Download as pdf or txt
Download as pdf or txt
You are on page 1of 10

DOXING

By Natesh Kumar
17CS55
Department Of CSE
Contents

What is Doxing
Techniques Of Doxing
Why Would Anyone Want To Perform Doxing ?
Steps To Protect Yourself From Doxing

2
Doxing
• Word “ Doxing “ derived “ Document tracing “ .
• Process Of Retrieving , Hacking .
• Search For Personal Details About a Person .
• Publishing Information :
• Such as Names , Age , Mobile no: , Addresses , Credit Card Details , Etc.

3
Techniques Of Doxing

• Using Google
• Social Networking Websites
• Reverse Cell Phone Lookup
• Etc .

4
Using Google

• Powerful tool that Plays a key role in doxing .


• Almost Anything is on ( Even the Private Information ) .
• Possible to Dox of Details:
• Such as email ID , address , phone numbers & photographs of a person or
company etc .

5
Social Networking Websites
• Platform that Allows Users to Create a Public Profile & interact with Others .
• There are Several Sites:
• E.g . Facebook , What’sapp , Twitter , Instagram , Skype, etc .
• As most users are Unaware of online security issues .
• Weak privacy settings makes it easy for the Attackers to gain access to
personal information .
• Such as photographs, real names, location, job, partner’s name etc .
6
Reverse Cell Phone Lookup
• Process of finding someone’s personal detail .
• Search any Phone number to see full name, social media data, photos,
address history & more .
• Discover the Deep Web with CheckPeople.com .
• Also Intelius that provide access to the personal details about a given person
based on his/her phone, name and email ID.

7
Why Would Anyone Want To Perform Doxing
?

• Most people perform doxing out of general curiosity about a person or


company .
• Some wicked minds out there who do this for the purpose of blackmailing .
• Taking revenge by exposing the information about the person .

8
Steps to Protect Yourself from Doxing

• Most commonly targeted pieces of information obtained through it .


• Full name
• Age, gender and date of birth
• Location and place of birth
• Email addresses and username
• Phone number
• Social networking profiles, websites and blogs
• Protect these all in Every Social media apps or Accounts .
• Maximize the Privacy settings .

9
Thank you

10

You might also like