Skip to main content

What Is Doxing? Doxing and its Uses............


You’re probably thinking, “Okay, so basically it’s getting information from searching someone’s email on Google right?” in a sense yes, but there are actually easier ways to get someone’s information online. The most popular and most common method is to use a website called Pipl (http://www.pipl.com/). Pipl allows you to search for full names, emails, usernames, and even phone numbers, thus making it a very useful tool for hackers. Another source hackers can use is Facebook (http://www.facebook.com). Sure, Facebook allows full name searches, but most hackers aren’t using it for its name search; they’re using it for its email search.The main goal when Doxing is to find the target’s email (if you don’t have it). Your email is essentially your passport online; you sign up for websites using it, you have personal information on it, and if someone has access to it, they can essentially pretend to be you online. Once the hacker has the email, all he has to do is put it intoFacebook or Pipl and he will be able to find you, assuming the email he has is connected to some account you have online. On the flipside of this, in order to find your email, the hacker either has to guess your email, befriend you on Facebook or hack one of your vulnerable friends and view your email that way. Once he’s done that, you’re in trouble.Now, you’re probably thinking, “How’s he going to hack me with just my email?” well, that’s where Doxing comes in handy. If he can view your Facebook account, or he can find some other bit of information about you using Pipl, he can do what’s called reverting. Reverting is the process of using the target’s email’s recovery questions to gain access to the target’s email. Now, you may be thinking, “How’s he going to guess my recovery question answers?”well, take a second look at your recovery questions and ask yourself, “Can someone find this answer online?” If you answered yes, then you’re vulnerable to reverting.
Chances are, you’ve made some mistakes online, and if a skilled Doxer finds that mistake, then you’re in trouble. The Doxing method is based purely on the ability of the hacker to recognize valuable information about his target and use this information to his benefit. It is also based around the idea that, “The more you know about your target, the easier it will be to find his or her flaws.” 
Any hacker reading this, that didn't previously know about reverting, would probably look at this and say This would never work!” but you have to remember… we’re all humans, and we all make mistakes. Surprisingly, this method works more often than you’d think, but it is not for anyone who is lazy. Doxers tend to spend a while searching around the web for information that they can use. 

How can you insure that you won’t be Doxed?


Well, as the Internet becomes more and more useful and addicting, it will become harder to not get Doxed. The main issue for most victims is their security questions, and their password security. If a victim has a very easy-to-find recovery question, then the victim will be easily reverted within a matter of seconds. Also, if the victim has a simple password, it could get brute forced simply by using a wordlist that applies to the victim’s interests, likes, and fancies (of course, this method is not as popular).So, the main rule to not getting hacked is: Have Strong Passwords and almost impossible to guess recovery questions.

Comments

Popular posts from this blog

How To Grab Someone's IP Address ?

In this tutorial I will you show you how to grab someone’s IP address using  PHP script.  This method can be used to grab someone Ip address on yahoo or Facebook  chat  or by sending mail to victim. So Lets get started. How To  Hack  Someone Ip Address ? 1. Copy the below codes into  Notepad  and save it as  Grab.php  (.php is must)  <?php $hostname = gethostbyaddr($_SERVER['REMOTE_ADDR']); $img_number = imagecreate(400,95); $backcolor = imagecolorallocate($img_number,10,102,153); $textcolor = imagecolorallocate($img_number,255,255,255); imagefill($img_number,0,0,$backcolor); $number0 = " This is Your IP/Proxy"; $number1 = " IP: $_SERVER[HTTP_X_FORWARDED_FOR]"; $number2 = " Host/Proxy: $hostname"; $number4 = " _________________________________"; Imagestring($img_number,10,5,5,$number0,$textcolor); Imagestring($img_number,10,5,25,$number1,$textcolor); Imagestring($img_number,10,5,45,$number2,$textcolor); Imagestring...

How to Trace Any IP Address

How to Trace the IP Address Back to the Source? In fact, tracing an IP address back to its location is a lot simpler than what many people imagine. There exists many online tools using which you can accomplish this job. One of my favorite site is  IP2Location.com . Just go to  http://www.ip2location.com/demo.aspx  and enter the IP address that you want to trace in the dialog box and click on “Find Location”‘. With just a click of a button you can find the following information for any given IP address: Country  in which the IP is located City  to which the IP address belongs to Latitude/Longitude  of the IP’s location Zip Code  of the region to which the IP belongs to Time Zone  associated with the IP Name of the ISP  to which the IP address belong to Internet Speed  of the computer associated with the IP Weather Station  associated with the region of the IP Domain name  associated with the I...

How to Prevent Your Computer from Overheating (and Why It's Important)

Keeping your computer running within safe temperatures is important, especially as the temperature rises outside. Here's how to make sure your computer's not overheating—and how to fix it if it is. The cooling system of your computer is one of the most important features of the device. Without the cooling system, the electrical components of your computer wouldn't be able to function; overheating would damage the integral parts of what makes your computer work. The heat has to be dissipated in order to keep everything working within safe operating temperatures Why an Overheated Computer Is Dangerous Simply put, if your computer becomes too hot, it is possible to destroy and shorten the lifespan of the hardware inside your computer, leading to irreparable damage and potential data loss. Besides losing your data, heat pecks away at your computer's internal organs—the motherboard, CPU, and more—significantly shortening its lifespan. Besides the most obvious rea...