Account Verification

Are you requesting access to your account?

+======================================================================================================+
|                  THE ULTIMATE DOXXING & OSINT MANUAL (MADE BY SPYDIR)                                |
+======================================================================================================+

>> AUDIENCE:
   Red Teamers, Threat Intelligence Analysts, Investigators, Doxxers, Bug Bounty Hunters.

>> PURPOSE:
   Show how adversaries build FULL identity profiles (doxxing) using open source data, breach data, 
   and digital footprinting.

>> MESSAGE:
   I hope this guide helps everyone take their research and data collection. – SpyDir
-- If you want to add go ahead and add - Help the community.

======================================================================================================
0x00. TABLE OF CONTENTS
======================================================================================================

1. Introduction
2. DOXXING ATTACK CHAINS – Step-by-Step Identity Profiling
   - 2.1 Understanding the Doxxing Mindset
   - 2.2 Full Attack Chain Framework
   - 2.3 Deep Techniques (Every Data Angle)
   - 2.4 Advanced Correlation
   - 2.5 Examples: Real World Chain Builds
   - 2.6 Defensive Countermeasures
3. BREACH DATA PIVOTING – Emails → Leaks → Passwords → Infrastructure
4. Data Brokers & People Search Engines (Full Index)
5. Social Media Doxxing & Digital Footprinting
6. Metadata & Device Fingerprinting
7. Image & Geo-Location OSINT
8. Family, Friends, & Relational Mapping
9. IP Hunting & Technical Infrastructure Mapping
10. OSINT Toolsets & Frameworks
11. Google Dorking – Advanced Search Exposures
12. Dark Web & Underground Intelligence
13. OPSEC & Anonymity

======================================================================================================
0x01. INTRODUCTION
======================================================================================================

Doxxing is not about “hacking into” anything; it’s about connecting **public crumbs of data** into a full profile.
Attackers systematically move from **seed data** (an email, username, phone number, or domain) to:
  - Full legal name
  - Address history
  - Family members
  - Employment details
  - Hobbies, habits, weak points

======================================================================================================
0x02. DOXXING ATTACK CHAINS – STEP-BY-STEP PROFILE BUILD
======================================================================================================

-----------------------------------
2.1 UNDERSTANDING THE DOXXING MINDSET
-----------------------------------
Adversaries follow a pattern: **Collect → Correlate → Confirm → Expand**

They start with ONE piece of information and build outward:
  - Email address → username → social media → workplace → family → financial

-----------------------------------
2.2 ATTACK CHAIN FRAMEWORK
-----------------------------------
**Stage 1: SEED DATA**
- Email addresses (from leaks, public sites, domains)
- Usernames (gaming, forums, social media)
- Phone numbers
- Real names (partial or full)

**Stage 2: DATA BROKER & PUBLIC RECORDS**
- People search engines (Infotracer, Whitepages, Spokeo, TruthFinder, Intelius, FastPeopleSearch)
- Property/tax databases
- Business registrations (OpenCorporates, state corp databases)
- Court filings (PACER, clerk of court portals)

**Stage 3: SOCIAL MEDIA & DIGITAL FOOTPRINTING**
- Username cross-check: WhatsMyName, Maigret, Sherlock
- Social platforms: LinkedIn, Facebook Graph, Instagram (geo-tagging), Reddit post history
- Friends, followers, relatives as indirect pivots

**Stage 4: BREACH DATA EXPLOITATION**
- HaveIBeenPwned, Dehashed, Scylla, Snusbase
- Leak parsing: passwords → reused credentials → new accounts

**Stage 5: METADATA & DEVICE FINGERPRINTING**
- ExifTool (image metadata)
- FOCA & metagoofil (document metadata)
- Browser/device fingerprint leaks (email headers, forum posts)

**Stage 6: INFRASTRUCTURE MAPPING**
- WhoisXML, ViewDNS, SecurityTrails (domains, IP history)
- SSL certificate transparency logs (crt.sh)
- Shodan/Censys (find owned devices)

**Stage 7: FAMILY, FRIENDS, RELATIONAL PIVOTS**
- Relatives from data brokers → their social media → confirm addresses/photos
- Friends tagged in posts revealing locations

-----------------------------------
2.3 DEEP DOXXING TECHNIQUES (EVERY ANGLE)
-----------------------------------

**Phone Number Doxxing**
- HLR lookups (HLRLookup.com)
- Reverse search: Truecaller, Sync.me, Infotracer
- Carrier lookups (who owns the number?)

