Maxx's Anti-Dox Handbook 10-01-2014, 06:48 PM
#1
![[Image: CMJ5SbX.png]](http://i.imgur.com/CMJ5SbX.png)
A BRIEF INTRODUCTION
First, I know this is technically "cross-posting" and that it's frowned upon here on Sinisterly. However, I see nothing but bad tutorials teaching how to avoid getting doxed. I honestly felt morally obligated to share my "handbook" here. I hope you guys like it.
--------------------
Something that doesn't seem to ever properly be taught around the Internet is how to not get doxed. This inspired me to step up to the plate and write my first handbook: Maxx's Anti-Dox Handbook, this guide will help you learn how to avoid getting doxed and we'll do so in chapters. Since this is my first, there may be a few flaws - but I hope you like it anyway!
EVERYTHING YOU NEED TO KNOW ABOUT DOXING
[x] Chapter 1.0 - What is a Dox?
Don't know what a dox is? Well, this is the chapter for you!
Spoiler:
1.1 - My definition:
--------------------------------------------------------------
A dox is a document containing the personal information of a certain individual, or even a group of individuals. It is a common practice among "doxers", the people who do the doxing, to post this information publicly on places such as Pastebin, DOXBIN, and many other websites. If posted in the right place, this information can officially be obtained by virtually anyone online. If on a site like DOXBIN, the law wont even help you get it taken down.
EXAMPLE:
Guy 1: Dude, did you hear that chmod person got doxed!?
Guy 2: No, way! I thought chmod was undoxable!
Guy 3: I guess it's possible to dox anyone if you set your mind to it...
Note: @"chmod" wasn't actually doxed.
--------------------------------------------------------------
1.2 - Urban Dictionary's Definition:
--------------------------------------------------------------
Source
Doxing -
Doxing is a technique of tracing someone or gather information about an individual using sources on the internet. Its name is derived from “Documents” or “Docx”. Doxing method is based purely on the ability of the hacker to recognize valuable information about his target and use this information to his benefit. It is also based around the idea that, “The more you know about your target, the easier it will be to find his or her flaws”
EXAMPLE:
Well yeah, he is saying he is doxing me and he talked about one of my youtube channels (he's never talked to me before)
--------------------------------------------------------------
1.3 - What information does a dox contain?
--------------------------------------------------------------
The personal information contained in doxes can consist of the following: names, aliases, birth dates, pictures, phone numbers, addresses, SSNs/SINs, usernames, passwords, IP addresses, MAC addresses, family information, emails, IDs, birth certificate information, ISP information, credit information, chat logs, and much more.
In a dox pretty much anything goes.
--------------------------------------------------------------
1.4 - A Dox Victim's Scenario
I was going to write my own scenario, but I liked this one better. (provided by Allen Freeman at WonderHowTo)
--------------------------------------------------------------
You are arguing with some stranger on Facebook and it gets heated. You walk away that night angry, but tired, and you go to sleep. A few days later, your phone rings, waking you. Ignoring the first call, it starts to ring again. You answer it only to be hung up on. You think, "wrong number" and lay back down.
The ringing doesn't stop though and after few hours, your doorbell rings. As you open the door, you greet a pizza deliverer with ten pizzas you did not order. What's going on here? This continues on and off for a week until one day you're at the store and your debit card gets declined. Rushing home to check your account, you discover in horror it's overdrawn!
You know where this dark road goes. Now you must start the process of fixing your stolen identity. Sorting out your bank mess and trying to get things back in order so life can go on. Not an easy task in this day and age.
--------------------------------------------------------------
--------------------------------------------------------------
A dox is a document containing the personal information of a certain individual, or even a group of individuals. It is a common practice among "doxers", the people who do the doxing, to post this information publicly on places such as Pastebin, DOXBIN, and many other websites. If posted in the right place, this information can officially be obtained by virtually anyone online. If on a site like DOXBIN, the law wont even help you get it taken down.
EXAMPLE:
Guy 1: Dude, did you hear that chmod person got doxed!?
Guy 2: No, way! I thought chmod was undoxable!
Guy 3: I guess it's possible to dox anyone if you set your mind to it...
Note: @"chmod" wasn't actually doxed.
--------------------------------------------------------------
1.2 - Urban Dictionary's Definition:
--------------------------------------------------------------
Source
Doxing -
Doxing is a technique of tracing someone or gather information about an individual using sources on the internet. Its name is derived from “Documents” or “Docx”. Doxing method is based purely on the ability of the hacker to recognize valuable information about his target and use this information to his benefit. It is also based around the idea that, “The more you know about your target, the easier it will be to find his or her flaws”
EXAMPLE:
Well yeah, he is saying he is doxing me and he talked about one of my youtube channels (he's never talked to me before)
--------------------------------------------------------------
1.3 - What information does a dox contain?
--------------------------------------------------------------
The personal information contained in doxes can consist of the following: names, aliases, birth dates, pictures, phone numbers, addresses, SSNs/SINs, usernames, passwords, IP addresses, MAC addresses, family information, emails, IDs, birth certificate information, ISP information, credit information, chat logs, and much more.
In a dox pretty much anything goes.
--------------------------------------------------------------
1.4 - A Dox Victim's Scenario
I was going to write my own scenario, but I liked this one better. (provided by Allen Freeman at WonderHowTo)
--------------------------------------------------------------
You are arguing with some stranger on Facebook and it gets heated. You walk away that night angry, but tired, and you go to sleep. A few days later, your phone rings, waking you. Ignoring the first call, it starts to ring again. You answer it only to be hung up on. You think, "wrong number" and lay back down.
The ringing doesn't stop though and after few hours, your doorbell rings. As you open the door, you greet a pizza deliverer with ten pizzas you did not order. What's going on here? This continues on and off for a week until one day you're at the store and your debit card gets declined. Rushing home to check your account, you discover in horror it's overdrawn!
You know where this dark road goes. Now you must start the process of fixing your stolen identity. Sorting out your bank mess and trying to get things back in order so life can go on. Not an easy task in this day and age.
--------------------------------------------------------------
[x] Chapter 2.0 - A Dox's Potential
Many people underestimate a dox's potential. This chapter will be teaching you why you shouldn't underestimate them.
Spoiler:
2.1 - When is a dox created, and why?
In my experience, I have seen doxes being used for a vast series of different things. Sometimes they're used for political reasons, and others for legal reasons. But normally a dox's creation is unethical because they're normally made due to someone's online personal vendetta towards what we'll be calling the Dox Victim.
--------------------------------------------------------------
When is a dox used for a political reason?
I find that normally a dox is only created for a political reason when someone in the legal system passes a new law/bill that an individual or several individuals don't like. Honestly, they feel like they're getting revenge in some weird way by posting the last four digits of the Dox Victim's SSN, phone number, name, and address (sometimes more, but that's all I normally see for these ones) online. Small doxes; doxes with minimal information, on the Dox Victim will sometimes be released and they'll threaten the Dox Victim that they'll release more information if they don't get what they want. I'd say almost 10/10 times a person with legal power doesn't even see the dox... Unless you're in a position like the Fullerton Police were in the Kelly Thomas case, also known as the Justice4KellyThomas operation.
I could go on, but I don't feel this is very important for me to elaborate on. I'm pretty sure you're all smart enough, and if not that, creative enough to think of other reasons why doxes would be made for political reasons.
--------------------------------------------------------------
When is a dox used for a legal reason?
A lot of people think cops and the government are stupid, but they really aren't. Seriously, think about it - Police use doxes all the time! You know how they often have your information in their database already when you go in for a background check, get pulled over for speeding, or get arrested? Yeah, that's basically the equivalent to a dox. You need to accept that your government has basically had a dox on you since day one.
Police/detectives also have been know for using doxes when they're investigating a crime or something of that nature, and with good reason, too. If you were a detective working on an investigation, wouldn't it help to know what the suspects do for a living, where they typically hangout, what type of person they are, and how clean their record is?
--------------------------------------------------------------
When is a dox used for a personal vendetta?
