Doxing Guide
Doxing Guide
Doxing Guide
Written by: MAK
What is Doxing?
Dox is short for docs. When you dox someone, you find out their personal
information such as their name, their address, their number, and all kinds of stuff
W like that. Many people find this as a really effective tool when attacking someone
online. You can do a large number of things when you have someone’s dox. I list a
few at the bottom. I highly suggest reading every section as it can be very beneficial
WARLOCK DARK ARMY
🎩
This will display the current residents they have on file for the house. I recommend
WARLOCK DARK ARMY
using both sites to maximize results and/or make sure that both have the same
information. Most of the time if they have they same last name (the minor and the
person in the lookup), then it’s one of their parents. You could also look for similar
phone numbers. Now you know how to get the parents of minors with their address
and you know how to get someone’s name from just their address with ease. It’s that
simple.
Doxing Number
We can search our target’s number just as we did with the target’s name. There are
many sites to use and I’ll list my favorites. I prefer to use 10digits.us as it’s always
brought me the best results and never let me down. First, go to one of the sites below
M -
http://www.10digits.us , http://www.reversemobile.com/index.php , http://thatsthe
m.com , http://www.numberway.com , http://www.phonenumber.com , http://www.f
onefinder.net , http://www.whitepages.com , http://www.pipl.com/ ,
http://www.canada411.ca/ (Canadian people) https://www.goyellow.de/
(German People) http://www.dgs.dk (Danish People) I’m demonstrating 10digits in
this example but you can use whatever site you want. Now that we’re on 10digits,
click on the Phone button, input their number, and press the Search icon. It’ll display
results just like the name search did. You can get the owner’s name, address, state,
etc. with just a search. Tip: Most of the time if it displays multiple results it’s for two
adults living in the house. The woman could be the mom if you’re doxing a kid and
the man could be the dad. This has made my doxing a lot easier.
Tip2: Read the area code part if this fails.
Doxing Number
A
Tip 3: Read the Using Target’s Email section. There’s a Forgot Password method
and you can also use a number there. In simpler terms you enter their phone
number in the recovery option under Facebook to see any account that is
associated with the phone number which is really useful in a dox.
Doxing Area Code
Using an area code lookup tool isn’t necessarily effective most of the times but it
can be help in a dox like if you need their state or some information. Area codes are
the first three digits of their phone number so if you don’t have their information
K from another site, then you can use this for a general idea of their area like city and
state. It can be helpful when starting a dox or confirming a dox. I’ll give you a list of
area code lookup sites and you can see which one you like best. First, go to one of
these sites - https://www.verizon.com/Support/Residential/AreaCodes/lookup.html ,
http://www.allareacodes.com/area-code-lookup/ ,
http://www.melissadata.com/lookups/zipcityphone.asp ,
On All Area Codes, enter the first three digits of their phone number
(XXX-XXX-XXXX, the exact first three of the ten digits, not the first three of the seven
digits.) and press search. When you search
http://www.allareacodes.com/513 , you get lots of information on the area code like
the state and major city.
Doxing Zip Code
A zip code locator can be used for the same reason as the area code locator. It
gives you their general location if you don’t have it already. It’s not as useful as
other methods but in some cases like at a dead end, it’ll suffice as useful.
W Here are some lookup sites using zip codes -
https://tools.usps.com/go/ZipLookupAction!input.action
http://www.unitedstateszipcodes.org/
http://www.melissadata.com/lookups/zipcityphone.asp
On http://www.unitedstateszipcodes.org/ , enter their name in the box that says
“Search by ZIP Code” and press Search. This gives you their city, state, county,
area code, timezone, etc. As I said, sometimes this is only useful near dead ends or
starting out a dox. It gives basic information and isn’t as effective as other methods
but still can be helpful if you’re near a dead end on a dox and need as much
information as you can or if you’re just trying to confirm more information on your
target.
Doxing Facebook
If you have the target’s Facebook added, there’s a way you can get their email and
other information. What you’re going to need is a Yahoo account. First, we’re going
to log into our Yahoo account and go to our mail. Then, we need to find the Import
C Contacts button. It can be tricky to find at times, it could also be your address book
which is usually on the row of icons like next to the compose email button. Once
you click the Import Contacts button, select Facebook. Log in to your Facebook and
wait a few moments. After a few seconds or minutes, it’ll import all your Facebook
friends to your Yahoo. Scroll down through the list of contacts you have until you
find their name and this will give you the email address associated with their
Facebook account. Wallah, you just got their email from their Facebook account.
Most people don’t usually have their email displayed on Facebook or have it
protected by privacy settings but this is a way around that. Now you know how to
pull Facebook emails with ease. Tip: Check out the Using Target’s Email section now
that you have their email. Using an email when doxing is probably the most
successful way because it brings accurate and lots of information 95% of the time.
Doxing Facebook
K There are lots of methods you can use with your target’s email and they make doxing
easier than taking candy
from a baby.
Tip: You can possibly get their DOB year by checking out their About page on
Facebook. If they don’t display their information, see if they have a graduation year
coming up. Use the year they graduate to estimate an age. That could be useful when
near a dead end on a dox or confirming, either or.
Doxing Skype
Using a target’s Skype can be very beneficial. When you have their Skype, you can
get all sorts of information such as their IP address which can lead to their full dox,
some social media, anything, the possibilities are endless. It’s just as fun as doxing
R with their email address. We’re going to explain two methods here on Skype.
There’ll be another one in the Using Google’s Search section so check that out for
extra.
Resolving Their IP With Skype:
Using this method can get you the target’s IP address which can give you their full
dox if you use the IP right. I personally enjoy this part more than most as it’s the
easiest and makes doxing simple, especially if you’re doxing someone that doesn’t
have a lot of knowledge in hiding themselves. I’ll list a bunch of IP resolving sites
but my favorite is mostwantedhf.info so that’s what I’ll be showing off.
Resolving Sites -
http://mostwantedhf.info/index.php
http://resolvethem.com/index.php
http://skypegrab.net/resolver.php
Doxing Skype
http://skype-resolver.org
https://www.hanzresolver.com/dashboard
Once you’re on mostwantedhf.info, enter their Skype username in the first box.
L This is their actual Skype name, not their display name. Their Skype name is
usually the one you add them with and one that you can’t put spaces in or change.
Once you put their Skype in the box, press the Grab IP button and wait for the
resolver to do it’s magic. It should display an IP address after refreshing the page.