**Email Address Doxxing**
- Check Google/Gravatar images for account photos
- Epieos: Reverse Google account search (public calendars, map reviews)
- Check associated usernames across breaches

**Username Doxxing**
- Sherlock, Maigret, WhatsMyName: find where username is used
- Forum cross-use (same username posts on tech/gaming forums → personal info leaks)

**Financial & Property Footprinting**
- County tax assessor databases
- Zillow/Realtor: property linked to names
- Business registrations: LLCs, DBAs, partnerships

**Workplace Doxxing**
- LinkedIn scraping: employee hierarchies
- Email pattern guessing (firstname.lastname@company.com)
- Zoominfo, RocketReach for org charts

**Travel & Location**
- Instagram/TikTok geo-tagged posts
- Public Strava fitness maps
- AirBnB host profiles

-----------------------------------
2.4 ADVANCED CORRELATION
-----------------------------------
- Connect addresses to relatives and past residents
- Build time-based address history
- Overlay breach data on current employer accounts
- Cross-pivot domains registered by same WHOIS email

**TOOLS:**
- SpiderFoot (automated chaining)
- Maltego (relationship graphs)
- IntelX (leaks + dark web)
- Scylla.so (breach aggregator)

-----------------------------------
2.5 REAL-WORLD CHAIN EXAMPLES
-----------------------------------
1. Username → forum posts → photo with EXIF → GPS coordinates → property record → family members
2. Work email → Dehashed → reused password → LinkedIn login → map company infrastructure

-----------------------------------
2.6 DEFENSIVE COUNTERMEASURES
-----------------------------------
- Remove info from data brokers (opt-out)
- Use alias emails/usernames
- Strip metadata from files/photos
- Train employees on oversharing risks

======================================================================================================
0x03. BREACH DATA PIVOTING – EMAILS → LEAKS → PASSWORDS → INFRASTRUCTURE
======================================================================================================

**Sources:**
- HaveIBeenPwned (free)
- Dehashed, Snusbase, LeakCheck, Scylla (paid APIs)
- Breach-parse tools to parse large dumps

**Pivoting Steps:**
1. Start with email in breach DB → extract leaked password
2. Try password reuse across other accounts
3. From username reuse, find forums/social accounts
4. Cross-pivot to domains registered by same email
5. Link back to physical addresses, workplaces, devices

**Dark Web & Underground:**
- IntelX.io (dark web indexed)
- Kilos, DarkOwl
- Telegram leak channels & paste sites

======================================================================================================
0x04. DATA BROKERS & PEOPLE SEARCH – COMPLETE INDEX (EXPANDED, CATEGORIZED, ACTIONABLE)
======================================================================================================

USAGE NOTES
-----------
• Verify with at least 2–3 independent sources before treating any record as confirmed.
• Cross-pivot: NAME ⇄ EMAIL ⇄ PHONE ⇄ ADDRESS ⇄ DOB ⇄ RELATIVES ⇄ EMPLOYER.
• Always check each site’s OPT-OUT to remove your own data (or for clients, with written authorization).