This is when most doxes come on to the Internet's battlefield. Since no one with a functional brain actually wants their information online, people feel that doxing their "enemies" and/or people they hate and releasing the information publicly for the rest of the Internet to see is a good strike-back method. This often gives the doxer a feeling of satisfaction and vengeance. It's because of situations like this you need to keep personal security and/or privacy a factor in anything you do online. Also, try to not piss people off so you don't have to worry about it as much in the first place... There normally isn't a problem until you make one. In other words, watch your mouth no matter what you're doing. You never want to piss off the wrong person, I honestly can't stress this enough for you drama-queens out there.
Correct me if I'm wrong, but I'm pretty sure that covers the basics for this section.
--------------------------------------------------------------
2.2 - What can a dox be used for?
Just like anything else, a dox is whatever you make of it. This is where people and/or the doxer gets creative and has some fun.
I haven't personally heard of it happening too often, but there have been cases where people will show up at the Dox Victim's door to harass them personally. This normally isn't the case, but it can happen... Heck, even I have been invited to go on road-trips to harass a Dox Victim or two! (I refused of course)
More realistic scenarios would consist of the following:-
Believe it or not, these are all scenarios that have actually happened... In fact, I have personally seen all of the above and even more done to one Dox Victim alone. As I said before, you NEVER want to piss off the wrong person, especially if they belong to a trouble-making group who would make a troll-operation out of you.
In my experience, I have seen doxes being used for a vast series of different things. Sometimes they're used for political reasons, and others for legal reasons. But normally a dox's creation is unethical because they're normally made due to someone's online personal vendetta towards what we'll be calling the Dox Victim.
--------------------------------------------------------------
When is a dox used for a political reason?
I find that normally a dox is only created for a political reason when someone in the legal system passes a new law/bill that an individual or several individuals don't like. Honestly, they feel like they're getting revenge in some weird way by posting the last four digits of the Dox Victim's SSN, phone number, name, and address (sometimes more, but that's all I normally see for these ones) online. Small doxes; doxes with minimal information, on the Dox Victim will sometimes be released and they'll threaten the Dox Victim that they'll release more information if they don't get what they want. I'd say almost 10/10 times a person with legal power doesn't even see the dox... Unless you're in a position like the Fullerton Police were in the Kelly Thomas case, also known as the Justice4KellyThomas operation.
I could go on, but I don't feel this is very important for me to elaborate on. I'm pretty sure you're all smart enough, and if not that, creative enough to think of other reasons why doxes would be made for political reasons.
--------------------------------------------------------------
When is a dox used for a legal reason?
A lot of people think cops and the government are stupid, but they really aren't. Seriously, think about it - Police use doxes all the time! You know how they often have your information in their database already when you go in for a background check, get pulled over for speeding, or get arrested? Yeah, that's basically the equivalent to a dox. You need to accept that your government has basically had a dox on you since day one.
Police/detectives also have been know for using doxes when they're investigating a crime or something of that nature, and with good reason, too. If you were a detective working on an investigation, wouldn't it help to know what the suspects do for a living, where they typically hangout, what type of person they are, and how clean their record is?
--------------------------------------------------------------
When is a dox used for a personal vendetta?
This is when most doxes come on to the Internet's battlefield. Since no one with a functional brain actually wants their information online, people feel that doxing their "enemies" and/or people they hate and releasing the information publicly for the rest of the Internet to see is a good strike-back method. This often gives the doxer a feeling of satisfaction and vengeance. It's because of situations like this you need to keep personal security and/or privacy a factor in anything you do online. Also, try to not piss people off so you don't have to worry about it as much in the first place... There normally isn't a problem until you make one. In other words, watch your mouth no matter what you're doing. You never want to piss off the wrong person, I honestly can't stress this enough for you drama-queens out there.
Correct me if I'm wrong, but I'm pretty sure that covers the basics for this section.
--------------------------------------------------------------
2.2 - What can a dox be used for?
Just like anything else, a dox is whatever you make of it. This is where people and/or the doxer gets creative and has some fun.
I haven't personally heard of it happening too often, but there have been cases where people will show up at the Dox Victim's door to harass them personally. This normally isn't the case, but it can happen... Heck, even I have been invited to go on road-trips to harass a Dox Victim or two! (I refused of course)
More realistic scenarios would consist of the following:-
- Harassing phone calls
- Delivery meals such as pizza or Chinese food gets ordered by the victim's harassers so they have to deal with the bill (or get into a dramatic dispute with the delivery guy/gal)
- Emails get spammed/flooded
- Mail/email-complaints can be sent to the victim's workplace's human resource's department in attempt to make them lose their job
- Identity theft (more common than you would think - Ever watched the show CatFish?)
- Credit fraud
- Frequent hackings
- Naked pictures/videos of the victim can be spread all over if found by the wrong person - can be obtained via hacked webcam, or by social engineering taken to an extreme
- Male and/or female prostitutes sent to your door
- Family could also be targeted with all of the attack methods listed above
- And the list just goes on...
Believe it or not, these are all scenarios that have actually happened... In fact, I have personally seen all of the above and even more done to one Dox Victim alone. As I said before, you NEVER want to piss off the wrong person, especially if they belong to a trouble-making group who would make a troll-operation out of you.
[x] Chapter 3.0 - Identifying a Dox
In my eyes, there are different ways to identify a dox. This chapter will help you learn to identify them like a pro!
Spoiler:
3.1 - Classifying a dox
In this chapter of my handbook we'll be classifying the different types of doxes with the following labels:
--------------------------------------------------------------
Sometimes a dox can be classed with a mix of different labels. For example, it could be descriptive and accurate, however it could obtain a SSN therefore also classifying it as illegal. To dumb it down, said dox would be: descriptive, accurate, and illegal. Now ask yourself: Is this a good or bad dox?
--------------------------------------------------------------
3.2 - Good or Bad? It's all in perspective
--------------------------------------------------------------
Whether a dox is good or bad all really depends on your point of view on the situation as the reader. You might think that it's good because it's descriptive and accurate even though some of it is illegally obtained information, or you might think it's bad because you don't believe in hacking/stealing private information in such a manner. Like I said, it depends on your view on the situation. There are also situations where people label doxes as good or bad according to the theory of it being an art, not a crime. For example, you could say you think it's a bad dox because of the illegal information that was added, however, I might disagree and say it's in fact a good dox because I may believe that obtaining mass-amounts of someone else's personal information that way is an art only some people can do, not a crime or even morally wrong really.
--------------------------------------------------------------
3.3 - What makes a dox legal?
As I said before, there are different types of doxes. One of these types is the legal type.
--------------------------------------------------------------
A legal dox consists of information that is publicly available from Internet services such as Facebook, Twitter, Whitepages, Intelius, yasni, spokeo, and many more. A dox must contain absolutely 0 hacked/illegally obtained information in order to be considered legal.
As long as you stick to using information that is publicly available without hacking or stealing, you can never really get charged for creating a dox. (if caught)
--------------------------------------------------------------
3.4 - What makes a dox illegal?
There are also illegal doxes.
--------------------------------------------------------------
An illegal dox often consists of information that can be publicly obtained along with information often obtained in an illegal manner. This information can be anything from a hacked database leak, an IP address, or even a leaked Social Security number (definitely not supposed to be public!). Illegal information could be obtained by doing anything from blackmailing the Dox Victim for the details to even hacking into ISP accounts, personal computers, credit records, social media accounts, and well, you get the idea.
Basically anything that is considered to be private and not supposed to be shared with the public in the first place could be considered illegally obtained information as long as the information has been gathered via hacking, stealing, blackmailing, etc.
It is very well possible that you could get charged if caught using these methods to create a dox.
--------------------------------------------------------------
In this chapter of my handbook we'll be classifying the different types of doxes with the following labels:
- Good
- Bad
- Legal
- Illegal
- Accurate
- Inaccurate
- Descriptive
- Non-descriptive
--------------------------------------------------------------
Sometimes a dox can be classed with a mix of different labels. For example, it could be descriptive and accurate, however it could obtain a SSN therefore also classifying it as illegal. To dumb it down, said dox would be: descriptive, accurate, and illegal. Now ask yourself: Is this a good or bad dox?
