Advertisement
Guest User

How To Dox Anyone

a guest
Mar 13th, 2018
212
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 11.68 KB | None | 0 0
  1. -- In Depth How-to Dox TuT (For Educational Purposes ONLY) --
  2.  
  3. What a dox is: A dox is a document, filled with personal information about a target. (Some Doxes are simple, some are very detailed with much more sensitive info, it's up to you.)
  4.  
  5. -- Example of a Dox --
  6. > http://pastebin.com/dhZmsBWF <
  7. (Dox not by me)
  8.  
  9. -- Basic Dox Template --
  10.  
  11. Full Name:
  12. Address:
  13. Skype:
  14. Usernames:
  15. Social Networking Sites:
  16. SSN (Social Security Numbers):
  17. Sensitive Info (Credit Card, Password, Email etc):
  18. Phone #:
  19. Parent Names:
  20. Siblings:
  21. Relatives:
  22. IP (Internet Protocol Address):
  23. More Info (Nicknames, Associates, Websites, Favorite Game Servers, Owned Game Servers, etc):
  24. Previous Addresses:
  25. Anything else you wish to add or take out (Address, Phone Number, IP & *Email is all that really matters)
  26.  
  27. -- Step 1 (HOW-TO) --
  28.  
  29. Whitepages Method (Easy):
  30. There are many different ways to approach doxing someone, and the stratigies vary depending on the anonimity and stupidity of your target. Let's say that you are wanting to dox a 13 year old Minecraft kiddie, you gain their trust, and obtain their Skype. Once you have that you just use a Skype Resolver to find the target's IP Address. Assuming the kid has some infomation about his/herself, on the Skype profile page, like their First/Last name, you can do some simple research on their name and find something like a Facebook page, Twitter, etc. This info can be used in your dox also, once you have that, you get their first and last name, and use http://whitepages.com to lookup their region (to find their region, you simply do an IP Lookup on the target's IP Address), and last name, the tricky part comes in when you must sort out which one is your target, there are a few ways to do this. Call the phone number displayed on the page, and ask for your target on the phone, if they say something revealing hang up, and you've found them. If the all people say there is nobody there, they probably are aware what you are trying to do because your target's are somewhat smarter than that... Anyways, you can also talk to the target, and social engineer their parent's name from them, this takes some skill in SE'ing, and it can be tricky. If this method proves unreliable, you can find the parents Facebook page (if applicable) and look on their friends list, looking for your target, if your target is friends with the adult, boom you've got it. If none of these work, don't give up, just work harder and use these next methods.
  31.  
  32. Paypal (Easy):
  33. This is probably one of the easiest ways to dox someone, if you know the PayPal email of the target just send them any amount of money, ($.01) once the payment is completed, the billing address will be revealed, and there you have it. There are many ways of retrieving their PayPal email, as they are eager to give it out because they probably think they are going to be recieving some sort of payment. And they usually have the correct billing info because they weren't thinking about when signing up, and figured if they used the wrong info, if they ordered something online (a package) it wouldn't go to their address. You wouldn't want to be wrongfully or rightfully spied on by your government, would you?
  34.  
  35. Whois Domain Lookup (Easy/UNRELIABLE):
  36. Who.is is very easy, if your target own's a domain, and is dumb enough to register that domain with their real information. When you do a Whois lookup on a domain, you get the domain Owner/Registrar's information (Address, Phone #, Email) chances are they filled out false information so this method is by far the most unreliable, but very easy.
  37. Phishing (Semi-Difficult):
  38. Depending on your knowledge of phishing, and skill of it. You should know how to phish, and get their address, Credit cards, and more. (This method is highly illegal, and not recommended by me at all, unless you're skilled) With this method, it is very easy to recieve highly sensitive information, and if you are unaware on how to phish, there are many Tuts online, just look them up, (Using Tor/Proxy/Cyberghost or another good VPN) chances are your government has flagged users who search for things like "How To phish" so just be careful.
  39.  
  40. ISP Doxing (Semi-Difficult):
  41. #1.) Using the targets ISP, you can call the company making a fake complaint on the IP address, and using the name, or no name, saying that you are a Private Investegator requesting for a persons information (Address, Phone Number) on file, so that you are able to press charges against the person.
  42. #2.) Call saying you are a worker out in the field working, and you have a client who just called from an IP, and didn't tell you their Home Address, and all you have is their IP, and name. Tell them that you need their Address, and some information to verify the customers identity. If you're lucky, and have good SE skills, you may come out with the Social Security Numbers on file etc.
  43.  
  44. Social Engineering (Varying Difficulty):
  45. If you are skilled in SE, your best bet is to straight up social engineer all the info out of your target, you can do this by finding the Email of your target, and using a site like (http://emkei.cz/) and faking the heading to make it look like an Official Site is requesting your wanted information, this is like phishing, but it's not. You just talk to them, and act like you are with Facebook for example, you can make it look like (admin@facebook.com) is emailing them, once you have tricked them into thinking you're legit, all you gotta do is persuade them into giving you the desired information. :)
  46.  
  47. RAT (Difficult):
  48. Ratting takes programming skills, Python preferably. If you know how to RAT, you shouldn't need this tutorial, as it is very easy for you to obtain this information, RAT's can be used for many other things than just Doxxing, but it's useful to Dox. If you don't know what a RAT is, do some research and if you're wanting to learn how-to RAT, you might wanna learn to code, as the free services available to the public ie: DarkComet, jRat, etc. are either non-functional, or contain Malicious software in itself infecting the unsuspecting user of the product, so just be careful, when you RAT, make sure you Crypt it and take time perfecting your code, as a generic AV Program will be able to detect a poorly coded RAT.