LEGEND (Strengths)
[ID] Identity/relatives   [PH] Phone/Caller ID   [AD] Address history   [PR] Property
[EM] Email finds          [CR] Criminal/civil    [CO] Corporate/LLC     [SOC] Social links
[INT] International       [API] Has API/Pro tier

------------------------------------------------------------------------------------------------------
A) CORE U.S. PEOPLE-SEARCH / DATA-BROKER AGGREGATORS
------------------------------------------------------------------------------------------------------
Infotracer.com                 [ID][PH][AD][CR][SOC]  – Deep person profiles, includes relatives, aliases.
Whitepages.com                 [PH][AD]               – Phone/Address; good for landline history & reverse lookups.
Spokeo.com                     [ID][SOC][EM][PH]      – Social graphing, usernames, email enrich.
TruthFinder.com                [ID][CR][AD]           – Person reports with past addresses, possible records.
Intelius.com                   [ID][AD][PH][CR]       – Longstanding aggregator; link analysis between addresses.
FastPeopleSearch.com           [ID][AD][PH]           – Quick basic profiles; often shows previous addresses.
PeopleFinders.com              [ID][AD][PH]           – Similar to Intelius; old address history often present.
Radaris.com                    [ID][AD][CO][SOC]      – People + business affiliations; good for LLC associations.
BeenVerified.com               [ID][AD][PH][CR][SOC]  – Person reports + social links, usernames.
Pipl.com (Pro)                 [ID][EM][SOC][API]     – Email/username identity resolution for investigators.
ZabaSearch.com                 [ID][AD]               – Simple public records index; older address snapshots.
CocoFinder.com                 [ID][AD][PH]           – Basic aggregator use to corroborate others.
InstantCheckmate.com           [ID][CR][AD]           – Criminal/court mention surfacing; verify independently.
Nuwber.com                     [ID][AD][PH]           – Aliases, household members/roommates.
Thatsthem.com                  [ID][AD][EM][PH]       – Free lookups; good for email ⇄ address pivots.
TruePeopleSearch.com           [ID][AD][PH]           – Often returns phone + past addresses; quick corroboration.
PeekYou.com                    [SOC][ID]              – Social user discovery across platforms; username pivots.
WebMii.com                     [SOC][ID][INT]         – Social mentions internationally; public web presence.
IDTrue.com                     [ID][AD]               – Lightweight corroboration on address/age ranges.
NeighborReport / Addresses.com [AD][PH]               – Address and neighbor lists; local context.
USSearch.com                   [ID][AD][PH]           – Legacy broker; sometimes surfaces older database refs.

------------------------------------------------------------------------------------------------------
B) PHONE / CALLER‑ID / EMAIL ENRICHMENT
------------------------------------------------------------------------------------------------------
Truecaller (app/web)           [PH][ID]               – Reverse caller ID at scale; often shows caller name.
Sync.me (app)                  [PH][SOC]              – Phone → social hints; verify accuracy.
NumLookup.com                  [PH]                   – Simple reverse; carrier type (mobile/VOIP).
CallerSmart                    [PH]                   – Community reports + reverse phone.
Hunter.io                      [EM][CO][API]          – Company email patterns; domain-based enrichment.
RocketReach / ZoomInfo         [EM][CO][ID]           – Work emails, titles; B2B enrichment (verify carefully).
Clearbit (Pro)                 [EM][CO][API]          – Company/person enrichment via email/domain.
Epieos.com                     [EM][SOC]              – Google account pivots (public Maps, photos, calendars).

------------------------------------------------------------------------------------------------------
C) PROPERTY / ASSESSOR / HOME & NEIGHBOR DATA
------------------------------------------------------------------------------------------------------
County Assessor Portals        [PR][AD]               – Owner name, parcel history, valuations (per county).
Zillow.com / Realtor.com       [PR][AD]               – Historical listing photos; neighborhood metadata.
Redfin.com                     [PR][AD]               – MLS snapshots; price history; date correlations.
Trulia.com                     [PR][AD]               – Complementary neighborhood insights; rental history.
BeenVerified (Property)        [PR][AD]               – Packaged property reports cross-linked to owners.
PropertyShark (select cities)  [PR][AD]               – Deep deeds, liens (paid in some regions).