--------------------------------------------------------------
3.2 - Good or Bad? It's all in perspective
--------------------------------------------------------------
Whether a dox is good or bad all really depends on your point of view on the situation as the reader. You might think that it's good because it's descriptive and accurate even though some of it is illegally obtained information, or you might think it's bad because you don't believe in hacking/stealing private information in such a manner. Like I said, it depends on your view on the situation. There are also situations where people label doxes as good or bad according to the theory of it being an art, not a crime. For example, you could say you think it's a bad dox because of the illegal information that was added, however, I might disagree and say it's in fact a good dox because I may believe that obtaining mass-amounts of someone else's personal information that way is an art only some people can do, not a crime or even morally wrong really.
--------------------------------------------------------------
3.3 - What makes a dox legal?
As I said before, there are different types of doxes. One of these types is the legal type.
--------------------------------------------------------------
A legal dox consists of information that is publicly available from Internet services such as Facebook, Twitter, Whitepages, Intelius, yasni, spokeo, and many more. A dox must contain absolutely 0 hacked/illegally obtained information in order to be considered legal.
As long as you stick to using information that is publicly available without hacking or stealing, you can never really get charged for creating a dox. (if caught)
--------------------------------------------------------------
3.4 - What makes a dox illegal?
There are also illegal doxes.
--------------------------------------------------------------
An illegal dox often consists of information that can be publicly obtained along with information often obtained in an illegal manner. This information can be anything from a hacked database leak, an IP address, or even a leaked Social Security number (definitely not supposed to be public!). Illegal information could be obtained by doing anything from blackmailing the Dox Victim for the details to even hacking into ISP accounts, personal computers, credit records, social media accounts, and well, you get the idea.
Basically anything that is considered to be private and not supposed to be shared with the public in the first place could be considered illegally obtained information as long as the information has been gathered via hacking, stealing, blackmailing, etc.
It is very well possible that you could get charged if caught using these methods to create a dox.
--------------------------------------------------------------
[x] Chapter 4.0 - What Does a Dox Look Like?
Many of you have most likely seen doxes due to first-hand experience, but this chapter is for those of you who have never seen a dox before or are curious to know more about how they can be setup.
Spoiler:
PLEASE NOTE: None of the information posted below is real. I made it all up. If you would like to see a real dox, private mesage me and I'm sure we can figure something out. I will be sharing several doxes with you in this chapter using the different "Dox Types" as an example. I'll also be saying if I think the doxes are good or bad but remember, that's just my opinion. As I said before, whether a dox is good or not is all depending on your perspective on it. Please refer to "Chapter 3.0 - Identifying a Dox" if you're confused with how I'm classing the doxes.
4.1 - EXAMPLE 1: Legal, Accurate, and Descriptive - GOOD
I think this dox is good because it's accurate, descriptive and legal all at the same time! When creating this dox, we were not lazy and actually took the time to compare statistics and information using the sources available to us to produce the most accurate dox possible! We were also sure to add links to almost every source we used during the dox (mainly found in the "Accounts" section) which often helpful if you have to double check something, not to mention it makes the dox look all that much better, too. Oh, and in case you were wondering; this dox is legal because we put it together using only public information.
4.2 - EXAMPLE 2: Legal, Accurate, and Non-Descriptive - BAD
I think this dox is bad mainly because even though the information is accurate, it lacks description. As you can see, we had the resources available to us to create a more descriptive dox (referring to chapter 4.1) This is just flat-out lazy. This dox is also legal because once again, we put it together using publicly available information.
4.3 - EXAMPLE 3: Illegal, Accurate, and Descriptive - GOOD
I honestly can't stress this enough. Everything here is fake and hand-written by myself. NONE of this information is real.
Mods, please don't go about falsely banning me or removing this handbook from HackCommunity. This is supposed to be an almost exact replica of a real dox.
4.4 - EXAMPLE 4: Illegal, Accurate, and Non-Descriptive - BAD
This dox also contains "accurate" information (even though it isn't actually real), but it's not descriptive one bit whatsoever. I mean, look at what we are capable of making (referring to 4.3)
4.1 - EXAMPLE 1: Legal, Accurate, and Descriptive - GOOD
I think this dox is good because it's accurate, descriptive and legal all at the same time! When creating this dox, we were not lazy and actually took the time to compare statistics and information using the sources available to us to produce the most accurate dox possible! We were also sure to add links to almost every source we used during the dox (mainly found in the "Accounts" section) which often helpful if you have to double check something, not to mention it makes the dox look all that much better, too. Oh, and in case you were wondering; this dox is legal because we put it together using only public information.
Code:
▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒
PERSONAL INFORMATION
Name: John Alexander Doe
Firstname: John // Also goes by "Johnny"
Middlename: Alexander
Surname: Doe
Alias(es): JohnnyDaMan
Gender: Male
Age: 20
Birth Date: April 13, 1993
Religion: Christian
Race: Caucasian
Zodiac: Aries
Languages: English, German, some Russian
Sexual Orientation: Straight
Phone Number: 123-456-7890 - Comcast Phone Landline
▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒
LOCATION
Country: United States of America
State: Georgia
City: Doxville
ZIP/Postal: 12345
Exact Address: 1234 Doxside Links Dr., Doxville, GA 12345
Previous Lived:
- Lived in Doxden, CT from 1997 - 2006
- Lived in New Doxen, CT from 2006 - 2007
- Lived in Lawrenceranker, GA at some point in his life
// Current address is also registered under the following people: Lajeune D. Doe, Yvette R. Doe
// Seems to be around Lawrenceranker a lot (20 minutes away from registered home address)
▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒
APPEARANCE
Height: 5' 10" (178cm)
Eye Color: Blue
Skin Color: White
Hair Color: Blonde
Image 1: http://i.picture.com/picture1.jpg
Image 2: http://i.picture.com/picture2.jpg
Image 3: http://i.picture.com/picture3.jpg
Image 4: http://i.picture.com/picture4.jpg
John with his girlfriend: http://i.picture.com/JohnAndGirlfriend.jpg
▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒
FAMILY
George G. Doe
- Age: 45
- Address: 77 Romson St New Doxen, CT 12345
- Phone Number: (222) 333-4444 - AT&T Landline
- Phone Number(s) Associated With Him:
- (333) 444-5555 - YMax Communications Corp. Landline // Tied to Verna as well
- (444) 555-6666 - AT&T Landline // Tied to Kayan, Gladstone, and Josh
- (555) 666-7777 - Comcast Phone Landline
- Previous Addresses:
- 77 Romson St New Doxen, CT 12345
- 42 Thompsy St, New Doxen, CT 23456
- 9 Lily St, New Doxen, CT 34567
- 12 Thompsy St #3, New Doxen, CT 45678
- George's Possible Relatives:
- Joshua Doe
- Gladstone G Doe
- Verna V Doe
- Robert Doe
- Kayan V Doe
- Vernal R Doe
- John A. Doe // Lookie here! It's John! :3
- Kayan V Doe
Verna V. Doe
- Age: 44
- Address: 49 Curray St Hamster, CT 12345
- Phone Number: (333) 222-1111 - YMax Communications Corp. Landline
- Phone Number(s) Associated With Verna:
- (987) 654-3210 - AT&T Landline // Tied to Kayan, George, Gladstone, and Josh?
- Previous Addresses:
- 42 Thompsy St, New Doxen, CT 23456
- 9 Lily St, New Doxen, CT 34567
- 12 Thompsy St #3, New Doxen, CT 45678
- Verna's Possible Relatives:
- Joshua Doe
- Gladstone G Doe
- Kayan V Doe
- Robert Doe
- George G Doe // And George!
- John A Doe // There's Johnny again!
- Kayan V Doe
- George G Doe
Joshua Doe
- Also known as: Joshy Poo // <3
- Age: 30
- Address: 9 Lily St, New Doxen, CT 34567
- Phone Number: (123) 888-9999 - YMax Communications Corp. Landline
- Phone Number(s) Associated With Josh:
- (123) 321-0003 - AT&T Landline
- (123) 321-0004 - AT&T Landline
- (123) 321-0005 - AT&T Landline
- Previous Addresses:
- 56 Thompson St, New Doxen, CT 33333
- 9 Lily St, New Doxen, CT 12345
- 13 Elliot St, New Doxen, CT 5555
- Joshua's Possible Relatives:
- Gladstone G Doe
- Robert Doe
- Kayan V Doe
- Verna V Doe
- George G Doe
Gladstone G Doe
- Also known as: George G. Doe // I do belive a different George than above
- Age: 59
- Address: 9 Lily St, New Doxen, CT 34567
- Phone Number: (123) 456-9999 - AT&T Wireless Mobile
- Phone Number(s) Associated With Gladstone:
- (123) 456-7811 - AT&T Landline // Tied to Kayan, George, Gladstone, and Josh?
- (987) 654-3222 - AT&T Landline
- Previous Addresses:
- 132 Lambermonston St, New Doxen, CT 00001
- 69 Sully, New Doxen, CT 00002
- 38 Silva Ave #2, New Doxen, CT 00003
- Gladstone's Possible Relatives:
- Joshua Doe
- Winston H Doe
- Kayan V Doe
- Robert Doe
- Verna V Doe
- George G Doe
// NOTE: I'm going to half-ass the next few family members. Sorry.
Kayan V. Doe
- Age: 44
- Address: 8 Lily St, New Doxen, CT 34567
- Phone Number: (333) 759-1234
Robert Doe
- Age: 52
- Address: 3911 West Ruffien, CT 66611
Winston Doe
- Age: 65
- 193 Beacon Ave New Haven, CT 06512
- Phone Number: (203) 752-0703
▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒
ACCOUNTS
// Remember, none of this is real... I made it look as realistic as possible
PlayStation Network:
- Online ID: JohnnyDaMan
- PlayStation Plus member
- Trophies: 933 Bronze, 132 Silver, 98 Gold
- Level: 15
- PSN Profile: http://psnprofiles.com/JohnnyDaMan
- Games (107): http://pastebin.com/7sgfamAe // List was too bulky for my liking
Plenty Of Fish: //Dating site!
- Profile: http://www.pof.com/membertestnotreal.htm
- Cached Profile: http://tinyurl.com/johnnydaman // HAD to cache this!
Facebook 1:
- Profile: https://www.facebook.com/JohnnyDaMan
- Cached Profile: http://tinyurl.com/JohnnyDaTest
- FB ID: 123456789123456789
Facebook 2:
- Profile: https://www.facebook.com/johnnydamannnn
- Cached Profile: http://tinyurl.com/johnnydatest2
- FB ID: 100001885467274
MySpace:
- Profile: https://myspace.com/JohnnyDaMan
Twitter:
- @JohnnyDaMan
- Profile: https://twitter.com/JohnnyDaMan
- Cached Profile: http://tinyurl.com/johnnnnyyyyydaman
BetterMan Penis Enlargement Forum: // ROOOOFL
- Profile: http://www.betterman.com/members/johnny.123456
TomsHardware:
- Profile: http://www.tomshardware.com/community/profile-JOHNNYTESTNOTREAL.htm
LOLKING:
- Profile 1: http://www.lolking.net/summoner/ru/TEST-NOT-REAL1
- Cached: http://tinyurl.com/johnnnnny1
- Profile 2: http://www.lolking.net/summoner/eune/TEST-NOT-REAL2
- Cached: http://tinyurl.com/johnnnnny2
World of Warcraft:
- Profile: http://us.battle.net/wow/en/character/maelstrom/JohnnyDaMan/simple/NOT-REAL
- Cached Profile: http://tinyurl.com/JohhnyDAMANNNN-NOT-REAL
Roblox:
- Profile: http://www.roblox.com/User.aspx?ID=TEST-TEST-NOT-REAL-JOHN
Wix:
- Profile: http://johnnnnnnnnnnyyyyyy.wix.com/JohnnyMyBoy#!__page-1 // Check out the biography on here!
Facepunch:
- Profile: http://facepunch.com/member.php?u=123456-TEST-NOT-REAL
LittleBigPlanet:
- Profile: http://lbp.me/u/JohnnyDaMan
Viddy:
- Profile: http://www.viddy.com/johnnymyboy
GameBanana:
- Profile: http://gamebanana.com/members/TEST-NOT-REAL123
RuneScape:
- Profile: http://services.runescape.com/m=hiscore/compare?user1=JohnnyDaMan-Test-Test-NOT-REAL
Spring.me:
- Profile: http://new.spring.me/#!/user/JohnnyDaMan-NOT-REAL/timeline-FAKE
Official PSDS:
- Profile: http://www.officialpsds.com/JohnnyDaMan-Profile12345-FAKE.html
WoWTrack:
- Profile: http://www.wowtrack.org/character/Johnny-Fake-Profile33
WoWProgress:
- Profile: http://www.wowprogress.com/character/us/maelstrom/Johnny/events/985830_JohnnyDaMan+joined+guild+Ethereal+Curse
WarcraftRealms:
- Profile: http://www.warcraftrealms.com/charhistory/12345678912341245129231821381238
- WarcraftRealms ID: 12345678912341245129231821381238
- Guild History: //Current Guild: Will PvP for Pantycakes
Level Guild Date
80 Will PvP for Pantycakes May 22, 10
80 Tribulations Apr 04, 10
80 Disintegration Mar 01, 10
80 Enigma Feb 19, 10
80 Orphans of Elitists Feb 18, 10
80 Unguilded Feb 10, 10
79 Unguilded Sep 07, 09
78 Unguilded Aug 26, 09
67 Symphony of Agony Apr 29, 09
66 Unguilded Apr 27, 09
64 Unguilded Apr 23, 09
63 Unguilded Apr 17, 09
59 The Vanguard Øf Death Mar 06, 09
57 Unguilded Mar 05, 09
51 Legends Never Die Oct 22, 08
39 wrath of the appollyon Aug 22, 08
18 Unguilded Jul 28, 08
11 Unguilded Jul 25, 08
▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒
JohnnyDaMan_Wix_Profile_Dump
Profile: http://johnnnnnnnnnnyyyyyy.wix.com/JohnnyMyBoy#!__page-1
Biography:
"well my past dwells in a dark cave.. I try not to open up to many people cause i believe they have an intention on trying to hurt me an what not.. i dont like to love alot because the simple fact is that when i say i love you i really mean it an some girls take the for grant an use my feelings against me to hurt me it works most of the time but thats all changing now :) so if you wanna learn more about me Pm or comment on the first page to get some answers :D"
About Me:
Name: Johny
Age: 20
State: GA
Height: 5'10
Wieght: 184
Nicknames: Aeleno , Death, JoJo
Likes: Ice cream, Girls, Dark items or objects, classic music, Death meatl , Dethklok, friends ,God
▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒
JohnnyDaMan_PlentyOfFish_Profile_Dump
Profile: http://www.pof.com/membertestnotreal.htm
Cached Profile: http://tinyurl.com/johnnydaman
About:
Non-smoker with Average body type
City:
Lawrenceranker, Georgia
Details:
20 year old Man, 5' 10" (178cm), Christian
Ethnicity:
White Aries with Blonde hair
Intent:
Voidous is looking for a relationship.
Education:
Some college
// More on his actual PoF profile
▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒
4.2 - EXAMPLE 2: Legal, Accurate, and Non-Descriptive - BAD
I think this dox is bad mainly because even though the information is accurate, it lacks description. As you can see, we had the resources available to us to create a more descriptive dox (referring to chapter 4.1) This is just flat-out lazy. This dox is also legal because once again, we put it together using publicly available information.
Code:
Name: John A. Doe
Age: 20
Address: Exact Address: 1234 Doxside Links Dr, Doxville, GA 12345
Facebook: https://www.facebook.com/JohnnyDaMan and https://www.facebook.com/johnnydamannnn
Family: George Doe, Verna Doe, Josh Doe, and Gladstone Doe
Other Info: He has some college education, maybe has a pet dog, likes ice cream
4.3 - EXAMPLE 3: Illegal, Accurate, and Descriptive - GOOD
I honestly can't stress this enough. Everything here is fake and hand-written by myself. NONE of this information is real.
