Doxing, is the term used for the process of gathering personal information on a slave/target, although this does commonly take place over the internet, this isn’t always the case. There are many methods of doxing, and various tools available over the internet.
Here are the some list of websites which may be useful for you while gathering the information:
http://www.pipl.com
(Searches for emails, names, usernames, etc.)
http://www.google.com
http://www.bing.com
(Searches for everything)
Reverse Search for pictures:
http://www.tineye.com
Reverse area code search:
http://www.telcodata.us/telcodata/telco
Reverse Phone number search:
http://www.whitepages.com
http://www.411.com
US Criminal Record Check:
http://www.criminalsearches.com/
Realtor Home search:
http://www.realtor.ca/
Ancestry Search:
http://search.ancestry.com/
Company Director Addresses
http://www.lookuppeople.co.uk/
Internet Archive:
http://www.archive.org/web/web.php
Reverse IP:
http://www.whois.sc/
http://www.ipgp.net/
http://www.ip2location.com/free.asp
http://www.ip-adress.com/ip_tracer/
Temporary Mail:
http://www.mailinator.com/
http://10minutemail.com/
Anonymous email sending:
http://mail.anonymizer.name/
http://emkei.cz
Secondary people search other then pipl.com
http://www.com.lullar.com
Gather Information on people’s cameras by just uploading an image:
http://regex.info/exif.cgi
Once the target is acquired send free empty boxes:
http://www.usps.com/
Telephone/SMS Spoofing:
http://www.telespoof.com/freecall/agi
http://smsglobal.com
http://lleida.net
http://crazycall.net
Where to begin:
Basically, any personal information you have on the slave will be helpful, whether it be a Facebook page or Twitter page, their full name(or even their first name), their general location, their phone number, anything.
Social-Engineering is very closely related to doxing, as you can social-engineer the slave into revealing information about themselves.
A good knowledge on how to trace IP’s can also be helpful, as say, for example, if you have a full name, but no location, searching for that one name out of the whole world.. there’s going to be a lot of people with that name, but if you’re searching for someone with that name, living in a certain city (based on location of their ISP), it narrows it down, drastically. If they own a website, a simple WHOIS search will save you a lot of time.
Compiling/formatting your Dox:
Placing your dox in an eye-friendly format will save you a lot of time in the long run, and will avoid confusion. You should make a template to store your dox in, before attempting doxing
Here is a suggested template that we made to store your dox in, it can be modified to suit your needs, but it covers all the basics.
- Quote:
- Usernames/Aliases:
- Real name:
- Real Nickname(s):
- Location:
- Ethnicity:
- Nationality:
- Pictures:
- Videos:
- Religious Views:
- Sexual Orientation:
- Home number:
- Mobile number:
- IP address:
- Websites owned:
- Social-Networking pages:
- Forums they’ve posted in:
- Family members:
- Occupation:
- Criminal Record:
- Car make, model and license number:
- List of all websites with their info on:
- Misc. information:
Etc..
You may also like:- CTEM – A Strategic Approach to Mitigating Cyber Risks
- AI in Penetration Testing – Revolutionizing Security Assessments
- Protecting Your Organization from AI-Enhanced Social Engineering Attacks
- The Rise of AI-Powered Cyber Attacks in 2025
- Top 5 Penetration Testing Methodologies to Follow in 2025
- Top 10 Penetration Testing Tools Every Security Professional Should Know in 2025
- Emerging Trends in Vulnerability Assessment and Penetration Testing (VAPT) for 2025
- The Role of Cybersecurity in Protecting IoT Devices in 2025
- Understanding the Five Phases of Penetration Testing
- Top 20 Cybersecurity Career Options