0% found this document useful (0 votes)
248 views10 pages

Doxing: by Natesh Kumar 17CS55 Department of CSE

This document discusses doxing, which is the process of retrieving and publishing private or identifying information about a person without their consent. It outlines techniques like using Google, social media websites, and reverse phone lookups to gather details like names, addresses, phone numbers, and photos. Reasons for doxing include curiosity, blackmail, and revenge. The document advises protecting personal information by maximizing privacy settings on social media and accounts to prevent doxing.

Uploaded by

OULAKBIR Ilham
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
248 views10 pages

Doxing: by Natesh Kumar 17CS55 Department of CSE

This document discusses doxing, which is the process of retrieving and publishing private or identifying information about a person without their consent. It outlines techniques like using Google, social media websites, and reverse phone lookups to gather details like names, addresses, phone numbers, and photos. Reasons for doxing include curiosity, blackmail, and revenge. The document advises protecting personal information by maximizing privacy settings on social media and accounts to prevent doxing.

Uploaded by

OULAKBIR Ilham
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

DOXING

By Natesh Kumar
17CS55
Department Of CSE
Contents

What is Doxing
Techniques Of Doxing
Why Would Anyone Want To Perform Doxing ?
Steps To Protect Yourself From Doxing

2
Doxing
• Word “ Doxing “ derived “ Document tracing “ .
• Process Of Retrieving , Hacking .
• Search For Personal Details About a Person .
• Publishing Information :
• Such as Names , Age , Mobile no: , Addresses , Credit Card Details , Etc.

3
Techniques Of Doxing

• Using Google
• Social Networking Websites
• Reverse Cell Phone Lookup
• Etc .

4
Using Google

• Powerful tool that Plays a key role in doxing .


• Almost Anything is on ( Even the Private Information ) .
• Possible to Dox of Details:
• Such as email ID , address , phone numbers & photographs of a person or
company etc .

5
Social Networking Websites
• Platform that Allows Users to Create a Public Profile & interact with Others .
• There are Several Sites:
• E.g . Facebook , What’sapp , Twitter , Instagram , Skype, etc .
• As most users are Unaware of online security issues .
• Weak privacy settings makes it easy for the Attackers to gain access to
personal information .
• Such as photographs, real names, location, job, partner’s name etc .
6
Reverse Cell Phone Lookup
• Process of finding someone’s personal detail .
• Search any Phone number to see full name, social media data, photos,
address history & more .
• Discover the Deep Web with CheckPeople.com .
• Also Intelius that provide access to the personal details about a given person
based on his/her phone, name and email ID.

7
Why Would Anyone Want To Perform Doxing
?

• Most people perform doxing out of general curiosity about a person or


company .
• Some wicked minds out there who do this for the purpose of blackmailing .
• Taking revenge by exposing the information about the person .

8
Steps to Protect Yourself from Doxing

• Most commonly targeted pieces of information obtained through it .


• Full name
• Age, gender and date of birth
• Location and place of birth
• Email addresses and username
• Phone number
• Social networking profiles, websites and blogs
• Protect these all in Every Social media apps or Accounts .
• Maximize the Privacy settings .

9
Thank you

10

You might also like