Mods, please don't go about falsely banning me or removing this handbook from HackCommunity. This is supposed to be an almost exact replica of a real dox.
Code:
***REMINDER: ALL INFO BELOW IS FAKE/MADE-UP.***
NONE OF THIS IS SUPPOSED TO ACTUALLY BE REAL INFORMATION ABOUT ANY PERSON.
▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒
Name: Julia Grace Doe
Alias(es): SSJulia
Phone Number: 123-456-789X - Cell, Verizon
Address: 1234 Doxman Hill Rd, FakeCityName, NC 12345
▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒
Accounts:
https://www.facebook.com/julia.fakeprofile2
http://kik.com/u/SSJulia-FAKE-PROFILE
https://live.xbox.com/en-US/Profile?gamertag=ssjulia-fake-name
https://twitter.com/SSJulia-FAKE-PROFILE
http://instagram.com/SSJulia-FAKE-PROFILE
https://www.facebook.com/SSJulia-fakeprofile3
▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒
IP Address Information:
IP: 11X.2X.33X.44X
Decimal: 4890XXX4X6
ISP: Windstream Communications
Organization: Windstream Communications
Assignment: Dynamic
Type: Broadband
▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒
Step-Father/Father: Terry L. Doxxy
Phone Number: 123-456-1234 - Landline, Verizon
123-456-1235 - Cell, Verizon
Other Phone Numbers: 123-456-1236, 123-456-1237, 123-456-1238
Address: 1234 Sweet Sugar Ave, BaldDoxxy, MD 12345
SSN: 00x-1x-222x // This is NOT a real SSN - Remember: all of this info is made-up
DOB: 08/25/1964
▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒
Emails:
terrydoxxyfakeemail333@yahoo.com
m*********@yahoo.com
// Will be updated when the emails are jacked.
▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒
Past Addresses:
123 FakeStone Rd, Doxburger, VA 12345
456 Fakety St, Doxville Timonium, MD 12345
789 Rose Fake Ave, Doxville Timonium, MD 12345
123 Shamfake Rd, Dox Air, MD 12345
456 FakeWall Pl #4C, NottingDox, MD 12345
789 Faked St, Doxville, MD 12345
1234 NotReal Ave, BaltiDox, MD 12345
1234 SeriouslyThisIsAllFake St, Doxville, MD 12345
▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒
Verizon Wireless:
Name on file: Terry L. Doxxy
Phone on file: 123-456-789X
Address on file: 1234 Sweet Sugar Ave, BaldDoxxy, MD 12345
Account # on file: 123456789-1234
SSN: 00x-1x-333x // This is NOT a real SSN - Remember, all of this info is made-up
Email on file: terrydoxxy12345-fakeemail@yahoo.com
▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒
Mother: Allison Marie Doe
Phone Number: 123-456-001X - Landline, Windstream
123-456-002X - Cell, Verizon
Address: 1234 Doxman Hill Rd, FakeCityName, NC 12345
SSN: 00x-1x-444x // This is NOT a real SSN - Remember, all of this info is made-up
DOB: 08/05/1968
▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒
Past Addresses:
1 Fake Address Ct, Towson, MD 12345
2 Fake Address Ct, Towson, MD 12345
3 Fake Address Ct, Towson, MD 12345
55 Goldstoney St, Kannapolissy, NC 12345
66 Goldstoney St, Kannapolissy, NC 12345
77 Goldstoney St, Kannapolissy, NC 12345
88 Goldstoney St, Kannapolissy, NC 12345
99 EasternFake Ave, Baltimuck, MD 54321
▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒
Windstream Communications:
Name on file: Allison Marie Doe
Phone on file: 123-456-789X
Address: 1234 Doxman Hill Rd, FakeCityName, NC 12345
Account # on file: 062158884
SSN on file: 123-xx-1234 // FAKE SSN - MADE UP - NOT INTENDED TO BE REAL
Email on file: CMDoeFAKE@windstream.net
▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒
Verizon Wireless:
Name on file: Allison Marie Doe
Phone on file: 123-456-789X
Address: 1234 Doxman Hill Rd, FakeCityName, NC 12345
Account # on file: 04137013800-0001
SSN on file: XXX-XX-1234 // Once again, still fake info
Email on file: cdoe.FAKE@netzero.net
▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒
Verizon Wireless #2:
Name on file: Allison Marie Doe
Phone on file: 123-456-789X
Address: 1234 Doxman Hill Rd, FakeCityName, NC 12345
Account # on file: 04137013800-0001
SSN on file: XXX-XX-1234 // Still Fake
Email on file: cdoe-FAKE@netzero.net
▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒
NetZero:
Account Status: Free
Name on file: Allison Marie Doe
Phone on file: 123-456-789X
Address: 1234 Doxman Hill Rd, FakeCityName, NC 12345
Member ID on file: cfakedoe
Email on file: cdoe-FAKE@netzero.net
▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒
Uncle: Chandler Fakey Doe
Phone Number: 123-456-789X - Landline, Windstream
Address: 123 FakeAddress St, Kannapolissy, NC 12345
▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒
Past Addresses:
123 KanssyFake St, Kannapolissy, NC 12345
123 Faketon Ln, Columbia, SC 12345
123 GoldDox St, Kannapolissy, NC 12345
111 True Dox St, Columbia, SC 12345
222 Doxxa Vista Dr #3, Columbia, SC 12345
333 Doxsom St, Columbia, SC 12345
444 Fakefield Rd #15, Columbia, SC 12345
555 Winddox Fax Dr, Columbia, SC 12345
▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒
Aunt: Ashton Olise Doe
Phone Number: 123-456-789X - Landline, Windstream
Address: 123 FakeAddress St, Kannapolissy, NC 12345
▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒
Past Addresses:
123 KanssyFake St, Kannapolissy, NC 12345
123 Faketon Ln, Columbia, SC 12345
123 GoldDox St, Kannapolissy, NC 12345
111 True Dox St, Columbia, SC 12345
222 Doxxa Vista Dr #3, Columbia, SC 12345
333 Doxsom St, Columbia, SC 12345
444 Fakefield Rd #15, Columbia, SC 12345
555 Winddox Fax Dr, Columbia, SC 12345
▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒
Cousin: Kayla Frances Doe
Phone Number: 123-456-789X - Landline, Windstream
Address: 123 FakeAddress St, Kannapolissy, NC 12345
▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒
Accounts:
https://www.facebook.com/kayla.FAKEDOX1
https://www.twitter.com/kfFAKEdoe/
http://www.etsy.com/people/kFAKEdoey
http://favstar.fm/users/kfFAKEdoe/
http://www.meetup.com/StreetTeam/members/1111123FAKE/FAKE/NOTREAL
▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒
Skypes:
kaydoeyyyy-FAKE
kayla.doe.fake
kayla.doooeee.fake
kayla.DOOOOOEEEE.FAKE
▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒
Cousin: Hannah Fake
Phone Number: 123-456-789X - Landline, Windstream
Address: 123 FakeAddress St, Kannapolissy, NC 12345
▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒
Accounts:
https://twitter.com/HannahFake
https://www.facebook.com/hannah.Fake.99999.FAKEDOX
▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒
Grandfather: Glen Alden Doe
Phone Number: 123-456-789X - Landline, Windstream
Address: 123 TimberFake Ct, Fakeytown, NC 12345
▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒
Emails:
gdoe.fake@cableone.net
gdoe.fake@carolina.rr.com
▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒
Past Addresses:
1234 Doxman Hill Rd, FakeCityName, NC 12345
222 Doxxa Vista Dr #3, Columbia, SC 12345
333 Doxsom St, Columbia, SC 12345
444 Fakefield Rd #15, Columbia, SC 12345
▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒
Grandmother: Carol Johns Doe
Phone Number: 123-456-789X - Landline, Bellsouth
Address: 222 Doxxa Vista Dr #3, Columbia, SC 12345
▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒
Past Addresses:
1234 Doxman Hill Rd, FakeCityName, NC 12345
222 Doxxa Vista Dr #3, Columbia, SC 12345
333 Doxsom St, Columbia, SC 12345
444 Fakefield Rd #15, Columbia, SC 12345
▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒
Aunt: Laura R. Doe
Address: 1234 Winddon Lake Blvd, Columbia, SC 12345
▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒
Past Addresses:
123 FakeAddress Ave Brooklyn, MD 12345
12345 White Dox St West Port, FL 12345
▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒
***ANOTHER REMINDER: THIS IS SERIOUSLY ALL FAKE. PLEASE DON'T FALSELY BAN ME MY MOD FRIENDS ;(***
Allison’s Credit Rape (Report):
-------------------------------------------------
File Number: 123456789 (fake)
-------------------------------------------------
Personal Information
You have been on our files since 05/08/1987
SSN:123-XX-4567 // Fake
Your SSN has been masked for your protection. // Fake anyway
Date of Birth: 05/08/1969
Names Reported: ALLISON MARIE DOEDOE, ALLISON M. DOE, ALLISON M. DOPEY and ALLISON M. DOEY
Addresses Reported:
Address Date Reported // All Fake Again
1234 DOXMAN HILL RD, FAKECITYNAME, NC 12345 03/19/2004
-------------------------------------------------
Telephone Numbers Reported:
(123) 456-789X (123) 456-111X
Employment Data Reported:
Employer Name Date Verified
WALKER MARKETING 1 2/09/2011
-------------------------------------------------
Account Information
Typically, creditors report any changes made to your account information monthly. This means that some accounts listed below may not
reflect the most recent activity until the creditor's next reporting. This information may include things such as balances, payments, dates, remarks, ratings, etc. The key(s) below are provided to help you understand some of the account information that could be reported.