------------------------------------------------------------------------------------------------------
D) COURTS / CRIMINAL / CIVIL / LICENSE
------------------------------------------------------------------------------------------------------
PACER (US Federal)             [CR]                   – Federal docket search (paid by page).
State/County Court Portals     [CR]                   – Civil/criminal filings; varies by jurisdiction.
VINELink                       [CR]                   – Custody status notifications in some states.
State Bar / License Boards     [CO][ID]               – Professional licenses, disciplinary actions.
Sex Offender Registries        [CR][AD]               – Official registry details; verify identities cautiously.

------------------------------------------------------------------------------------------------------
E) CORPORATE / LLC / NON‑PROFIT / OWNERSHIP
------------------------------------------------------------------------------------------------------
OpenCorporates.com             [CO][INT]              – Global corporate records + officer cross‑links.
State Secretary of State       [CO]                   – U.S. entity filings; registered agent, officers.
CorporationWiki.com            [CO]                   – Cross-link officers & entities; sanity-check with SOS.
Manta / D&B / BBB              [CO]                   – Business directories; sometimes list principals.
IRS Exempt Orgs (990 search)   [CO]                   – Non-profit officers, compensation (public filings).
SEC EDGAR                      [CO]                   – Filings, exec names/addresses for public companies.

------------------------------------------------------------------------------------------------------
F) SOCIAL GRAPH / USERNAME PIVOTS
------------------------------------------------------------------------------------------------------
WhatsMyName                    [SOC][ID]              – Username → site presence (large coverage).
Maigret                        [SOC][ID]              – CLI username sweeps across 300+ sites.
Sherlock                       [SOC][ID]              – Similar to Maigret; cross-verify across both.
Namechk / KnowEm               [SOC]                  – Handle availability + discovery.
PimEyes (face search)          [SOC]                  – Face similarity search; confirm with sources.
Yandex Images / Google Lens    [SOC]                  – Reverse images for avatars, tattoos, locations.

------------------------------------------------------------------------------------------------------
G) INTL & COUNTRY‑SPECIFIC DIRECTORIES
------------------------------------------------------------------------------------------------------
192.com (UK)                   [ID][AD][INT]          – UK electoral roll (open register), director data.
Companies House (UK)           [CO][INT]              – UK company filings; officer addresses (historic).
UK Land Registry               [PR][INT]              – Title registers (paid); owner/price history.
Canada411.ca                   [PH][AD][INT]          – Canadian phone/address directory.
White Pages AU (Australia)     [PH][AD][INT]          – Australian listings.
ABN Lookup (Australia)         [CO][INT]              – Australian business registry.
MCA (India) – mca.gov.in       [CO][INT]              – Indian company filings; directors.
Gov property portals (varies)  [PR][INT]              – Country/municipal land records.

------------------------------------------------------------------------------------------------------
H) LEAK / BREACH AWARENESS (LEGAL CHECKS / MONITORING)
------------------------------------------------------------------------------------------------------
HaveIBeenPwned.com             [EM]                   – Email breach exposure alerts; domains monitoring.
Dehashed.com (paid)            [EM][ID][API]          – Emails, usernames, IPs; sometimes SSN fragments.
LeakCheck.io (paid/API)        [EM][API]              – Combos + partial SSN in some sets; verify legality.
Scylla.so (paid/API)           [EM][API]              – Aggregated breach indexes; programmatic checks.
IntelX.io                      [INT][SOC]             – Index of paste/leak sites; dark-web aware search.

------------------------------------------------------------------------------------------------------
I) “DATA EXHAUST” / MISCELLANEOUS
------------------------------------------------------------------------------------------------------
Wayback Machine (archive.org)  [SOC][AD]              – Old versions of profiles, personal sites, dox artifacts.
Gravatar                       [EM][SOC]              – Email → avatar; hash collisions reveal usernames.
Username → GitHub/GitLab       [SOC][CO]              – Emails in commits; company domains; personal sites.
Public WHOIS / SecurityTrails  [CO][AD]               – Domains, historical DNS/IP; infra mapping.
Crt.sh (CT logs)               [CO]                   – SSL certificates; domains tied to same emails.