  49.  
  50.  
  51. -- Step 2 (What to do with a Dox) --
  52.  
  53. Blackmail (Easy):
  54. Tell your target you will do much worse things to them if they do not comply with your wished (please don't go overboard with this) ask for around $50 or something, don't be a complete asshole. If they disagree move on, and do some of the following, if you're a dick, and still feel like trolling even if they payed you etc, you can still do the following things.
  55.  
  56. Leak the Dox (Easy):
  57. Paste the Dox on many different public pasting sites (SkidPaste.org, DoxBin.ru <TOR>, Pastebin.com, Pastie.org & more)
  58. Send the link to your target etc.
  59.  
  60. Scare/Troll (Easy):
  61. Tell the target you are going to "hire a hitman" or something of the sort, this is very wrong and I do not suggest this option, as it could really cause some mental scarring/ruin their peace of mind. This is very illegal and you could be held to the law for this, just be careful, please don't use this method..
  62.  
  63. Text Bomb (Depending):
  64. Use a Text Bombing Site to spam someones Mobile phone, and spam their phone number with many texts.
  65.  
  66. Pizza Bomb (Semi-Simple):
  67. Call the local pizza shop of the target, and order lots of pizzas to their address, call many other resteraunts nearby and send them all to their address, tell the Cashier on the phone that you're having a party and you need around 14 cheese pizzas or something like that (use an anonymous calling service, chances are it's not worth the companies time to file any lawsuits, so this is not very risky) however, it is morally wrong, and you are wasting the companies money, use at own risk as it is illegal.
  68.  
  69. SWAT (Semi-Difficult):
  70. (DO NOT DO THIS, PLEASE) First of all, not all countries have SWAT, so this only applies to some people, to achieve a SWAT, you must call Emergency Services and report a false crime that happened at the targets adress, the more creative, and crazy, the more priority your call recieves. A SWAT is taken very seriously so be careful, I highly suggest you do not use this method, in America, they will open up a case to investigate the caller.. if you are doing a large swat, I suggest going to a public place with public WiFi (McDonalds, Starbucks, etc) and use VirtualBox, Tor, Proxy, VPN, and everything else you have access to stay Anonymous. (You can call saying many different things, and use different methods of making the call)
  71.  
  72. Taxi Bomb (Easy):
  73. Call local Taxi Services, requesting for a van to the address, they will sit outside the home and honk for a while, very funny.
  74.  
  75. Other Cars Bombing (Easy):
  76. Do the same thing above with other services, Airport Shuttles, Uber (US), Limousine Service
  77.  
  78. Free Boxes (Easy/USA):
  79. Order 10/15 Boxes to the targets home, this is just for fun, and doesn't do much, but if you're looking to just piss the people off, this should sustain for a while.
  80.  
  81. DDOS (Easy):
  82. This is just to mess with your target, more of just a troll thing. A ddos attack is not something that you should use to try and scare your target, as it is very harmless, etc.
  83. To ddos use an online booter service, this is the easiest way for a non-advanced user temporarily hit-off your generic home network without protection.
  84. - ragebooter.net -
  85. - titaniumstresser.net -
  86.  
  87. Cleaning Services & Other Home/Delivery Services (Easy):
  88. Order a home cleaning service, gardners, Pest Control, home doctors, Home Remodling/Improvement services
  89.  
  90. -- More --
  91.  
  92. eXtra Tips:
  93. - If you have a group, or just a bunch of mates willing to help you out with performing these things, that would be very useful and much more efficient.
  94. - Make sure you cover your tracks in every way you know possible, as some people take these things serious and may be willing to hire an attourny or professional investegator to track you down. Just be careful and try not to take things too serious.
  95. - Research how to do the following things anonymously, as some of the resources I have provided may not be as helpful as the ones you may come across.
  96. - These all work best when you attract all the above at the same time... veryyy amazing, afterwards talk to your target, and see how they feel about it.
  97. - With a Jailbroken phone, you can get applications to spoof your phone number, and order these services, there are also online sites that allow you to use a false number, or just spoof it to make the call.
  98.  
  99. |! DISCLAIMER: !|
  100. # I can not and will not be held responsible for how you chose to use this information, and everything you do can be persecuted # by law. Some of the things above are very illegal, and some are not, use your own judgement to decide what you are willing to # do. This tutorial is strictly for educational purposes, and should be used so that you can protect yourself against malicious # hackers with bad intentions against you, you should be careful who you interact with, and make angry on the internet. Sorry #for my rant, just be careful with this, with great power, comes great responsibility.
  101.  
  102. Please, take a few seconds to follow me on the following sites, it is greatly appriciated. :)
  103. >
  104. ###########################################
  105. # Twitter: http://twitter.com/SystemIntel #
  106. # Skype: sys.intel #
  107. # Outlook: sysintel@outlook.com #
  108. # Facebook: http://ta.gd/Cody #
  109. # GMX: i69u@gmx.us #
  110. # My Site: codysec.net76.net #
  111. ###########################################
  112. <
  113. This Tutorial was created by me, I did not directly steal/leech anything from any other tutorials, I just wanted to join in the TuT creating, and make an in-depth, easy-to-do tutorial. :D
  114.  
  115. // Enjoy! //
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement