DOXING
By Natesh Kumar
17CS55
Department Of CSE
Contents
What is Doxing
Techniques Of Doxing
Why Would Anyone Want To Perform Doxing ?
Steps To Protect Yourself From Doxing
2
Doxing
• Word “ Doxing “ derived “ Document tracing “ .
• Process Of Retrieving , Hacking .
• Search For Personal Details About a Person .
• Publishing Information :
• Such as Names , Age , Mobile no: , Addresses , Credit Card Details , Etc.
3
Techniques Of Doxing
• Using Google
• Social Networking Websites
• Reverse Cell Phone Lookup
• Etc .
4
Using Google
• Powerful tool that Plays a key role in doxing .
• Almost Anything is on ( Even the Private Information ) .
• Possible to Dox of Details:
• Such as email ID , address , phone numbers & photographs of a person or
company etc .
5
Social Networking Websites
• Platform that Allows Users to Create a Public Profile & interact with Others .
• There are Several Sites:
• E.g . Facebook , What’sapp , Twitter , Instagram , Skype, etc .
• As most users are Unaware of online security issues .
• Weak privacy settings makes it easy for the Attackers to gain access to
personal information .
• Such as photographs, real names, location, job, partner’s name etc .
6
Reverse Cell Phone Lookup
• Process of finding someone’s personal detail .
• Search any Phone number to see full name, social media data, photos,
address history & more .
• Discover the Deep Web with CheckPeople.com .
• Also Intelius that provide access to the personal details about a given person
based on his/her phone, name and email ID.
7
Why Would Anyone Want To Perform Doxing
?
• Most people perform doxing out of general curiosity about a person or
company .
• Some wicked minds out there who do this for the purpose of blackmailing .
• Taking revenge by exposing the information about the person .
8
Steps to Protect Yourself from Doxing
• Most commonly targeted pieces of information obtained through it .
• Full name
• Age, gender and date of birth
• Location and place of birth
• Email addresses and username
• Phone number
• Social networking profiles, websites and blogs
• Protect these all in Every Social media apps or Accounts .
• Maximize the Privacy settings .
9
Thank you
10