0% found this document useful (0 votes)
340 views

Doxing The Complete Guide

Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
340 views

Doxing The Complete Guide

Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 9

Hello, and welcome to Doxing: The Complete Guide.

In this book we will be going over all the different methods you
can use to dox someone, and how to use them efficiently. If
you’ve purchased this book, I think it’s safe to assume that you
already know what doxing is, but for those who don’t, doxing is
the act of using various tools and techniques to find as much
information as you possibly can on a specific person. “Dox”
came from the term “docs”, which is short for the word
documents, so think of it as searching for every document ever
made that contains information about your target.

But, this isn’t a history lesson, so let’s move on and get right to
business.

So, let’s say you’re part of a forum, and you set up an


arrangement to buy something from another member. The said
member takes your money, and then mysteriously disappears,
never to be online again. Well, we’re not gonna let that fly, so
let’s chase him/her down.

The first thing you’re going to want to do, before you start
looking for information, is open up a new text document in
your favorite text editor so we can keep track of all the
information we find, as we will be getting it from a lot of
different places, and it’s easy to lose track of things.

So, the first step is to gather as much information as possible on


this member from wherever you’ve encountered them, which is
usually some sort of forum. So first things first, write down
their username. Then, head over to their profile and write
down EVERY piece of information that’s there. Even if it’s
something that might not be of much help to you now, it could
help in finding more information later on.

Some important things to get are the user’s username, their


birthdate, their email (a lot of times there is a button that will
say something like “email this user”, click that and you should
get their email.

If it doesn’t give it to you, send them an email and wait for them
to reply to it.), their website link, and any username changes
they might have had.

Don’t forget to take a look at their friend’s profiles too, as


people’s friends will often reveal some pretty good info about
them.

Next it’s time to look at their posts. The most important things
to look for in their posts are their email, and their real name. If
you can find any pictures they’ve posted, whether it’s a picture
of them or not, copy the url of them and put them into your text
document (You can get the image url by right clicking on the
image and choosing the “copy image url” option). Also be on the
lookout for links to other sites, or other usernames that your
target may be using (i.e. A post like “Hey, you should add me on
www.xxx.com, my username on there is blahblahblah”).

Once you’ve found as much info there as you can, let’s start
using all of it to find more info elsewhere.

The first thing we’re going to do is a Google search for any


emails that you found. This will pull up any other sites or
services that your target has registered on using that email. If
you find any forums or anything that your target has registered
on, repeat the same steps you’ve already taken to obtain
information from them. When you’re done searching all the
emails, move on to searching for usernames that you’ve found,
then real names.

Keep in mind that different search engines will yield different


results, so remember to repeat all of your searches on different
search engines. The most popular of which being Google, Bing,
and Yahoo!.

Hopefully after all of this work, you’ve found some good


information on your target. Now we’ll move on to using some
free tools to even further our search.

If you found any websites that your target owns, it is fairly easy
to get their real name, address, and phone number. To do this,
we are going to do a whois search. There are many sites to do
this on, some of which are www.whois.net,
www.internic.net/whois.html, and whois.domaintools.com.
These will almost always yield the same results, but definitely
feel free to check them all… you never know.

Some other places that usually contain a lot of personal


information, as you probably already know, are social
networking sites like MySpace, Facebook, and Twitter, so don’t
forget to check those.

The next tool we will be using is www.pipl.com. This site allows


you to put in information like a name, phone number,
username, or email, and will attempt to find other
names/numbers/usernames/emails that are connected to
whatever you put in.

Essentially, it basically does the same thing we’ve been doing


throughout this whole book. Don’t rely on using only this, or
any other tool though, as they will almost never pick up some of
the stuff that you can find manually. The same rule applies for
the opposite situation as well, too… sometimes they will find
things that you couldn’t find manually.
Now, remember all the picture urls you saved earlier? Let’s put
them to some use. The first thing you’re going to want to do is
check and see what site’s they are hosted on. Maybe you will get
lucky and one of the pictures ends up being hosted on a site
that your target owns.

If they are hosted on an image hosting site, like PhotoBucket,


sometimes their username will be in the URL of the photo.

Once you’ve gone through and looked at which sites the images
are on, let’s move on to another great tool, www.tineye.com.
This site allows you to upload, or paste the URL of, an image,
and then it will search the internet for sites containing the
same picture. A lot of people will reuse the same avatar or
signature on multiple sites, so make sure to do a TinEye search
on those, as well as any other pictures you’ve found thus far
relating to your target.

This next tool is very useful, and will help you a lot, but in order
to use it you must first obtain your targets IP address. There
are multiple ways of obtaining it, but that’s a whole other book.
If you can get it though, run their IP through a site like
www.geobytes.com/iplocator.htm. This site will give you the
exact geological location that the person is located at.

Another great tool to use, once you’ve found your target’s name,
address, phone number, or business name, is
www.whitepages.com. I’m sure you’ve heard of it, and chances
are you’ve probably used it before too, but it’s still a very useful
tool and will help you with finding more info.

If you happen to have come across a business that your target


owns, or perhaps works at, and would like more information on
it, www.118.com is the place to go. Just put in the info you have
(business name or location), and it will spit out info for you you.

This last tool is similar to pipl, except that it only allows you to
input a username. The site is www.knowem.com. Now, I don’t
think this will pull up anything that you haven’t found thus far,
but it’s always good to check.
Before I end this lesson, I’d like to take a moment to go over the
legalities of gaining someone else’s docs, without their
permission. Everything that we have covered in this book is
100% legal. All the information we’ve found is public
information, and can be viewed by anyone. What you choose to
do with the information you’ve found is entirely up to you, and I
don’t condone any illegal activities that you choose to partake
in with your targets docs.

Be smart, and be safe.

That concludes your lesson on doxing. I hope that you have


learned a lot, and will be able to put these techniques to good
use.

Happy Doxing!
copyright © 2011 Terridax
All rights reserved

You might also like