pay money if you get doxed.
  • Be Safe From Cat Phishing

Join CIDHUB For More Knowledge


Is doxing is Illegal ?

Doxxing is immoral and illegal, and if you are discovered bothering individuals and disclosing their personal information, you could face serious legal consequences, including imprisonment. Detecting and prosecuting these types of crimes is often challenging for law enforcement.In India you get punishment under IT ACT 2000 for doxing or identity theft.

We can say that Open Source Intelligence is the legal way of Doxing.

Intelligence agencies use OSINT to track events, equipment such as weapons systems, and people. These are the 'targets of interest' (ToIs). But hackers use OSINT to identify technical vulnerabilities as well as human targets for phishing and social engineering attacks.Law Firms. Lawyers and private investigators can ethically and legally utilize OSINT techniques – especially information found on social media platforms – in legal and litigation intelligence to collect evidence and research about any suspect or potential juror.

Open Source Intelligence

If you are interested to learn advance level open source intelligence and ethical hacking check Here.

🚪REGARDS : @ITS_ME_KALI


Report Page