If this one doesn’t work, try the others listed, I’ve seen people be blocked on some
because blacklist but get resolved by others. Congratulations, you just made this dox
100% easier. With a Skype and an IP, the dox is much easier. Import Skype Contacts
Yeah, this is a fairly public method, but I’m talking about everything on doxing so I’d
be a fool to leave this part out. First, go to your Facebook. I recommend making a new
Facebook as it’s going to keep you safe and protected. Next, go to Find Friends and
click on the Skype icon that shows up. Now login and import all the contacts. Once
you’ve done that, go to fb.com/invite_history.php and search for the
target’s display name used on Skype.
Doxing Skype
If a captcha pops up when you click their name, fill it out. Once you fill out the
captcha, you’ll receive their email. Some say this method is patched but it worked a
few weeks ago for me so I wouldn’t say it is.
O Skype2Email Tools:
Skype2Email tools are fairly new a fake, maybe a few months. Well, probably longer,
but I just started seeing resolvers input them so. Anyways, Skype2Email tools work
like Skype2IP tools or Skype resolvers. They give you the email associated with the
account instead of the IP. It can be really helpful if resolving the IP fails or you
want to go even more in-depth on your dox. My favorite Skype2Email tool is
Skypegrab.net as it’s really helpful and proves to suffice as a better choice than
others. http://skypegrab.net/skype2email.php Once you’re on Skypegrab’s Skype2Em
ail, enter their Skype name in the Username box, type in the captcha that appears,
and press Resolve. This should give you any email address associated with the Skype
account just like a Skype2IP tool. Tip: Check the Using Google’s Search section for
more with Skype. It’ll be very helpful. Tip 2: This makes the Using Target’s IP section
a lot easier and you can skip Using IP Loggers if successful.
Using Google
Using Google’s Search - another goldmine when doxing. Using Google’s search can
be very beneficial to your doxing. It’s like heaven when doxing. You can easily get
information off emails, Skypes, aliases, numbers, etc. so let’s get started on
K learning Google searches. There aren’t just regular Google searches with their
names, you have to use dorks to make the search actually display information that
is useful instead of random shit from a site you or the target has never been on.
WARLOCK DARK ARMY
- Another search is just plain old: “(Skype here)” - Also with the quotation
_ marks. You’ll be surprised what you can find with Google searches. Get
creative with it. Googling Emails
Googling emails can be as easy as Googling the Skypes. These can be effective if
the target has posted his email on sites like “Add my MSN” or “I’m participating in
the giveaway here is my email blah blah blah”. Either way, they’ve fucked
themselves.
- Google: “(Email here)” - Yes, keep the quotation marks, you know this by
now! These are usually more accurate than any other Google searches as
they’re really specific.
- Google: “Email: (Email here)”
The more creative you are with your searches the better. Try as many as you can
to max out your results.
Using Google
Googling Aliases
This part can be tricky as aliases can be mixed up as many people can use the
same one. I’ m sure there is another Schatten out there so that’s why this is only
M really useful when the target has a specific alias as I said like
ButtEaterShitSmeller69420XXX.
- Google: “(Alias here)” - With this, you can get their accounts online. For
example, when someone is quoted on a HF post, it’ll say in the quoting post “Some
one said >”. Not exactly
that but you know what I mean. Or maybe
they posted an application to a group or something on another forum and the
group had a part in the application that said “Username:”. This also usually
leads to their name and/or age as groups usually ask for personal
information in applications, just look at the HF groups.
Using IP Loggers
IP loggers are tools that take the IP of someone who’s clicked a link and sends it to
your email. A lot of the time you’ll need good SE’ing skills when IP logging
someone. I’ll include some messages below that have made my IP logging a lot
M easier. There’s one IP logger site that I know which gives you a free IP logger and
sends the IPs to your emails once clicked. It’s free and easy to use. All you have to
do is head over to http://whatstheirip.com/ . Once you’re on WhatsTheirIP, enter
your email in the box that says “Your Email Address:”. I recommend using a
throwaway email like on 10minutemail.com or just a random disposable Outlook
(better than Gmail as you don’t have to verify most of the time). Now, we have a IP
logging link. What’s that? It looks very suspicious? Of course! It’s an IP logger!
That’s why we’re going to hide the link in a link shorter like https://bitly.com/ so it
looks safer. They’ll never know they’re running into an IP logger. 1. Take your IP logger
link and head over to https://bitly.com/ to shorten our link. 2. There should be a box
that says “Paste a link to shorten it”, paste your link there and click SHORTEN. 3. Take
the shortened link and send it in the message you were sending to the target as a
replacement over your regular IP logger.
Using IP Loggers
This makes it look a lot safer and legit than your actual IP logger link. There are also
other link shortening sites you can use, bit.ly is just an example. I’ll list some more for
you to test out as well. Link Shortening Sites
A https://bitly.com/ - My personal favorite. Easy to use and most people fall for it.
https://goo.gl/ - Google’s link shortening tool. They’ll probably assume a link from
Google is safe and click it. I recommend bit.ly however. https://tinyurl.com/
http://ow.ly/url/shorten-url - Looks really suspicious but is a link shortner so here it
is. Tip: Make your IP logger believable. Here is an example of making it look realistic.
Scenario = Scaring your target: “LOL you fucking retard I can’t believe you were
this easy to dox. Look at your shitty house and mom’s picture (insert ip logger
shortened here). Some spas like you doesn’t belong on the internet lmao.” - This
always works for me. I’ve never failed using this as most people are eager to look
to see if it’s really their information.
Using IP Loggers
Scenario = Sing a random: “Yo, do you know this kid? He was fucking with me so
I posted his information online. If he’s your friend I don’t wanna fuck with him so
just to be sure (insert logger here shortened).” Just be creative with it. Don’t sound
K like a complete moron who’s just trying to dox with absolutely no knowledge. You
need to make sure you sound realistic and make sure your story is believable. Guess
we’re eWhoring now.
https://pipl.com / - Favorite
http://knowem.com/ - Pretty good
https://namechk.com/ - Amazing
When you’re on Pipl, you’re going to want to enter their alias in the first box.
Remember, this is more effective for more specific aliases.
Doxing Alias
If you have their general
location, you can include that to include your chances of getting more accurate
R information but I’ve never had misinformation using Pipl without the location part
when alias doxing. When you search their alias on Pipl, it’ll search through tons of
websites online and give you the sites where it finds the information
Example: https://pipl.com/search/?q=ButtholeLicker420
Obviously nobody uses this as an actual alias but here’s an example of what you’d
get. It’s pretty effective if your target has a specific alias.
Tip: You could also try searching their alias on Skype’s directory.