------------------------------------------------------------------------------------------------------
HOW TO WORKFLOWS
------------------------------------------------------------------------------------------------------
1) From PHONE → PERSON
   • Run phone in Truecaller / NumLookup / Whitepages (reverse). 
   • Cross-check name & city in FastPeopleSearch + Intelius (confirm DOB range).
   • Pivot to relatives list → verify via Facebook/LinkedIn.
   • Confirm address against County Assessor + Zillow photos.

2) From EMAIL → FULL PROFILE
   • Epieos (Google account traces) → grab avatar, Maps lists, possible name hints.
   • Pipl/Spokeo/Thatsthem: email → addresses, phones, age ranges.
   • Dehashed/LeakCheck: see breaches → new usernames → new emails.
   • Use usernames in Sherlock/Maigret; pull social links and photos.
   • Validate home address via property records; link household/roommates.

3) From NAME (COMMON) → CORRECT PERSON
   • Add DOB/age range + last known city (broker filters).
   • Compare relatives lists across 3+ brokers; keep only intersecting names.
   • Use LinkedIn (company + city) to choose the correct identity.
   • Sanity-check with court dockets for unique identifiers (middle initials, addresses).

4) From ADDRESS → OCCUPANTS / OWNER
   • County Assessor: owner of parcel; mailing vs site address (landlord/tenant signal).
   • Property portals: listing photos = confirm interiors (OSINT only).
   • Brokers: show household members; cross-check with social “tagged at home”.

5) From COMPANY DOMAIN → EMPLOYEES
   • Hunter.io: email pattern (e.g., {first}.{last}@).
   • LinkedIn: search site:linkedin.com/in "CompanyName" + "City".
   • ZoomInfo/RocketReach: confirm titles/emails; test patterns with public contact forms.
   • Crt.sh/SecurityTrails: enumerate subdomains; infer internal systems from names.

------------------------------------------------------------------------------------------------------
OPT‑OUT / REMOVAL QUICK START
------------------------------------------------------------------------------------------------------
• Search “[sitename] opt out” or “privacy request” – most have forms; some require ID verification.
• Prioritize: Whitepages, Spokeo, Intelius, BeenVerified, Radaris, FastPeopleSearch, PeopleFinders, Nuwber.
• Set calendar reminders: reappearances are common—re-check quarterly.
• If an address is high-risk (stalking): ask brokers to suppress; consider a PO Box or CMRA address.

------------------------------------------------------------------------------------------------------
GOOD PRACTICE CHECKLIST
------------------------------------------------------------------------------------------------------
[ ] Always corroborate with 2–3 sources before accepting a data point.
[ ] Keep a simple graph (Maltego/Obsidian) linking Person ⇄ Phones ⇄ Emails ⇄ Addresses ⇄ Relatives.
[ ] Timestamp screenshots; note source + retrieval date (records change).
[ ] Separate “unverified lead” vs “confirmed” in your notes.
[ ] Provide takedown guidance with every report (ethical requirement).

------------------------------------------------------------------------------------------------------
TROUBLESHOOTING & TIPS
------------------------------------------------------------------------------------------------------
• Common name? Anchor on UNIQUE combos (middle name + city + employer).
• Moved recently? Check USPS forwarding clues (broker “previous address” fields).
• Missing age/DOB? Infer from property purchase year + school/alumni pages.
• Sparse social? Pivot through relatives’ posts and tagged photos.
• Discrepancies? Old data sticks—prefer sources with “last seen” recency.

