Professional Documents
Culture Documents
Doxing: by Natesh Kumar 17CS55 Department of CSE
Doxing: by Natesh Kumar 17CS55 Department of CSE
By Natesh Kumar
17CS55
Department Of CSE
Contents
What is Doxing
Techniques Of Doxing
Why Would Anyone Want To Perform Doxing ?
Steps To Protect Yourself From Doxing
2
Doxing
• Word “ Doxing “ derived “ Document tracing “ .
• Process Of Retrieving , Hacking .
• Search For Personal Details About a Person .
• Publishing Information :
• Such as Names , Age , Mobile no: , Addresses , Credit Card Details , Etc.
3
Techniques Of Doxing
• Using Google
• Social Networking Websites
• Reverse Cell Phone Lookup
• Etc .
4
Using Google
5
Social Networking Websites
• Platform that Allows Users to Create a Public Profile & interact with Others .
• There are Several Sites:
• E.g . Facebook , What’sapp , Twitter , Instagram , Skype, etc .
• As most users are Unaware of online security issues .
• Weak privacy settings makes it easy for the Attackers to gain access to
personal information .
• Such as photographs, real names, location, job, partner’s name etc .
6
Reverse Cell Phone Lookup
• Process of finding someone’s personal detail .
• Search any Phone number to see full name, social media data, photos,
address history & more .
• Discover the Deep Web with CheckPeople.com .
• Also Intelius that provide access to the personal details about a given person
based on his/her phone, name and email ID.
7
Why Would Anyone Want To Perform Doxing
?
8
Steps to Protect Yourself from Doxing
9
Thank you
10