Tip: Read the Using Google’s Search section for better results using aliases
Doxing Images
Using an image when doxing can be hard at times but it can give good results.
There are two ways we can get information from photos. The first method I’ll
K explain is using a search engine to find the image online and the other method will
show you how to get exif-data from the image.
Searching The Image
It’s like searching Google but using an image instead. There are two sites afaik that
can do this. I’ll list them both but I’ll explain how to use tineye in my explanation.
They’re really effective and can give better leads on targets. Say you have their
Skype picture and it’s the same picture they used on Facebook, once you search
this picture on one of these sites and find it on their Facebook, their done. You’ll
have their name which can lead to tons of information.
http://www.geoimgr.com/
http://exifdata.com/
http://www.makeuseof.com/tag/exif-photo-data-find-understand/
http://regex.info/exif.cgi
Once you’re on the site, find the “Choose File” button and it’ll upload the photo.
Now look for the part that says “Photo” under “Market” and these are the
coordinates of where the photo was taken. This doesn’t give really private
information, just a general location but is still helpful.
So what you’re going to do is take your target’s website and include it after
whois.domaintools.com/ and paste it in the URL bar.
Doxing Website
Example: whois.domaintools.com/Facebook.com This will give you all types of infor
mation on your target. Here is an example of the
Facebook whois:
O Registry Registrant ID:
Registrant Name: Domain Administrator
Registrant Organization: Facebook, Inc.
Registrant Street: 1601 Willow Road,
Registrant City: Menlo Park
Registrant State/Province: CA
Registrant Postal Code: 94025
Registrant Country: US
Registrant Phone: +1.6505434800
Registrant Phone Ext:
Registrant Fax: +1.6505434800
Registrant Fax Ext:
Registrant Email
Doxing Website
Yes, this is what you can get from a Whois site. You can get the website owner’s
name, address, number, state, city, postal code, country, etc. with ease. This
makes doxing the simplest thing possible. If you can successfully whois dox
C somebody, then that makes the dox much faster and easier.
Tip: Some people may be smart and use private signup so their information is
protected. As far as I know there is no way past private signup so keep that in
mind.
Tip: If someone’s website has fake information or it is protected, try Googling
“whois (website link here)”. I’ve done this before when whois.domaintools.com
hasn’t worked for me and another site had the actual information on a target.
Sometimes this may not work but it’s always worth a shot. There are tons of whois
sites that get the whois of websites and don’t update them (or take a very long
time to do so) so if the target signed up under legit information first and decided to
change that into fake information or protect themselves later, it’ll already be too
late. Once again, this may not work a lot of the time if they never put legit informat
ion or never used a public whois signup.
Grabbing SSN
Grabbing the target’s SSN is relatively simple. We need to head over to SSNDOB.so
and sign up. Now getting someone’s SSN isn’t free so you’re going to need to have
some BTC on you as they do not accept PayPal. You can pull the information of
A someone in the US or someone in the UK. This site allows you to get their DOB and
personal information. I won’t explain too in-depth as I’m not using the site at the
moment and can’t explain after the search but what you do is signup and deposit
money into your account. They’ll give you a BC address to send the money to. Once
you’ve added funds to your account, click on the US SSNDOB Search tab and enter
the target’s name and any other information they require. Once you search you
should see a few entries, it’s best to have the target’s dox on hand so you know
which one they are for sure. Once you have your target’s right entry, buy their
SSN/DOB and you’ve just made the dox a lot more deadlier and better. Sites To
Grab SSNs Tip: This is really illegal. I recommend learning how to hide yourself
before this. Tip 2: Validate SSNs using
http://www.ssnvalidator.com/
to be safe.
Grabbing Credit Report
There are a few sites that can help you get someone’s credit report.You’re going to
need to know tons of their information to successfully get their credit report. I’ll list
two sites you can use below.
K
Credit Report Sites:
www.annualcreditreport.com
www.creditkarma.com
Now the questions they ask you may be hard so you’re going to either need their
full dox or you’re going to be doing some extreme guessing.
- A sample question may be "What phone are you associated with"
- Another sample may be "What address are you associated with" If you have their
full dox, then this
shouldn’t be so hard. Follow the steps when
filling out their information and you’ll have their credit report.
Grabbing Ancestors
Getting the target’s ancestors can be simple and easy. There are many sites that
give you access to the target’s ancestors. Here is a list of sites that can help you
find ancestors of the target.
@
Ancestor Searching Sites:
http://www.advancedbackgroundchecks.com/
http://www.findmypast.com/
http://www.archives.com/search/ancestor
http://www.familytreesearcher.com/
Grab the required information needed on your target. In our case, we’ll need their
first name, their middle name, their last name, their age, and their state. Keep in
mind that all of this isn’t necessary, but it’ll help you get more accurate results in
the long run. It gives you possible phone number of the target, recent addresses,
age, PO box, and possible relatives. When you need information on the target you
don’t have already or want more, then this is a step that can really come in handy.
Grabbing House Picture
Obtaining the picture of the target is fairly simple. All we have to do is head over to
maps.google.com. Once we have the site loaded, copy their address, city, and state
and paste it in the search box. If the address doesn’t load itself and a dropdown list
W comes up, then we’ll need to select the address there. This’ll be easy to pick which
one if you have their postal code, state, and city. Once you’ve loaded the address,
click the box in the bottom left corner that says Satellite View if it isn’t already so
we get a better view of the house. Now the main house it zooms in on is most likely
the target’s house. Take a picture of the house using Gyazo, Snipping Tool, or
whatever you’d like and upload it to anony.ws. Now you have the target’s house
picture. You can terrorize him with this.
Tip: In the next section you can also get their house picture with their address
using the sites.
Grabbing House Info
This part of the eBook will show you how to get further information on a house
A such as how many bathrooms they have, how many rooms they have, how big is
their yard, etc. This can really freak the target out or just make your dox that much
better. I’ll list my favorite sites for doing this below.
What you want to do is go on Zillow and paste your target’s address in the box that
is prompted.
Grabbing House Info
R In my example, I’ll use 100 N 7th St Creswell, OR 97426 in my example. When I put
100 N 7th St Creswell, OR 97426 in the address box, this is what it gives me.
WARLOCK DARK ARMY
http://www.zillow.com/homedetails/100N7thStCreswellOR97426/
48460632_zpid/
A picture of the house, 3 beds, 2 baths, 1,334 sqft., the lot is 6,000 sqft., it was built
in 1993, the last sold date, heating type, estimated value, etc. See how much
information you can get off their house on Zillow? It’s a really amazing tool and you
can use it to increase your dox with so much more information to make it even
better and scarier! You can literally terrorize the target with this information!