======================================================================================================
0x05. SOCIAL MEDIA DOXXING & DIGITAL FOOTPRINTING
======================================================================================================
- Facebook Graph queries
- Instagram “location” + “tagged” filters
- TikTok username & sound search
- Reddit advanced search (Pushshift)
- LinkedIn company org charts

======================================================================================================
0x06. METADATA & DEVICE FINGERPRINTING
======================================================================================================
- ExifTool (images)
- FOCA (PDF/Office docs)
- metagoofil
- Email headers (IP/device info)

======================================================================================================
0x07. IMAGE & GEO-LOCATION OSINT
======================================================================================================
- PimEyes (face match)
- Yandex reverse image
- Google Lens
- GeoCreepy, MapChecking.com (geotag plots)
- SunCalc.org (verify shadows in photos)

======================================================================================================
0x08. FAMILY, FRIENDS & RELATIONAL MAPPING
======================================================================================================
- Relatives from data brokers
- Tagged photos of family/friends
- Use relatives’ social media to confirm home addresses & workplaces

======================================================================================================
0x09. IP HUNTING & TECH INFRASTRUCTURE (EXPANDED)
======================================================================================================

Adversaries use IP hunting and infrastructure mapping to track targets, deanonymize online identities, and
identify technical weaknesses in associated networks and devices. This is a critical phase because a single IP 
pivot can unlock locations, employer information, or even connected systems.

------------------------------------------------------------------------------------------------------
9.1 GOALS OF IP HUNTING
------------------------------------------------------------------------------------------------------
1) Deanonymize a target by linking them to a real world location or device.
2) Uncover hidden infrastructure (servers, domains, IoT devices).
3) Map the attack surface: open ports, technologies, services, and certificates.
4) Build time-based patterns (when they’re online, VPN usage, mobility).

------------------------------------------------------------------------------------------------------
9.2 ACTIVE COLLECTION – BAIT & LOGGING
------------------------------------------------------------------------------------------------------
**IPLogger / Grabify / Blasze**
   • Shorten links → capture IP, ASN, device fingerprint.
   • Embed in images or redirects (e.g., send “funny meme” or survey link).
   • OPSEC: rotate domains, remove identifiable branding.

**Custom Tracking Servers**
   • Spin up a VPS with a logging script:
     - Log headers, IP, user-agent, referrer.
     - Use canary tokens (web beacons, email read receipts) to catch client IPs.
   • Tools: CanaryTokens.org, Gophish, Modlishka.

**Email Tracking**
   • Pixel tracking (1x1 transparent image) to log IPs on open.
   • Be aware of modern mail clients auto-blocking images.

**Chat & P2P Platforms**
   • Direct connection chats (older Skype, IRC, some game servers) leak IPs.
   • Tools like Wireshark/tcpdump can capture peer IPs during direct sessions.

------------------------------------------------------------------------------------------------------
9.3 PASSIVE COLLECTION – HISTORICAL & PUBLIC DATA
------------------------------------------------------------------------------------------------------
**WHOIS History (WhoisXML, DomainTools, SecurityTrails)**
   • Find historical owners of domains (emails, addresses, phone numbers).
   • Check “reverse WHOIS”: same registrant email tied to multiple domains.

**Passive DNS**
   • SecurityTrails / FarsightDNS: see what IPs domains resolved to in the past.
   • Reverse lookup: find all domains that ever pointed to a specific IP.

**Certificate Transparency Logs (crt.sh, Censys)**
   • Discover subdomains from SSL certificates issued.
   • Pivot: Same cert used across multiple domains = common owner.

**GeoIP Databases**
   • IPinfo, MaxMind GeoLite2: approximate geolocation & ISP.
   • Cross-verify with other data; mobile IPs & VPNs will change frequently.

**Shodan / Censys**
   • Enumerate open ports, services, software versions, exposed banners.
   • Identify VPN endpoints, IoT cameras, RDP, databases left open.

------------------------------------------------------------------------------------------------------
9.4 DEVICE & USER FINGERPRINTING
------------------------------------------------------------------------------------------------------
**Headers & Metadata**
   • User-agent, time zone, language can hint at OS, region, or corporate VPN.

**WebRTC & Browser Leaks**
   • Force targets to load scripts that reveal local/private IPs (if browser allows).

**Email Headers**
   • Original sending IP in “Received” header (unless using webmail).
   • Compare against previous known logins.

------------------------------------------------------------------------------------------------------
9.5 INFRASTRUCTURE MAPPING
------------------------------------------------------------------------------------------------------
1) Start with a seed IP or domain:
   • Passive DNS → all associated domains.
   • Reverse WHOIS → other domains by same registrant.
   • Reverse IP → websites hosted on same server.