-------------------------------------------------
Rating Key
-------------------------------------------------
Some creditors report the timeliness of your payments each month in relation to your agreement with them. The ratings in the key below describe the payments that may be reported by your creditors. Please note: Some but not all of these ratings may be present in your credit report.
-------------------------------------------------
TransUnion Legendary Report
Remarks Key
-------------------------------------------------
Additionally, some creditors may notate your account with comments each month. We refer to these creditor comments as 'Remarks'. The key below gives the descriptions of the abbreviated remarks contained in your credit file. Any remark containing brackets > < indicates that this remark is considered adverse.
-------------------------------------------------
CBC ACCOUNT CLOSED BY CONSUMER CBG CLOSED BY CREDIT GRANTOR CLO CLOSED
-------------------------------------------------
Adverse Accounts
Adverse information typically remains on your credit file for up to 7 years from the date of the delinquency. To help you understand what is generally considered adverse, we have added >brackets< to those items in this report. For any account that contains medical information, the information following 'Medical-' is not displayed to anyone but you except where permitted by law. For your protection, your account numbers have been partially masked, and in some cases scrambled.
-------------------------------------------------
CCSMC SPECTRUM/CBNA #123456789****
PO BOX 1234
FAKE DOX, SD 12345
(123) 456-789X
Date Opened: 12/03/2008
Responsibility: Individual Account
Account Type: Revolving Account
Loan Type: CREDIT CARD
Balance: $0
Date Updated: 09/25/2013
Payment Received:$0
Last Payment Made: 03/29/2010
High Balance: $1,234
Credit Limit: $123
Pay Status: Current; Paid or Paying as Agreed
Terms: Paid Monthly
Date Closed: 04/23/2009
Date Paid: 05/29/2010
>Maximum Delinquency of 30 days in 03/2010<
ACCOUNT CLOSED BY CONSUMER; CLOSED
-------------------------------------------------
DOXXY/JC FAKEY STATESID #123456789****
PO BOX 1234567
ORLANDO, FL 12345-1234
(123) 456-7890
Date Opened: 07/10/2009
Responsibility: Individual Account
Account Type: Revolving Account
Loan Type: CHARGE ACCOUNT
Date Updated: 10/11/2012
Payment Received: $0
Last Payment Made: 03/07/2011
Pay Status: Current; Paid or Paying as Agreed
Terms: Paid Monthly
Date Paid: 04/07/2010
>Maximum Delinquency of 30 days in 10/2009 for $30<
High balance of $100 from 06/2011 to 11/2013
Credit Limit:
Credit limit of $850 from 06/2011 to 11/2013
-------------------------------------------------
DOXXY-FAKE DEPARTMENT STORE #123456789****
PO BOX 1234
FAKEYADDRESS, WI 12345
(123) 456-789X
Date Opened: 07/22/2008
Responsibility: Individual Account
Account Type: Revolving Account
Loan Type: CHARGE ACCOUNT
Date Updated: 12/09/2013
Payment Received: $0
Last Payment Made: 01/17/2013
Pay Status: Current; Paid or Paying as Agreed
Terms:Paid Monthly
Date Paid: 01/17/2013
>Maximum Delinquency of 30 days in 10/2007
High balance
High balance of $241 from 06/2011 to 06/2011; $241 from 08/2011 to 12/2013
Credit limit
Credit limit of $1,000 from 06/2011 to 06/2011; $1,000 from 08/2011 to 12/2013
-------------------------------------------------
FAKE DOX GROUP #12345**
123 LE DOXXY CT
CONCORD, NC 12345-1234
(123) 456-789X
Placed for collection: 07/02/2010
Responsibility: Individual Account
Account Type: Open Account
Loan Type: COLLECTION AGENCY/ATTORNEY
Balance: $123 Date Updated: 02/25/2011
Original Amount:$200
Original Creditor: MEDICAL-KANNAPOLISSY INTERNAL MEDICINE (Medical/Health Care)
Past Due: >$123< Pay Status:>In Collection<
Satisfactory Accounts
The following accounts are reported with no adverse information. For your protection, your account numbers have been partially masked, and in some cases scrambled.
-------------------------------------------------
BANK OF FAKE-AMERICA #123456789****
P O BOX 123456
EL DOX-O, TX 12345-1234
Date Opened: 09/19/2004
Responsibility: Individual Account
Account Type: Revolving Account
Loan Type: CREDIT CARD
Date Updated: 11/22/2013
Payment Received: $123
Last Payment Made: 12/15/2013
Pay Status:Current; Paid or Paying as Agreed
Terms: $69 per month, paid Monthly
High Balance:
High balance of $1,234 from 08/2011 to 12/2013
Credit Limit:
Credit limit of $1,234 from 08/2011 to 12/2013
-------------------------------------------------
FAKE FEDERAL CREDIT DOX #12345****
1234 DOX-FAKE ROAD
FAKEMOND, VA 12345
(123) 456-789X
Date Opened: 07/15/2008
Responsibility: Individual Account
Account Type: Installment Account
Loan Type: AUTOMOBILE
Date Updated: 07/28/2013
Payment Received: $0
Last Payment Made: 07/28/2013
Pay Status: Current; Paid or Paying as Agreed
Terms:$123 per month, paid Monthly for 60 months
Date Closed: 07/12/2013
High Balance:
High balance of $10,000 from 07/2011 to 09/2013
CLOSED
Account Review Inquiries
The listing of a company's inquiry in this section means that they obtained information from your credit file in connection with an account review or other business transaction with you. These inquiries are not seen by anyone but you and will not be used in scoring your credit file (except insurance companies may have access to other insurance company inquiries, certain collection companies may have access to other collection company inquiries, and users of a report for employment purposes may have access to other employment inquiries, where permitted by law).
▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒
4.4 - EXAMPLE 4: Illegal, Accurate, and Non-Descriptive - BAD
This dox also contains "accurate" information (even though it isn't actually real), but it's not descriptive one bit whatsoever. I mean, look at what we are capable of making (referring to 4.3)
Code:
Name: Julia G. Doe
Alias(es): SSJulia
IP: 11X.2X.33X.44X
Phone Number: 123-456-789X - Cell, Verizon
Address: 1234 Doxman Hill Rd, FakeCityName, NC 12345
Facebook: https://www.facebook.com/julia.fakeprofile2
Step Father's SSN: 00x-1x-222x // Not real
Mother's SSN: SSN: 00x-1x-444x // This is NOT a real SSN - Remember, all of this info is made-up
PREVENTING A DOX
[x] Chapter 5.0 - Public Records
Spoiler:
When gathering information on an individual, you often have the availability of social media, accounts, public records which can easily be used to the doxer's advantage. There are plenty of websites which allow you to access 'public information' that people really don't want all that public (eg. names, family members, addresses, phone numbers, photos, criminal records, etc.) It's good to try and see what you can find about yourself on a few of these websites then try your best to remove the information from the web, or at least try and make it more private so it isn't as publicly available anymore. This is all information that an attacker could potentially be using in a dox of your very own.
Some of the websites that can be used for gathering basic information are:
1. http://yahoo.intelius.com/
2. http://www.findermind.com/free-people-search-engines/
3. http://www.peekyou.com/
4. http://aad.archives.gov/aad/series-list.jsp?cat=GS29
5. http://www.192.com/
6. http://www.freecellphonedirectorylookup.com
8. http://www.archive.org/web/web.php
9. http://www.numberway.com/phone-numbers/3/
10. https://www.vinelink.com/vinelink/initMap.do
11. http://www.jailbase.com/en/sources/fl-lcso/
12. http://publicrecords.onlinesearches.com
13. http://zillow.com
14. www.spokeo.com
16. www.pipl.com
17. www.ipeople.com
18. https://www.facebook.com/directory/people/
19. www.whitepages.com
20. www.yasni.com
21. www.skipease.com
22. www.peekyou.com
23. www.soople.com
24. www.zaba.com
25. http://www.zabasearch.com/
26. http://www.abika.com
27. http://www.freeality.com
28. http://www.radaris.com
29. http://www.fonefinder.net
30. http://wink.com/
31. http://spock.com
32. http://socialmention.com/
33. http://www.whostalkin.com/
34. http://www.oneriot.com/
35. http://www.kosmix.com/
36. http://www.yacktrack.com
37. http://www.keotag.com/
38. http://twoogel.com
39. http://knowem.com
40. And many, MANY more...
And go ahead, use the above services to try doxing yourself, but I suggest using these for the sake of simplicity:
www.google.com - With a basic search you can find pictures, videos, social media accounts, and so much more!
www.pipl.com - Can find a ton of stuff about an individual which Google wont
www.whitepages.com - Phone numbers, addresses, family, etc.
www.advancedbackgroundchecks.com Phone numbers, addresses, family, etc.
www.tineye.com - Reverse image search
Some of the websites that can be used for gathering basic information are:
1. http://yahoo.intelius.com/
2. http://www.findermind.com/free-people-search-engines/
3. http://www.peekyou.com/
4. http://aad.archives.gov/aad/series-list.jsp?cat=GS29
5. http://www.192.com/
6. http://www.freecellphonedirectorylookup.com
8. http://www.archive.org/web/web.php
9. http://www.numberway.com/phone-numbers/3/
10. https://www.vinelink.com/vinelink/initMap.do
11. http://www.jailbase.com/en/sources/fl-lcso/
12. http://publicrecords.onlinesearches.com
13. http://zillow.com
14. www.spokeo.com
16. www.pipl.com
17. www.ipeople.com
18. https://www.facebook.com/directory/people/
19. www.whitepages.com
20. www.yasni.com
21. www.skipease.com
22. www.peekyou.com
23. www.soople.com
24. www.zaba.com
25. http://www.zabasearch.com/
26. http://www.abika.com
27. http://www.freeality.com
28. http://www.radaris.com
29. http://www.fonefinder.net
30. http://wink.com/
31. http://spock.com
32. http://socialmention.com/
33. http://www.whostalkin.com/
34. http://www.oneriot.com/
35. http://www.kosmix.com/
36. http://www.yacktrack.com
37. http://www.keotag.com/
38. http://twoogel.com
39. http://knowem.com
40. And many, MANY more...
And go ahead, use the above services to try doxing yourself, but I suggest using these for the sake of simplicity:
www.google.com - With a basic search you can find pictures, videos, social media accounts, and so much more!
www.pipl.com - Can find a ton of stuff about an individual which Google wont
www.whitepages.com - Phone numbers, addresses, family, etc.
www.advancedbackgroundchecks.com Phone numbers, addresses, family, etc.
www.tineye.com - Reverse image search
[x] Chapter 6.0 - Social Media
Spoiler:
Social media accounts are a doxer's bestfriend. Most people often leave their settings so that their posts are publicly available for anyone to see. Not to mention 9/10 times people will add just about anyone who sends them a friend request. Now you probably don't think this is a big deal, but let's put some scenarios out here... (we'll be temporarily calling our doxer Johnny)
--------------------------------------------------------------
In this chapter, we'll be starting off by revealing some realistic doxing scenarios to you. Please do yourself a favour by paying attention to exactly what's happening during each one of these scenarios for an optimal learning experience. Don't hesitate to read them over more than once!
Scenario 1: The Facebook Doxer - Young Johnny one day gets into a heated debate on Facebook. Johnny is not happy with the outcome of the debate, so he decides to get revenge on this other guy by posting his personal information all over the Internet. Now Johnny didn't actually know how to make a dox though, so he started with the easiest place he could think of: the Dox Victim's social media accounts like Facebook and Twitter! Remember that one status you made last month saying "Text me!!:* Bored outta my miiiind! 123-456-7890 !", or when you forgot to change your Facebook Friend List settings from "Public" to "Only Me"? I bet you never thought that someone like young Johnny would find everyone in your family that uses Facebook using your vulnerable Friend List alone, save those family members with the phone number in a file with the rest of your personal information which he found on your Facebook, and use it to expose you to the rest of the net! Yeah, making a dox can be that easy... Oh, and you should consider if this "Johnny" boy could also be the doxer from figure 1.4 (A Dox Victim's Scenario - Check part 4 of chapter 1)
How to prevent this: Secure your social media accounts; don't leave anything public, don't add people who you don't know, don't post your phone number, use false information whenever possible. If you no longer use your social media accounts, delete or deactivate them.
--------------------------------------------------------------
Scenario 2: The Forum Doxer - Today Johnny finds himself on a forum with someone who has the username of "UberDog34". Once again, Johnny loses the debate and is very mad at the other forum member so he decides to do the only thing he knows how to do to get revenge on the other guy - Dox him. All UberDog34 has on his forum profile is his birthdate, but that's obviously not enough for a dox. So Johnny keeps digging for information by searching through his posts and he found his system specs, confirmed his age, and found an email. Now that Johnny has analyzed Uber's entire profile, he needs to try something new. Johnny just got the sudden idea to try using Google to his benefit just like it did back when he was hacking using Google dorks (*cough* using dork methods to narrow your search can help sometimes *cough*). First, he used Google by looking up UberDog34's username which turned out to be a universal username, right away this linked us to many other accounts of his which we could find tons of personal information on. Secondly, he searched the email and found out that it was also a universally used email for UberDog34 - this lead us to his personal Facebook, Twitter, MySpace, YouTube, Google+, EVERYTHING!
How to prevent this: don't use a universal username, or the same email for everything. Instead try using services such as 10 Minute Mail for quick and easy-to-use emails that require minimal effort to setup/use. Also, don't post anything too personal about yourself... ever.
--------------------------------------------------------------
For this scenario, we'll be making the Dox Victim's name @"Geoff" just because I like to make my examples fun and interactive!
Scenario 3: The ISP / IP Doxer - Johnny got into yet another heated debate, but this time on Skype. All he had was the guys alias "@"Geoff"" and he used a Skype IP Resolver to get his IP address as well. Since "Geoff" can't be found as easily as UberDog34 on the net, Johnny had to try out something new - Dox Geoff using only an IP address. Immediately Johnny starts snooping about and ends up doing an IP Lookup on "Geoff". The results of this lookup tells Johnny Geoff's approximate location and ISP provider which just so happened to be Comcast! With this information, he calls up Comcast, puts his social engineering skills to use and said the following: Hello my name is Johny and my employee ID is (What ever you want e.g 809*jly) and I am from customer care and my floor is down because of maintenance and my level 2 told me to contact you guys to look up an account for me and verify some information. Before he knew it, he was saying "Thank you for your cooperation. Have a nice shift." as he proceeded to sort through the names, SSNs, phone numbers, addresses, and emails he just now found which just so happened to belong to this "Geoff" guy.
How to prevent this: use a VPN, proxies, switch IPs constantly, and setup whatever other protection you need to take make yourself feel a little bit (or a lot) more secure.
--------------------------------------------------------------
Now that we have that out of the way, let's go over some rules which could help prevent this from happening to you. These rules may not be 100% effective in preventing a dox, but they'll certainly limit the amount of information the doxer is able to obtain.
My rules for using a social media account securely:
How to take your last name off Facebook:
Step 1) Get a fresh Indonesian HTTP proxy (Proxies Available Here)
Step 2) Login to Facebook
Step 3) Change your language to "Bahasa Indonesian"
Step 4) Go to your web browsers network settings and use the "Manual proxy configuration" option (using Firefox for this example. Works on Chrome too. It might be slightly different from what I'm saying, but whatever)
Step 5) Set the HTTP Proxy option to use whatever Indonesian proxy you grabbed and set the port to the port you'll be accessing it through (normally it's port 8080, 80, or 3128) It will say the port on the website if you used the one I linked to above; HideMyAss.
Step 6) Set it to use the proxy for all protocols
Step 7) Press "Okay"
Step 8) Go to your Facebook, remove your last name
Step 9) Save your Facebook settings
Step 10) Set your language back to your preferred language and whatever your preferred proxy settings were prior to this name change!
--------------------------------------------------------------
In this chapter, we'll be starting off by revealing some realistic doxing scenarios to you. Please do yourself a favour by paying attention to exactly what's happening during each one of these scenarios for an optimal learning experience. Don't hesitate to read them over more than once!
Scenario 1: The Facebook Doxer - Young Johnny one day gets into a heated debate on Facebook. Johnny is not happy with the outcome of the debate, so he decides to get revenge on this other guy by posting his personal information all over the Internet. Now Johnny didn't actually know how to make a dox though, so he started with the easiest place he could think of: the Dox Victim's social media accounts like Facebook and Twitter! Remember that one status you made last month saying "Text me!!:* Bored outta my miiiind! 123-456-7890 !", or when you forgot to change your Facebook Friend List settings from "Public" to "Only Me"? I bet you never thought that someone like young Johnny would find everyone in your family that uses Facebook using your vulnerable Friend List alone, save those family members with the phone number in a file with the rest of your personal information which he found on your Facebook, and use it to expose you to the rest of the net! Yeah, making a dox can be that easy... Oh, and you should consider if this "Johnny" boy could also be the doxer from figure 1.4 (A Dox Victim's Scenario - Check part 4 of chapter 1)
How to prevent this: Secure your social media accounts; don't leave anything public, don't add people who you don't know, don't post your phone number, use false information whenever possible. If you no longer use your social media accounts, delete or deactivate them.
--------------------------------------------------------------
Scenario 2: The Forum Doxer - Today Johnny finds himself on a forum with someone who has the username of "UberDog34". Once again, Johnny loses the debate and is very mad at the other forum member so he decides to do the only thing he knows how to do to get revenge on the other guy - Dox him. All UberDog34 has on his forum profile is his birthdate, but that's obviously not enough for a dox. So Johnny keeps digging for information by searching through his posts and he found his system specs, confirmed his age, and found an email. Now that Johnny has analyzed Uber's entire profile, he needs to try something new. Johnny just got the sudden idea to try using Google to his benefit just like it did back when he was hacking using Google dorks (*cough* using dork methods to narrow your search can help sometimes *cough*). First, he used Google by looking up UberDog34's username which turned out to be a universal username, right away this linked us to many other accounts of his which we could find tons of personal information on. Secondly, he searched the email and found out that it was also a universally used email for UberDog34 - this lead us to his personal Facebook, Twitter, MySpace, YouTube, Google+, EVERYTHING!
How to prevent this: don't use a universal username, or the same email for everything. Instead try using services such as 10 Minute Mail for quick and easy-to-use emails that require minimal effort to setup/use. Also, don't post anything too personal about yourself... ever.
--------------------------------------------------------------
For this scenario, we'll be making the Dox Victim's name @"Geoff" just because I like to make my examples fun and interactive!
Scenario 3: The ISP / IP Doxer - Johnny got into yet another heated debate, but this time on Skype. All he had was the guys alias "@"Geoff"" and he used a Skype IP Resolver to get his IP address as well. Since "Geoff" can't be found as easily as UberDog34 on the net, Johnny had to try out something new - Dox Geoff using only an IP address. Immediately Johnny starts snooping about and ends up doing an IP Lookup on "Geoff". The results of this lookup tells Johnny Geoff's approximate location and ISP provider which just so happened to be Comcast! With this information, he calls up Comcast, puts his social engineering skills to use and said the following: Hello my name is Johny and my employee ID is (What ever you want e.g 809*jly) and I am from customer care and my floor is down because of maintenance and my level 2 told me to contact you guys to look up an account for me and verify some information. Before he knew it, he was saying "Thank you for your cooperation. Have a nice shift." as he proceeded to sort through the names, SSNs, phone numbers, addresses, and emails he just now found which just so happened to belong to this "Geoff" guy.
How to prevent this: use a VPN, proxies, switch IPs constantly, and setup whatever other protection you need to take make yourself feel a little bit (or a lot) more secure.
--------------------------------------------------------------
Now that we have that out of the way, let's go over some rules which could help prevent this from happening to you. These rules may not be 100% effective in preventing a dox, but they'll certainly limit the amount of information the doxer is able to obtain.
My rules for using a social media account securely:
- Don't post too much real information
- Use fake information when possible (make the fake information a bit more publicly available than the real information - consider using http://www.fakenamegenerator.com/ for this)
- Make everything as private as possible (eg. change all of your privacy settings on Facebook from "Friends Only" to "Only Me")
- Only add people you know
- Don't talk to strangers
- Don't click random/sketchy links
- Make sure the person who you're about to give your phone number or address to is the real them.
- Don't have a last name when possible (quick tutorial for Facebook below)
- If there isn't already an official problem, don't make one; don't start shit with people, or get cocky (or this could be you)
- Have a complex password; use special characters, make it over 20 characters long, and use uppercase and lowercase characters
- Never use a universal username (not even for games)
- Consider using a fake name/identity for everything you do online
- Be self-aware; know what's on your profile, and try doxing yourself using only your Facebook so you know what's actually there
How to take your last name off Facebook:
Step 1) Get a fresh Indonesian HTTP proxy (Proxies Available Here)
Step 2) Login to Facebook
Step 3) Change your language to "Bahasa Indonesian"
Step 4) Go to your web browsers network settings and use the "Manual proxy configuration" option (using Firefox for this example. Works on Chrome too. It might be slightly different from what I'm saying, but whatever)
Step 5) Set the HTTP Proxy option to use whatever Indonesian proxy you grabbed and set the port to the port you'll be accessing it through (normally it's port 8080, 80, or 3128) It will say the port on the website if you used the one I linked to above; HideMyAss.
Step 6) Set it to use the proxy for all protocols
Step 7) Press "Okay"
Step 8) Go to your Facebook, remove your last name
Step 9) Save your Facebook settings
Step 10) Set your language back to your preferred language and whatever your preferred proxy settings were prior to this name change!
[x] EBOOK - Download the rest of this eBook for free!
Spoiler:
![[Image: 3fR6azj.png]](https://i.imgur.com/3fR6azj.png)
Maxx's Anti-Dox Handbook is now an actual eBook thanks to chmod from HC.
Download the file below. If there are any issues with any links or downloads, please let me know.
Download:
http://www.mediafire.com/download/luqbpv...ndbook.pdf
Virus Scan:
https://www.virustotal.com/en/file/e89cb...407259634/
(This post was last modified: 10-01-2014, 06:49 PM by Enigma.)