Obtaining Databases
Getting databases for doxing can be easy. You may be wondering what a database
L can be used for. A database can give you lots of information on a target. Say you
search their email in your databases, you can get lots of private information
depending on the database. There are databases that give account name, IP, and
password. Then there are some databases that give personal information like IRL
name, address, IP, password, etc. It all depends on how good you are. The
databases I teach you to obtain are free so obviously they’re not going to be so
good. They’re just an example and to teach you what they’re used for. You may
find use in some, you may not. First, we’re going to be searching Pastebin for some
dumped databases. all you have to do is load Pastebin.com and go to the search
function.
Obtaining Databases
- One example of what to search is “database dump”
- Another example is “SQL users dump”
- Another is “database”
O - Another is “website dump”
Get creative when searching. You can also do this on Skidpaste. Here, take a few
public ones.
Public DB Leaks
http://pastebin.com/MHH34FgX - Lizard Stresser
http://pastebin.com/mL7pdLv6 - Lots of CSGO Servers
http://db.aggron.party/dblookup.php?key=key1&tool=dblookup&string= - This is a
DB lookup tool made by a HF member whose name is Aggron. All you need to do is
include what you want to look for through databases such as a username after the
“string=” part. He said he has over 300 databases on the site (some include HF,
VHF, and lots of public DBs but they’re not really anything too special as they’re all
over LeakForums and other forums) so it seems to be a good choice.
Obtaining Databases
Example: If I want to look through his databases for something such as
“ [email protected] ”, then I’d put the following in the address bar:
http://db.aggron.party/dblookup.php?key=key1&tool=dblookup&string=example
C @test.net
It’ll display anything in his databases with the string you search for.
These are just two examples. If you’d like to purchase anything from me, add me
on telegram: @WARLOCK_MAK - I can sell you ones such as Vip hacks, Minecraft Po
cket Edition, tons of RSPS, etc. I’ll sell them for cheap BTC.
Tip: Skidbase.io is also a great DB lookup tool. However, unfortunately, it is not
free. DB lookups cost $0.50 if I’m not mistaken. The site does has some amazing
DBs though and I vouch for it 100%.
Tip X2: I suggest checking up in the anonymity section about database leaks. It’s a
good thing to make sure YOU’RE not one in a database leak.
Using Databases
Using a database is simple. All you have to do is put your databases in a folder.
Now that all your databases are in the folder, you’re going to want to search them.
There are numerous ways you can go about doing this.
K - If you’re on Windows 8, you can just open the Start menu. Once the Start
menu is open, type what text you want to search for and select the third
option that says “Files” near the top right. This will give you a lot of files with
the string inside of it. For example if you have a DB called “Niggers.sql” and
you search “ [email protected] ”, it’ll show the DB if the string is inside
of the DB. It can really be helpful when doxing. Here is an example of a DB
string -
Example: [email protected] :dd9mw4d177e92ed9fafs847e090fafdf:Am9nP
CIa (Don’t worry, it’s nobody, I changed it up, even the hash)
- Another way of searching DB strings is by using a tool called Windows Grep.
I’m sure you’ve heard someone say they’re going to grep a string or grep
someone’s email/alias/etc. right? No? Oh well.
Using Databases
Windows Grep is a simple tool that searches through tons of your files that you
specify (such as .txt, .sql, .csv, etc.) and returns the results to you. It is a really
effective tool that any
_ doxer should make sure he has on his side. You can get Windows Grep from
this site
- www.wingrep.com/
- Keep in mind, Windows Grep isn’t the only tool for grepping. If you’re on
Linux, you can learn how to grep someone here -
http://www.cyberciti.biz/faq/howto-use-grep-command-in-linux-unix/ or
http://www.tecmint.com/12-practical-examples-of-linux-grep-command/ .
Anonymity and Other Things
There are many things you need to make sure you have done when online to
remain safe and private. Browser To Pick
Firefox is the best browser to use as you can really make it secure and majority of
C hackers use it as their number 1 browser.
VPN
A VPN is the thing a hacker can't live without. If you're going to be doing illegal
things, you need a VPN. There are free VPNs and there are paid VPNs. I recommend
143VPN if you're looking for a paid one. If you're looking for a free VPN, use
Hotspot Shield or Cyberghost. I'll provide a list of paid ones that are fairly cheap
below and then some free ones. Paid ones are usually more secure, safe, and
private.
Anonymity and Other Things
Paid VPN
VPNSecure
143VPN
K Dr VPN
Hide&Seek VPN
Free VPN
Hotspot Shield
CyberGhost VPN
Hotspot Shield should suffice if you’re in need of a free one.
Anonymity and Other Things
XMPP
Using XMPP instead of Skype can be very beneficial. Using XMPP over Skype has
_ many benefits such as more secure, private, and safe. No longer do you have to
worry about if someone is watching your every conversation or if someone is 2
steps from Seeing Skype support for your Skype account details. With XMPP + OTR,
you can easily become worry free about being hacked. Here is my guide on
completely setting up XMPP and OTR, adding friends, and authenticating friends on
XMPP.
BTC Cryptocurrency
Using BTC as a payment method is something a hacker needs to do. BTC is very
popular and most people will prefer it over PayPal. You don't have to provide any
personal information on it such as your address, name, number, etc. It's simple to
get a BTC address. Just sign up on blockchain.info or use another wallet listed
below. You can easily get a BTC wallet from the link below.
Blockchain.info
Tip: Also, you could use LTC. It’s becoming popular as well.
Cracking DB Hashes
Cracking DB hashes isn’t hard at all - that is assuming you’re going to crack MD5.
This method only works with MD5 so if the password is encrypted some other way
then this won’t work. The simplest way to crack MD5 is by using a hash cracking
M site. I’m not going to explain how to use Hashcat in this tutorial, you can find a
tutorial on HF. Anyways, here is a list of DB hash cracking websites. They can really
aid you in discovering the target’s passwords and jacking his accounts. Now you’ll
know how to hack someone’s account along with their information.
Tip: MD5 usually is 16 bytes long (32 characters) and they look like this -
c4ca4238a0b923820dcc509a6f75849b
Make sure the password you’re attempting to decrypt is MD5.
