Doxing The Complete Guide
Doxing The Complete Guide
In this book we will be going over all the different methods you
can use to dox someone, and how to use them efficiently. If
you’ve purchased this book, I think it’s safe to assume that you
already know what doxing is, but for those who don’t, doxing is
the act of using various tools and techniques to find as much
information as you possibly can on a specific person. “Dox”
came from the term “docs”, which is short for the word
documents, so think of it as searching for every document ever
made that contains information about your target.
But, this isn’t a history lesson, so let’s move on and get right to
business.
The first thing you’re going to want to do, before you start
looking for information, is open up a new text document in
your favorite text editor so we can keep track of all the
information we find, as we will be getting it from a lot of
different places, and it’s easy to lose track of things.
If it doesn’t give it to you, send them an email and wait for them
to reply to it.), their website link, and any username changes
they might have had.
Next it’s time to look at their posts. The most important things
to look for in their posts are their email, and their real name. If
you can find any pictures they’ve posted, whether it’s a picture
of them or not, copy the url of them and put them into your text
document (You can get the image url by right clicking on the
image and choosing the “copy image url” option). Also be on the
lookout for links to other sites, or other usernames that your
target may be using (i.e. A post like “Hey, you should add me on
www.xxx.com, my username on there is blahblahblah”).
Once you’ve found as much info there as you can, let’s start
using all of it to find more info elsewhere.
If you found any websites that your target owns, it is fairly easy
to get their real name, address, and phone number. To do this,
we are going to do a whois search. There are many sites to do
this on, some of which are www.whois.net,
www.internic.net/whois.html, and whois.domaintools.com.
These will almost always yield the same results, but definitely
feel free to check them all… you never know.
Once you’ve gone through and looked at which sites the images
are on, let’s move on to another great tool, www.tineye.com.
This site allows you to upload, or paste the URL of, an image,
and then it will search the internet for sites containing the
same picture. A lot of people will reuse the same avatar or
signature on multiple sites, so make sure to do a TinEye search
on those, as well as any other pictures you’ve found thus far
relating to your target.
This next tool is very useful, and will help you a lot, but in order
to use it you must first obtain your targets IP address. There
are multiple ways of obtaining it, but that’s a whole other book.
If you can get it though, run their IP through a site like
www.geobytes.com/iplocator.htm. This site will give you the
exact geological location that the person is located at.
Another great tool to use, once you’ve found your target’s name,
address, phone number, or business name, is
www.whitepages.com. I’m sure you’ve heard of it, and chances
are you’ve probably used it before too, but it’s still a very useful
tool and will help you with finding more info.
This last tool is similar to pipl, except that it only allows you to
input a username. The site is www.knowem.com. Now, I don’t
think this will pull up anything that you haven’t found thus far,
but it’s always good to check.
Before I end this lesson, I’d like to take a moment to go over the
legalities of gaining someone else’s docs, without their
permission. Everything that we have covered in this book is
100% legal. All the information we’ve found is public
information, and can be viewed by anyone. What you choose to
do with the information you’ve found is entirely up to you, and I
don’t condone any illegal activities that you choose to partake
in with your targets docs.
Happy Doxing!
copyright © 2011 Terridax
All rights reserved