>>293525
>>293530
>>293569
Hi guys, well, since you're all asking I'm going to do some kind of AMA about how to dox properly or get info you are not supposed to get.
depending of your target, it's up to you to change and improve. sure, i'll be honest it's not with a simple google search you can find what you want, even if now, if you just type a name, you get everything about people exposing their real life on Facebook and all kind of socialist networking crap.
Essentially,it takes a lot of investigation, you have a LOT of data, and have to adapt everytime and know who you are centered around, his point of interests, in his case what he's targeting, what he's using and where he's been posting. this case was actually interesting since we had images, format 480p, flat, no deep of field, taken with a phone.
so i'm hooking on a public wifi and try to break in Facebook, classic, forgot my password, etc. same for twitter, there's a phone verification. a few guesses for the emailpassword combo, no success. He's got no friends or anything so it's not like i'm gonna access anything, brought back my phishing pages on my page for a moment. This is why it's important to keep a SE toolkit.
the rare details he provided, the video of this guy, a location, a name (Andrew) from Farmington, Missouri.which is bait, this means he cares about his anonymity. I'm keeping the phone verifications for later.
Still know I can find Joby if I track his posts on lesser secured sites.
https://mlpforums.com/profile/38517-joby-dimms/?do=content&change_section=1
phpBB is usually a goldmine if we know where to look for, the admins did a decent job, it's hard to break or inject anything to open their database. Penetration tests, etc, I've been seeing gaping security holes on Oracle Payroll databases but this one is the work of a true autist. I like how this sucks. if i had the time and hardware i could eventually break it but i'm keeping it for later, and i wouldn't get a lot of intresting stuff.
Most site blocks proxies, and the way now to remain Anon is to use a phone, that's a first step. Phones are shit computers and usually are very good security holes, especially a little exploit i've found on wikos during a security audit on how to make some Oracle software work for managers on their mobiles like a client-terminal app. and explaining why it's a bad idea, turns out this exploit is small but that's all i need.
let's make a call. sometimes the best way to get a password is to ask for it to a responsible, administrator, and politely. here, i think it won't work because my guy is sleeping, but not his phone. it's always on. So I prepare my toolkit, ssh, metasploit. some homebrew scripts and tools from the Kool Kidz Klub, darknet shit, just keeping in mind i'm not with a limited bandwidth. 10:00 i'm ordering another café. anyways androids on 3/4g usually have an Ip that changes all the time, but as long it's connected, yeah.
Wit hthe little help of a …pricy tool, yet priceless, i'm getting to make sure if a given request on a cell network will reach its destination, and yes, thanks for it it arrived, and for the program i'm using it worked like a ping, now i don't care about the passwored reset, i know it's a lagdroid! and it's in Virginia. Well, okay let's go further. After fiddling with some SE exploits i finally get to ssh into a that terminal, something relevant to my interests, 96.255.something Verizon in Manassas. this means both wifi and 3G are on. From here, the whois gave me everything i needed. Streetview, satellite, searching for the name, Ahmed Shinaishin. From here I research this name. The rest is looking for info about him, classy with DDG, but less classy with requests especially schools, who keep tracks of every student since this guy got promoted with a ridiculous hat (seriously what's with those hats?)
Finally find a few videos of Omar in his kitchen, and recognize his eyebrows, surgeon mask he certainly got from his father, and windows's blinds.
Take a few screenshots, list everything, check, re-check again then confirm it's him, since it could be redirecting me to another target of his choice. but nope, all the elements are matching. asking others on crypto to confirm, and make the info public. i really expected something bigger, like a real loon, nothing really bad.
>>293531
This guy was easy, and if really any of you have issues with this midget fraud, just hop on Rizon IRC.
Tiarannosaur is a good assistant, yet even more cryptic collaborator, it's also important to really know who you share info with. As for most of the techniques, it would be hard to list them all, mostly lulzsec and /ncr/ stuff, then KKK for the harder SE part and mods. i'm just putting the tools in common with the material and that's interesting.