MD5 Cracking Sites
http://www.cmd5.com/english.aspx (7,800,000,000,000 passwords)
http://md5.rednoize.com (56,502,235 passwords)
http://www.md5decrypter.com (15,186,881 passwords)
http://www.md5crack.com
http://www.milw0rm.com/cracker/insert.php
Cracking DB Hashes
A
Let’s use md5decrypter.com in our example. We take our MD5 hash and paste it in
WARLOCK DARK ARMY
the box under “Please input the MD5 hash that you would like to be converted into
text:” and then fill in the captcha. Once that’s done, press Decrypt! and it’ll try it’s
best to find the decrypted version of the hash. It’s very effective and helpful. You
can use the password decrypted to jack his accounts like email, password, etc. and
they won’t know what hit them. I recommend using every site until you get a
match.
What to Do After a Dox?
There are several things you can do wit ha dox that can hurt the person that was
attacking you. I mean, the possibilities are endless. I, personally, enjoy the IRL
harassment part the most but you can do whatever you think is safest for you.
K Posting The Dox:
You can post the dox on several sites so that the person is exposed to everyone on
the internet looking up his information. It’s best to put your credits in the dox
before posting it. Posting the dox can bring the target tons of stress with people
harassing him with his dox. There’s a section on posting the dox below with sites on
where to post it so other’s can see it and use it to their advantage such as
furthering their dox or even harassing him. You can’t go wrong when posting a dox.
You help others get the target’s dox, they help you harass him, a win win situation.
What to Do After a Dox?
IRL Harassment
There are several ways you can harass the target IRL. You can send him pizza, you
can send him home care services like lawnmowers and car washers, mormons, etc.
W These are for the more experienced doxers who hide themselves and aren’t afraid
of repercussions. I’ve sent people mormons, lawnmowers, dog groomers, etc.
- To send mormons, go to http://www.mormon.org/missionaries and request a
mormon visit. Make sure you say its for yourself so they don’t get suspicious.
- To send pizza, go to www.dominos.com/ and order lots of pizza to their
address.
- To send lawnmowers and other mischievous things, find a local listing on
Craigslist in their area.
Swatting
I don’t recommend swatting at all but you know what this is. I’m not explaining
this.
What to Do After a Dox?
DDoSing:
If you have the target’s IP address, you can attack their IP address using some
stresser. Stressers usually cost money but if you want to hurt the target and keep
A them offline, then stressers are what you need because they can really “stress” the
target out.
If you wanna buy powerfull ddos tool, script or botnet then,
Contact:
@WARLOCK_MAK
or
@WARLOCK_DARK_ARMY_OFFICIALS
What to Do After a Dox?
Reporting Them:
If the person has done something wrong and you know they have, then you can
report them to the cops. This is a way to get them offline for a long time while
R staying on the legal route. I recommend just getting basic, public, legal information
when doing this so you don’t get in trouble yourself.
Contacts Spamming
Now this is really fun. If you want their Skype spammed with literally 15 pedos a
minute, sign their Skype up on www.addmecontacts.com/ and they’ll get tons of
pedos calling them and adding them. You can test this out on your on Skype to see
how effective it is but I don’t recommend it. Sign them up as a 18 year old female
multiple times and sit back knowing they’re
What to Do After a Dox?
Reporting Them:
If the person has done something wrong and you know they have, then you can
report them to the cops. This is a way to get them offline for a long time while
L staying on the legal route. I recommend just getting basic, public, legal information
when doing this so you don’t get in trouble yourself.
Contacts Spamming
Now this is really fun. If you want their Skype spammed with literally 15 pedos a
minute, sign their Skype up on www.addmecontacts.com/ and they’ll get tons of
pedos calling them and adding them. You can test this out on your on Skype to see
how effective it is but I don’t recommend it. Sign them up as a 18 year old female
multiple times and sit back knowing they’re getting the fucking living hell spammed
out of them by horny men. You can also do this to their Kick account on kikfinder.co
m if I’m not mistaken. I’ve never tested Kik Finder but I know for a fake that AddMe
Contacts spams the living shit out of their Skype account with requests from pedos.
Hacked DB Searching
There are many sites that allow you to search someone’s name/email/anything and
get their info, one of my
favorite sites for this is Indexeus. Indexeus is a site that searches millions of hacked
O databases for the
requested info, accounts are free, and with one, you can:
https://www.hacked-db.com/
https://haveibeenpwned.com/
Check both of those, and if you are leaked, try to find out where
Faking a Dox
In this section, I’m going to teach you how to properly fake your new account or at
least make an account that isn’t obviously fake. First, you’re going to head over to
fakenamegenerator.com and take the information it gives you. I recommend a male
M in the US. Now fill out
the dox template you have (one in the doxing section for
free) with the information you just gained. Not anything too deep like SSN or
anything but the basics. Now include some throwaway information that looks like
yours such as a email that has your alias but isn’t actually connected to valuable
information. Now include a few real information like your Skype or HF to make it
look believable. Then you’re going to find an IP or proxy located where your fake
dox is located. This can be quite tricky. I usually Google doxes or search Pastebin
for some and use the target’s IP and location. Alternatively, you can use the doxing
section, dox some poor unsuspecting sap, and use his information. It’s pretty
effective stealing someone’s information.
Faking a Dox
Now, onto the real part of this chapter:
http://www.datafakegenerator.com/
Use that to generate a fake dox of yourself or some rando to make people think you
A are a dox god.
https://www.randomlists.com/ip-addresses
Use that to get a fake (or possibly real) IP
And you might use Elfqrin’s DisCard to get a working credit card number and CCV.
Now post those doxes on sites such as pastebin, ghostbin, skidpaste (my favorite) o
r any other paste site.
People might think it is really you :3
But Make sure to post different info each time unless you want the dox to look too
realistic and get people
thinking they actually have your info.
Clearing Yourself From Google
If you’ve removed your information from a site such as Pastebin or another, it’ll
probably still show up in Google’s search cache. It’s simple to remove that and I’ll
show you how below using Google itself.
K
1. Go to https://support.google.com/websearch/troubleshooter/3111061?hl=en
2. Go down to "What do you want to do?" and press which one you need. You can
do one of the following -
Remove information you see in Google Search
Prevent information from showing in Google Search
Clearing Yourself From Google
3. The second one is only if you're a webmaster. So most likely we're going to be
doing the first one. Go to
https://www.google.com/webmasters/tools/removals?pli=1
@
3.1 - In the "Enter URL of outdated content" box, paste the URL of the page.
WARLOCK DARK ARMY
3.3 - If you see the message "This content is gone," click Request removal.
Note: If you see the message "The page is still live on the web" but the page has
already been removed, click Submit feedback and we’ll look into the issue.