2) Build a full asset map:
   • Shodan/Censys → exposed services (SSH, RDP, MySQL, Elasticsearch).
   • Identify cloud providers (AWS, Azure, GCP) vs residential ISPs.

3) SSL Certificate Pivots:
   • Use crt.sh to list subdomains (e.g., dev.domain.com, vpn.domain.com).
   • Same cert hash reused on other domains? → same infrastructure.

------------------------------------------------------------------------------------------------------
9.6 GEOLOCATION & TIME CORRELATION
------------------------------------------------------------------------------------------------------
• IP addresses from mobile carriers may change, but correlate **time of use**.
• Combine with social media timestamps or travel habits to narrow locations.
• Compare IP ASN (e.g., “Comcast Residential”) to city-level data from data brokers.

------------------------------------------------------------------------------------------------------
9.7 TOOLING & FRAMEWORKS
------------------------------------------------------------------------------------------------------
• SecurityTrails – WHOIS history + passive DNS + infrastructure graphing.
• RiskIQ PassiveTotal – combine domains, IPs, SSL certs.
• Maltego – visualize relationships (domains, IPs, emails).
• SpiderFoot – automated OSINT (DNS, IPs, leaks, brokers).
• Nmap – active probing (in authorized engagements only).

------------------------------------------------------------------------------------------------------
9.8 OPSEC REMINDERS (WHEN PERFORMING LEGAL TESTING)
------------------------------------------------------------------------------------------------------
• Never probe infrastructure you don’t own or have permission to test.
• Use throwaway domains/URLs for tracking; never tie to personal infra.
• Isolate tooling on VMs/VPS and scrub logs (per legal retention policy).
• Avoid accidental “dox” of innocent users sharing IP addresses (NAT, VPNs).

------------------------------------------------------------------------------------------------------
9.9 ATTACK CHAIN EXAMPLES (SIMULATED)
------------------------------------------------------------------------------------------------------
**Example 1: IP From Link Click**
   • Target clicks on Grabify link → capture IP.
   • IP belongs to corporate VPN gateway → reverse DNS reveals vpn.corp.com.
   • crt.sh reveals dev.corp.com & git.corp.com on same cert → internal apps exposed.

**Example 2: Passive DNS + WHOIS**
   • Start with blogsite.com → SecurityTrails shows it resolved to 192.0.2.50 last year.
   • Reverse IP lookup → finds payrollportal.com → WHOIS has same registrant email.
   • That email is found in breach data → password reuse risk.

**Example 3: Shodan Pivot**
   • IP from email header shows port 3389 (RDP) open.
   • Shodan reveals it’s Windows Server 2012 with expired SSL cert.
   • Pivot to associated domains from passive DNS → identify 3 other servers in same ASN.

======================================================================================================
0x10. OSINT TOOLSETS & FRAMEWORKS
======================================================================================================
- SpiderFoot (OSINT automation)
- Maltego (graphs)
- Amass (subdomains)
- Holehe (email enumeration)
- Sherlock / Maigret (username sweeps)
- Epieos (Google account leaks)

======================================================================================================
0x11. GOOGLE DORKING – MASSIVE EXPOSURE
======================================================================================================
- site:target.com filetype:log
- inurl:/backup.zip
- ext:env DB_PASSWORD
- intitle:"index of" "private"

======================================================================================================
0x12. DARK WEB INTELLIGENCE
======================================================================================================
- Ahmia, OnionLand (Tor search)
- DarkOwl, Flashpoint (paid)
- Telegram groups for leaks
- Pastebin, Ghostbin, Anonfiles indexed dumps

======================================================================================================
0x13. OPSEC & ANONYMITY
======================================================================================================
- Multi-hop VPN + Tor + isolated VMs
- Burner devices & accounts
- Never use real identity when testing

======================================================================================================
END OF GUIDE 
======================================================================================================