Tutorials

DOXING - A WAY OF TRACING PEOPLE

Please note: Team IHA is not responsible for the misuse of the information and data provided here. 


Doxing is a way of tracing someone or getting information about an individual using sources on the internet and social engineering techniques. It's term was derived from --Documents-- as a matter of fact its the retrieval of Documents on a person or an organization.

Definiton of Doxing:

Doxing is derived from Document Tracing. Doxing is tracing the information from internet resources about particular person.
Usually internet users leave their information (lik e gender, name..) in some websites (like social network). So using some searching Techniques, we can gather complete data about a person. This type of searching is known as Doxing. This data can be used to hack their account or trace them.

What you can find using Doxing?

Real Name, age,gender
Email id, registered websites, Social Network accounts, 
Address, Phone Number
Parent's Names and their Jobs, Place of Education (School/ University etc.)
Relatives and more data.

From where you are going to start?

Yes, if you know person realname, then start from his name. If you know the username then start from there. or if you know any other data, start from there Using name or username , search for other information in google.

How to do Doxing?

Just assume you want to gather information about someone. Let us assume his username is yzyzyzy. If you search in google for "yzyzyzy" , you will get thousands results about yzyzyz. So what you are going to do? You have to have some other information about shehab from somewhere. For example, You got his birthday. Now you can continue your searching with "yzyzyzy xx/xx/xxx". This will reduce the resutls.
Not only birthday, you can use some other info like signature. For example if he put signature in a forum as "kill code". You can continue searching using"yzyzyzy kill code". This will reduce the Results.

Sometime your target person registered in multiple forums, websites, social networks... So while searching, you will get result of registered website of him using that username or info.
Read Each posts of target person, he might have left some more information about him any one of forums or websites.

Using Email Address for Tracing:
If you got the email address of target person, it is much easier to trace the person. You can search using in the following sites. you may get some data.

Websites that will be useful for Doxing:

myspace.com/
bebo.com/
facebook.com /
google.com/
pipl.com/
wink.com/
123people.com/
zabasearch.com/
...
If the above sites don't give u any results try these 2 methods below. 

It is great if the person uses paypal for online transactions. (In this case Liberty Reserve and Bitcoin are useless) 

Login to your paypal, and transfer a very little amount of money from your account to the other person's account. While the transfer is in place, you will be able to view all his info. But beaware that he can also view your complete info. 

If your target owns a website. A website not a blog. You can do a who is search on the domain and you will have the details. 

Telephone Number and address: 

By now u should have been able to find the victims Real Name. Now go to an online white page or telephone directory and search for the name. You will get a lot of results but you need to analyze the results and find out the exact user. 

Doxing needs Intelligence and searching ability. You have to guess where to search and what to search about person. 

Depending on searching ability, you will get what you required.

Security Question:

A Hacker can get the victim's security question answer using doxing.

For example, if your questions is "What is your pet?", he may guess. He will search with email or username . you may have left somewhere on the internet my pet is xxx. So now you are the victim.

Dictionary Attack:

Hackers can gather information about the victim and create a dictionary file (wordlist) for a target person alone. Using that dictionary file , he can crack your passwords.

Conclusion:
Doxing is one hell of a powerful hacking method but it requires a lot of patience and searching ability.

Security Tips of Users:

Don't use Internet. This is best security tip because your data can be traced by anyone. sounds crazy?! No one like to leave the Internet. So i am giving some other tips for you.

1. Be careful when you give information in internet.

2. Use very Strong passwords .

3. Don't set Stupid security Question for account.

4. Limit your personal info to your friends only.

5. Use strict options in privacy. 

Avoid opening links sent by unknown people






IT TIP: ANONYMOUS SURFING


JonDos publishes a new version of the JonDo-Software, an IP changer and IP anonymization program, that you can use for anonymous surfing in the Internet with high security anonymous proxy servers.


What is JonDo?


JonDo is an open source and free-of-charge program for Windows, Linux and MacOS X. It hides the user's IP adress behind an anonymous IP address. In contrast to other anonymizers (VPNs, anonymous proxy servers), the user's anonymity stays protected even against the providers (operators) of the anonymous IP address. 


TOR 


Tor is very useful for online anonymity, its protect your privacy, defend against a form of network traffic analysis. Traffic analysis can be used to infer who is talking to whom over a public network. Knowing the source and destination of your Internet traffic allows others to track your behavior and interests. 

Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features. Tor to keep websites from tracking them and their family members, or to connect to news sites, instant messaging services, or the like when these are blocked by their local Internet providers. Tor's hidden services let users publish web sites and other services without needing to reveal the location of the site. 

UltraVPN is a simple user interface to connect or disconnect to our VPN servers. 