Tip: You can see if your information is removed yet or not by going to
https://www.google.com/webmasters/tools/removals?pli=1 and checking the
status of it
De-Indexation
The first thing about anti-computer forensics, is knowing how to properly remove l
W eaked or exposed information from a basic web browser search engine. The
process of doing this, is known as “Deindexation”, which is defined as, “to remove
from an index or any system of indexing, and to no longer be index linked”.
There are many ways you can go about performing deindexation, obviously a comm
on way to do this is to simply report a post to Google’s Webmaster page, and the
link along with it cache can be wiped completely from the search engine.
However, I personally have labelled and developed and even invented 12 personal
and private methods that I use solely for the purpose of deindexation, I will now
share them with you. Leaking of these will result in me personally destroying your
life, if you don’t believe me, test me
Keyword Scrambling
Keyword scrambling is essentially altering the keywords that people would search for
when looking for your information and then placing false leads based on this already
_ leaked information. As you now know, through the use of Google Search Operators, t
here are many ways that you are able to search for a variety of information/data that
can be presented to you on the web. You are able to exploit these search operators
to enhance the chance of your fake information to be displayed on the first search
page when users use the keywords that you implemented. Obviously these keywords
will change depending on the task at hand, but it is important to note that you want
to link your keywords for the fake information and relate them to the original
contents or link them to further false leads. An example of this in simplest form
would be the following:
Keyword Scrambling
D If someone searches “Tokyo Dox”, the result is the 4th result down. Key words for
this search would be “Tokyo” and “Dox”. However once they see the dox that is
WARLOCK DARK ARMY
already existing, they will gain access to a skype name, which is: s7_vexx < This can
now become a new keyword to be used to link to more false information. If you were
now to search: “s7_vexx”, a whole new alias would open up as well as linking to
further data, which is driving your pursuer further and further away. This is the most
simple form of de-tracement, as it is basically text altercation but with added fake
information, this will be discussed more in depth when we get to data poisoning.
Cloaking
Cloaking is the act of essentially copying the contents of a page, and then creating
alterations to the content to benefit your online identity and to mask information t
hat could have already possibly been leaked. In short, you are simply copying infor
A mation that has already been released and then making slight alterations to this ori
ginal content and then posting it as an updated version. The top sites to perform th
is on are:
1) pastebin.com
2) skidpaste.org
3) ghostbin.com
4) fbi.yt
5) weebly.com > this is for website alterations or domain redirecting (will be
discussed later)
Cloaking
R
You may be asking, how this can possibly assist me if I am essentially reposting legit
information on myself? Well, the answer to this question is that yes you are posting
legit information on yourself or a client, but if you are making alterations, you are
giving the illusion that you are updating the dox. If you continue this method over
the timespan of roughly 3-5 days, you will have redirected most if not all searches
for the original dox, to your own fake dox with complete alterations, making it now
look like the legit and updated dox on you or your client.
Cloned Content
Extremely similar to cloaking, however instead of a single page, you are pasting the
same information multiple times usually more than 20 times. Another thing to take
note of, is that google uses the “tag” system when ranking pages submitted by
L SEO’s. This tagging system can be exploited by using the google search operators
demonstrated above.
Specifically, in chronological order and order you should place them in the search b
ar:
1) “site:the site you’re copying goes here” (e.g. “site:warlockdarkarmy.net”)
2) “cache:the keywords you want to convey go here” (e.g. “cache:The Doxing Bible”
)
3) the use of the “#”, as this makes it trending for social media applications that are
using the search engine on their mobile phones or browsers
Cloned Content
O
The reason behind posting it multiple times is, again, alternating the page ranking
of the original post (e.g. your dox or a client’s dox), to respectively reverse which
dox appears first in google search results, either your faked and alternated dox, or
the original dox. By making your fake dox appear first when searching for these
“tags” that you’ve implemented, you are creating a form of trail obfuscation and
are essentially leading your pursuer into a dead end. This is the exact action you
want to lead them in.
Slaved Content
C
Slaved content is the act of having people formulate the keywords (tags) for you.
Essentially, you are able to grab the inspect element coding for a web page and
alter the code in your favor before posting it on one of the sites mentioned
before. This will redirect searches (such as sites with your Skype name on them) to
your post, and depending on your “pages” ranking, they may see it before the
actual page itself.
Slaved Content
As seen in the example above, I am grabbing the inspect element coding from a
K common site, this one happens to be a Google Food Photo Blog. Upon grabbing the
coding from the site, I can copy and paste it into the sites mentioned early, to then
automatically increase the page ranking for your fake dox or keywords, due to
Google’s hidden page ranking system, which acts as a giant scanner. If this scanner
detects things that have been deemed by Google to be already published, coded,
paid for (advertisements), or are low quality… the page ranking will alter
accordingly. This is an extremely important concept to grasp when dealing with
Footprint removal, as it has a significant impact on how fast or for how long the
real information will be covered or hidden compared to the fake content you
are producing.
Altercation of Page Ranking
Page ranking altercation occurs when you post low quality sites and affiliate them
with your already leaked information. By doing so, you will drag all information that
is posted at high ranking google pages down, as this exploits the tag system
A implemented by google SEO’s. This is an extremely easy yet effective method of
de-tracing, some sites that I recommend are normally affiliated with Google Dorks:
WARLOCK DARK ARMY
https://www.exploit-db.com/google-hacking-database/13/
https://www.exploit-db.com/google-hacking-database/10/
https://www.exploit-db.com/google-hacking-database/14/
Just keep in mind that you want to link these within the dox to make them blend in,
or simply post them at the bottom to keep them out of the way of the false informati
on that you’ve placed. This method is extremely effective when used properly, so ma
ster it!
Font Matching
Font matching occurs when you match the font of a page with font that you can alter
in a word document. Normally you are able to search the font used on a certain site if
you are unsure, but common ones are:
R 1) Open Sans
2) Arial
3) Typewriter
4) Times New Roman You then take an image of this font, with a PNG background
(used via photoshop/gimp), and are able to post it on forums and such to make it
look like the site is saying something other than what it intends. This normally is the
hardest de-indexation method, as it normally involves XSS (Cross Site Scripting)
hacking to apply an image within the code of a website to make it look as though it
belongs there. I would not recommend performing this method if you are not good
with XSS hacking, also, most sites that information is leaked on involves tight security
and will not be vulnerable to XSS hacking, therefore you need to find sites that are
and implement this method through those sites only.