To use UltraVPN, you need to right click on a traybar icon (on the bottom right of your screen) that looks like a computer with a red screen. After right clicking on it, choose "connect". It can be used by any individual who simply wants to protect his privacy, either on a LAN or a public hotspot. 


FEATURES: 


You can connect or log in into MSN if it's blocked. 

For use VoIP software like Skype if it's blocked. 

UltraVPN protect your email and browsing privacy.



Amazing Computer Tricks To Hide Your Drives


In this amazing computer tricks I’ll show you that how you can hide a drive. We always hide our folders or other documents for security purpose or personal causes. After reading this tricks you can hide your computer hard drive when needed. Non-hide process are also given. This is really an amazing computer trick. 
Hide your Drives more easily: 

Hide:

To hide a Drive follow the following steps which are given below:

1. At first go to the ‘Start Button’ and go to “Run” Or press “Windows Logo key” + R.

2. Type cmd and press Enter. For this reason Command prompt will open.

3. Write diskpart in the Command Prompt and press Enter.

4. Then write list volume and press Enter. After that you will see the Volume number and Drive letter of the Drives.

5. Now if you want to hide a Drive you have to select its Volume number. To do that write select volume 1 (Let we want to hide a drive which Volume number is 1).

6.Then write remove letter E. Here E is the drive Letter of that drive which Volume number is 1. 

7.Then restart your Computer. After restart computer Drive E will Hide .

Non-Hide: 

To Non-hide a Drive follow the following steps which are given below:

Follow the first 4 steps(1-4) which are given above in this post.

Then :

5. Now if you want to non-hide a Drive you have to select its Volume number. To do that write select volume 1 (Let we want to non-hide a drive which Volume number is 1).

6.Then write assign letter E. Here E is the drive Letter of that drive which Volume number is 1.

7. Then restart your Computer. After restart computer Drive E will show.



HOW TO HACK A CCTV CAMERA





Closed-Circuit Television (CCTV) is the use of video cameras to transmit a signal to a specific place, on a limited set of monitors. It differs from broadcast television in that the signal is not openly transmitted, though it may employ point to point (P2P), point to multipoint, or mesh wireless links. Though almost all video cameras fit this definition, the term is most often applied to those used for surveillance in areas that may need monitoring such as banks, casinos, airports, military installations, and convenience stores. Videotelephony is seldom called "CCTV" but the use of video in distance education, where it is an important tool, is often so called.


TIPS

Ever wanted to spy on a business (maybe a Suspicious Business, so you can help the Security Agents)? A workplace, or a town? Or your just totally bored and got nothing else to do and want to fuck about with some CCTV, Well this tutorial is for you! You can hack into the cameras and control them too! What I am about to tell you is Google Hacking. No its not the type of hacking you may know or hear of, but it is STILL hacking. So be warned. Use this tutorials at your own risk 

Step 1: Go to Google! http://www.google.com/


Step 2: Enter one of the following lines: (Note, Do not enter the whole lot, that won’t work!)


*inurl:”CgiStart?page=”


* inurl:/view.shtml


* intitle:”Live View / – AXIS


* inurl:view/view.shtml


* inurl:ViewerFrame?Mode=


* inurl:ViewerFrame?Mode=Refresh


* inurl:axis-cgi/jpg


* inurl:axis-cgi/mjpg (motion-JPEG) (disconnected)


* inurl:view/indexFrame.shtml


* inurl:view/index.shtml


* inurl:view/view.shtml


* liveapplet


* intitle:”live view” intitle:axis


* intitle:liveapplet


* allintitle:”Network Camera NetworkCamera” (disconnected)


* intitle:axis intitle:”video server”


* intitle:liveapplet inurl:LvAppl


* intitle:”EvoCam” inurl:”webcam.html”


* intitle:”Live NetSnap Cam-Server feed”


* intitle:”Live View / – AXIS”


* intitle:”Live View / – AXIS 206M”


* intitle:”Live View / – AXIS 206W”


* intitle:”Live View / – AXIS 210?


* inurl:indexFrame.shtml Axis


* inurl:”MultiCameraFrame?Mode=Motion” (disconnected)


* intitle:start inurl:cgistart


* intitle:”WJ-NT104 Main Page”


* intitle:snc-z20 inurl:home/


* intitle:snc-cs3 inurl:home/


* intitle:snc-rz30 inurl:home/


* intitle:”sony network camera snc-p1?


* intitle:”sony network camera snc-m1?


* site:.viewnetcam.com -www.viewnetcam.com


* intitle:”Toshiba Network Camera” user login


* intitle:”netcam live image” (disconnected)


* intitle:”i-Catcher Console – Web Monitor”

No comments:

Post a Comment

ShareThis