Infoscoping
K
Personally coined by myself, this term refers to positing font that is essentially
microscopic to the naked eye, but is still cached by google’s index and can be seen via
the description under hyperlinks when the search results are visible. By performing
this method, you can place words on a completely irrelevant paste, and it will
confused anyone trying to gain access to your information. It is an extremely cunning
method, which I use personally, and it is extremely effective. However for sites that
have case sensitive posting privileges/restrictions, use the following firefox
add-on/extension to bypass case sensitive security features:
Infoscoping
_
1. Go to about:config
2. Search for dom.event.clipboardevents.enabled
3. Double-click it to change the value to "false“
Use the keyword scrambling method to ensure successful results with this method,
for example if you were to use the same keywords that were implemented before
and apply them to this method; when someone searches for the keywords, they will
cache as normal font size (via the description) and will be microscopic when the
pursuer clicks the hyperlink and sees the content of the page, which can be a
completely fake and non-related dox or piece of information.
Doorway Pages
Doorway pages is a common SEO term which refers to posting links which appear to
be affiliated with the original content of a page, only to be a trap door and unleashes
a whole new spectrum of fake information on your pursuer. Also closely linked with
A data poisoning and data obfuscation, which will be discussed in a moment. An
example of this would be posting legit information on yourself, and redirecting them
to another link which appears to affiliate but really drives them further away.
You are able to create a long chain of doxes that can link to one another and appear
to being “updated”, if you are not getting what I am trying to iterate towards you,
please look at this example carefully
Doorway Pages
If you plan to establish a false lead using this method, you need to have a select date
in which the trail will be formed. For example if the date is, 01/15/2015 and we want
R to use the date, 01/01/2015, and state that this is the date we want the trail to start
on, we need to create a false dox for this specific date. Once you have created this
fake dox, you need to make a new paste on one of the sites mentioned earlier, with t
he title: “Dox on” “Target name here” “updated” “insert the selective date here, in th
is case it would be 01/01/2015”. Although the date you publish this post will be listed
as 01/15/2015, it will go unnoticed by a common pursuer and they will think it’s
posted on the date you stated in the title. You then repeat your this step over the
following 14 days proceeding up to the 15th (or the date you set the trail to end),
and always keep linking the url to the previous dox post to ensure there is a
connection between the doxes. By doing this you can make a massive trail and the
date will be continues to appear as those it’s being updated.
100:1 Principle
The 100 to 1 principle is defined as a method to essentially spam false information to
most places on the web, and by doing so, you will make false information appear far
more legitimate. The use of iMacros (firefox and google chrome extension), allows
M you to record actions you are performing within your search browser, creating a
“macro” and you can repeat this macro as many times as you like, although you are
not the one actually performing the actions, it’s iMacros. There are however certain
sites this works best on, sites that do not have ip restrictions or captcha security
settings cannot be used, as they block spamming. The following sites are my top two
for performing this method:
1) http://pastebin.ca
2) http://slexy.org
You then record the script, in this case it would be the contents of a fake dox, and
then play the script a few times and you can instantly get 1500 searches within a
matter of minutes. This will not only increase the page ranking of you fake
information, but will also make the contents seem far more reliable and believable.
Rich Snippets
Rich snippets are essentially an SEO term for advertisements on google. You may see
an ad for Mary’s Golden Dildos or something of that nature when you search for a
song on google, and this is a perfect example of a rich snippet. However these rich
Y snippets can be exploited, by you simply copy and paste the rich snippet
URL to a paste site, and it will automatically bump it up in the google page ranking
system. Why? Well as stated before, if you were to think of Google or any search
engine for that matter, as a giant scanner, that scans your contents word for word,
you can come to realize that Google Processes page ranking and keywords and
search results based on what it scans. By implementing a rich snippet URL, you are
letting Google scan your page, and say “hey, this is registered as a URL to a paid
advertisement, this needs to have higher page ranking”, which is essentially what it
will do. Now granted, this will not automatically bump your post to the front page, ho
wever it will bump it up quite considerably An issue with these page snippets howev
er need to be constantly updated, as google’s page snippets update almost daily. So
long as you do that, you will be fine in terms of keeping your dox at a constant higher
page ranking.
Site Duplication
_
This is a combination of Doorway Pages and the 100 to 1 Principle. You essentially
create a competing dox that has been release of you, use the iMacros technique
while in the mean time altering the information slightly on your original dox, and
your main aim is to outrank the site that currently has your dox released. Again
altering the page rankings. This method is really not that hard to grasp and is
quite possibly one of the most effective as it is utilizing two methods into one and
making a greater impact. If you do not understand this method for whatever
reason, please contact me.
Interlinking
This is a basic scheme that takes advantage of the importance of inbound links in
search engine ranking by building dozens of sites and then linking them to each other
O . this can be applied to sites such as: www.pastebin.com, www.skidpaste.org, and
www.weebly.com , all of which you can link false doxes to one another to make them
appear as though they are being constantly updated by someone who truly dislikes
you with a burning passion. A way to do this, in a simplified example, is by doing the
following:
1) Go to Pastebin.com
2) Implement your fake dox, or fake content, whatever it may be, into the “new text”
section
3) Then, at the bottom after you have completely put in the fake content that you
require, open a new pastebin with a link to another fake dox you have created, copy
this link and paste it into the original pastebin you opened.
.
Interlinking
4) Repeat this step for roughly 5+ fake doxes you have released, make sure to include
F a link to another fake dox at the bottom. This will link all the pastes together in
Google’s search system, one will relate to the other, even if the content is completely
WARLOCK DARK ARMY
different.
This is an extremely good method to have a long line of false trails, while at the same
time linking and compiling more and more information on top of each other for
anyone that maybe trying to get information on you. This is a fantastic method, even
if it may be simple, it’s extremely effective.
Trail Obsfucation
F
The purpose of trail obfuscation is to confuse, mislead and alter someone’s
perception of identity or what they are representing. There are many techniques and
tools that can beused for trail obfuscation, all of which you can learn about by a
simple Google search. However, the main techniques and tools that we will be
looking at indepthare going to be; TimeStomp, Transmogrify, and Data Poisoning.
Transmogrify
The easiest way to perform this technique is to modify the header of a file, so that it
I can no longer be associated with any type of file already known to a system.
Following the general structure of a Windows PE executable file for example, it
always starts with a word value shown below:
HEX -> \X4D\X5A / ASCII -> MZ
Many forensic tools for recovering files within the analysed systems refer to these
parameters, sometimes only the header and others both headers and footers. By
changing these values, and restoring them only in case of necessity, it is possible to a
void detection of a hypothetical compromising document. This approach is adopted
by “Transmogrify,” an anti-forensic tool. The technique basically aims to deceive the s
ignature-based scan engine of these tools
Data Poisoning
Data Poisoning is a term coined by Some Black Hand member, Melty. This term
refers to, “The act of leaving a false trail that misdirects or misleads to a different
individual or trail.”
C Example: Alias Leaching
Alias leaching is the term of hijacking an alias, there are various levels of alias
leaching, alias leaching is most successful when a person is able to hijack an email,
and then grow a synthetic alias from there. Data poisoning may also include the
faking or misleading of an IP address geo location, based on the research done on
the previous alias, such as the original owners geographical location. Essentially you
are using previous data that you have hijacked, and implementing it into present day
data on an alias you may be going under or a client may want to be going under.
Data Hiding
Data hiding is an extremely simple concept, and there is not much to be discussed on
it, however there are some things that you need to know to ensure that you are
hiding data correctly. Data can be hidden in unallocated locations which are normally
I ignored or skipped over when dealing with being tested by forensic tools. The way
you are able to do this is to store data in the following locations:
These two areas are linked with areas of a modern ATA hard drive. Data that is in
either the HPA or DCO are not visible to BIOS and operating systems. There are also
three main subcategories when dealing with Data Hiding, they are; Encryption,
Steganography, and Slacker.
Encryption
Encryption and overall encrypted data is essential for hidden important information
and making it almost impossible to be traced through the use of forensic tools. What
encryption does is essentially make the information that is saved to your hard disk
A transparent, and is only solidified (as in readable), once it is opened again and
decrypted. Although there are forensic investigators that can decrypt most
cryptography, if the form of cryptography that you use on your system is unknown to
the investigator, you are almost guaranteed a solid barrier when dealing with
whether or not your information gets leaked. Microsoft Word can be configured to
encrypt the contents of a document by specifying that the document has “password
to open.” Another form of this is to save the file in notepad or some other basic docu
mentation application as a .batch file, which requires passwords to see the content in
side. Although older versions of Microsoft Word encrypted documents with a 40-bit
key that can be cracked with commercial tools, modern versions can optionally use a
128-bit encryption that is uncrackable if a secure passphrase is used. This is highly
recommended for most documents, if you are worried that they are unsecure or that
you need to hide sensitive information such as passwords, login details, etc.
Steganography
Steganography can be used to embed encrypted data in a cover text to avoid
detection. This means that you are able to hide text in the format of MP3, JPEG, AVI,
etc. By hiding this information within media files or non-text based files, it would
L make it extremely unlikely for any investigator to check these particular files. There is
a program for this, it is known as the following:
What StegFS does is “hides encrypted data in the unused blocks of a Linux ext2 file
system, making the data “look like a partition in which unused blocks have recently
been overwritten with random bytes using some disk wiping tool”. (McDonald and
Kuhn, 2003)
Other Forms of Data Hiding
Slacker is a commonly used data hiding forensic tool, and it is used via your
S command prompt, as is TimeStomp, which was mentioned earlier. “Slacker allows
you to hide data in the slack space of NTFS. This slack space is created when a file
system allocates space for a file to be written, it will typically allocate more space
than it actually uses. The unused space is called slack space and perfect data hiding
grounds for the hacker.” Slacker’s official website
Artifact Wiping
Artifact wiping methods are tasked with permanently removing particular files or
entire file systems. There are three core principles to artifact wiping, which will be dis
played as core subcategories of this terminology; Disk Cleaning Utilities, File Wiping
M Utilities, Disk Degaussing and Destruction Techniques. Disk cleaning utilities are
extremely essential for artifact wiping as the essentially overwrite existing data on
the disks of your computer. There are many arguments that go against this method,
and claim that disk cleaning utilities are not actually cleaning anything, as they are
leaving fingerprints of what has been removed and when or where it was removed
from. Some very useful programs for disk cleaning will be linked below:
1) http://www.jetico.com/products/personal-privacy/bcwipe/
2) http://www.r-wipe.com/
3) http://www.aevita.com/file/delete/
4) http://www.cyberscrub.com
Artifact Wiping
Out of all of these, I personally would highly recommend either BCwipe or
cyberscrub. These have probably the best reputation in terms of reviews and
consistency.File wiping utilities are as the name suggests, they are tools used for
A wiping single or individual files from an operating system. These are normally much
faster to remove as they are only wiping a single content source as oppose to a large
string of files or an entire file system. It is because of this very reason that singular
file wiping utilities have much smaller, if not non-existent, signatures within a system.
They are much harder to detect, and investigators struggle to find these signatures.
Again, there are extremely similar tools to use or look into when dealing with File
Wiping Utilities, but if you’re looking to download less software and do twice as
much cleaning on your machine, I would recommend, once again, downloading:
1) http://www.jetico.com/products/personal-privacy/bcwipe/
Artifact Wiping
K Disk degaussing is the term for completely wiping and destroying the process that is
your hard drive or disk drive. This is done through the use of an magnetic field being
applied to your hardware, the data of this device or disk is completely wiped,
WARLOCK DARK ARMY
http://viewdns.info/
https://inteltechniques.com/menu.html
http://www.infosniper.net/
Ok, so, with the identity we made earlier, we can tell people we are someone else,
but actually be you… Or, pretend to be a semi-distant relative like a second or third
cousin! They will probably fall for this trick!
Doxing Through Teamspeak
Doxing through TeamSpeak is one of the easiest things ever. All you do is right-click
the person you want to dox and select client connection info and find their IP, and
you’re done! Now, to do this, you must be an admin of the server or operator of the
K channel. Or… you can:
-Exploit Permissions (in some servers Member group is allowed to view IP and Guest
is allowed to promote themselves to member)
-Social Engineer someone with higher permissions than you.
-Jack the TS3 Server
Doxing Through Teamspeak
So, how do I know if the permissions are vulnerable? To check for compromised
🎩 permissions systems, open the permissions tab at the top, and choose Server Groups
. If you see anything you know is out of the ordinary (other than default permissions)
, you will probably not be able to rank yourself up. Well, if I can’t do that, what do I
do? You see a user with higher permissions than you. Say you’re on a server with an
admin, and you ask for a rank such as member, or channel operator so you can put
music on the channel. If they fall for this, the process will be easy. If not, things get
slightly more complicated. You can tell the admin or owner that you can make a logo
for the server in exchange for a higher rank, you can give him “special” files (you guys
know what I mean). Or you can just hack the server!
WARLOCK MAK
WARLOCK DARK ARMY
You will be responsible if you have perform any illegal activity after reading this book.
I do not claim any activity that will be performed by you after reading this book.
THANK YOU!!
WARLOCK DARK ARMY