SlideShare a Scribd company logo
1 of 9
Sock Puppet
Prepared By: Prof. Sweta Dargad
What is sock puppets?
● Sock puppets are nothing but detailed created fake social media
accounts to research in OSINT without giving up the true identity.
● Sock Puppets are basically aliases, fictitious persona profiles created by someone
else with specific goals in mind and is part of an OSINT Social Engineering
technique.
● These type of accounts can be used by anyone like investigators, detectives, hackers,
police, journalists, it can be anyone who wants to impersonate someone else.
● Now you will thinks like – yeah that’s an easy job like you just have to create a fake
account.
● Well, it’s not as easy as it sounds, for creating a successful sock puppet it needs to
be credible and consistent with how the real person behaves online. Sock puppets
have a real name, real phone numbers, address, photographs, credit card number,
various social media accounts, friends, etc.
Purpose of sock puppets?
1.Investigators can use the sock accounts to
collect information and do research o some
cases.
1.Hackers can use sock accounts to do
social engineering on the target to collect
the information.
1.Detective can use these type of accounts to
collect information and to know the nature of
someone related to their cases.
What does it takes to make a perfect sock puppet?
Choosing the right platform to create the account is also important. If
you are creating sock puppets for Indian user’s you have to do
research on what social media is mostly used in India.
Instagram, Facebook, WhatsApp, Signal are one of the most
used social media in India, so make sure you have an account
on these.
To make your account more legit and real try to use it for long
terms.
For example, Create account (which we will discuss how to create in
few seconds) and use it for like 3 to 4 months with daily posting
something, following someone making online friends.
What does it takes to make a perfect sock puppet?
A perfect sock puppet will never be connected by any means to its original
owner.
To anonymize the account so that it doesn’t log your original IP address or
location, You have to use VPN or TOR while creating the account.
Another Best way to do it is to connect to any public Wi-Fi to create an
account. Make sure you always log in to that account with the same
network. Never ever use your own IP address to create sock accounts.
According to Trace Labs creating a Sock on Facebook is the most difficult thing
because Facebook uses to flag your account if you use TOR or VPN services.
How to Create Sock Account?
Name:
https://www.elfqrin.com/fakeid.php
Email Address: use any mail provider to
create email address make sure not to
use your IP address while doing this.
Face :
https://thispersondoesnotexist.com/
What are Burner Phones and Sim Cards?
● Burner means to use and through or a phone that is not connected to you in any
way. A hone or a sim card that you will only use for the sock account and nothing
else.
● Burner Phone and sim cards are only important when you are into Deep OSINT for
Basics a Sock Account is enough for Active or Passive investigation.
● But When a website needs to verify your phone number then it’s good to have
burner sim cards.
● Although you always have options to buy a VoIP number or the cheapest sim card
for mobile verification.
● This is it. Now you can create your own Sock Account.
Tips
● Always have a two socks account, so that if one burned you have another.
● Make long terms account. Don’t start researching anyone without making
your account enough legit.
● Don’t use real person’s face, because the first things anyone do is to google
your photo.
● Try to post daily things creating good b on social media.

More Related Content

What's hot (20)

Pentesting Android Applications
Pentesting Android ApplicationsPentesting Android Applications
Pentesting Android Applications
 
CSRF, ClickJacking & Open Redirect
CSRF, ClickJacking & Open RedirectCSRF, ClickJacking & Open Redirect
CSRF, ClickJacking & Open Redirect
 
Osint primer
Osint primerOsint primer
Osint primer
 
Cyber crime in india
Cyber crime in indiaCyber crime in india
Cyber crime in india
 
Open Source Intelligence (OSINT)
Open Source Intelligence (OSINT)Open Source Intelligence (OSINT)
Open Source Intelligence (OSINT)
 
What is Open Source Intelligence (OSINT)
What is Open Source Intelligence (OSINT)What is Open Source Intelligence (OSINT)
What is Open Source Intelligence (OSINT)
 
Secure coding practices
Secure coding practicesSecure coding practices
Secure coding practices
 
OPSEC for hackers
OPSEC for hackersOPSEC for hackers
OPSEC for hackers
 
Password Manager: Detailed presentation
Password Manager: Detailed presentationPassword Manager: Detailed presentation
Password Manager: Detailed presentation
 
OSINT: Open Source Intelligence gathering
OSINT: Open Source Intelligence gatheringOSINT: Open Source Intelligence gathering
OSINT: Open Source Intelligence gathering
 
Bug bounty
Bug bountyBug bounty
Bug bounty
 
Google Dorks and SQL Injection
Google Dorks and SQL InjectionGoogle Dorks and SQL Injection
Google Dorks and SQL Injection
 
Darknet
DarknetDarknet
Darknet
 
Cyber Forensics Module 1
Cyber Forensics Module 1Cyber Forensics Module 1
Cyber Forensics Module 1
 
Reconnaissance - For pentesting and user awareness
Reconnaissance - For pentesting and user awarenessReconnaissance - For pentesting and user awareness
Reconnaissance - For pentesting and user awareness
 
OSINT - Open Source Intelligence
OSINT - Open Source IntelligenceOSINT - Open Source Intelligence
OSINT - Open Source Intelligence
 
Illuminating the dark web
Illuminating the dark webIlluminating the dark web
Illuminating the dark web
 
Reconnaissance
ReconnaissanceReconnaissance
Reconnaissance
 
Dark net
Dark netDark net
Dark net
 
Osint presentation nov 2019
Osint presentation nov 2019Osint presentation nov 2019
Osint presentation nov 2019
 

Similar to Sock Puppet Accounts for OSINT Research

Web + Social Media + Cyber Security for Lawyers
Web + Social Media + Cyber Security for LawyersWeb + Social Media + Cyber Security for Lawyers
Web + Social Media + Cyber Security for LawyersJoshua Weaver
 
10.a guide-to-facebook-security
10.a guide-to-facebook-security10.a guide-to-facebook-security
10.a guide-to-facebook-securityrobert mota
 
How to get your first 10,000 INSTAGRAM FOLLOWERS by foundr Magazine's
How to get your first 10,000 INSTAGRAM FOLLOWERS by foundr Magazine'sHow to get your first 10,000 INSTAGRAM FOLLOWERS by foundr Magazine's
How to get your first 10,000 INSTAGRAM FOLLOWERS by foundr Magazine'sPeerasak C.
 
Pam Perrys Twitter fast-start Bonus
Pam Perrys Twitter fast-start BonusPam Perrys Twitter fast-start Bonus
Pam Perrys Twitter fast-start BonusPam Perry
 
Guide to facebook security
Guide to facebook securityGuide to facebook security
Guide to facebook securityErnest Staats
 
Cyber security awareness booklet for citizens from mahashtra cyber 10 jan2020
Cyber security awareness booklet for citizens from mahashtra cyber  10 jan2020Cyber security awareness booklet for citizens from mahashtra cyber  10 jan2020
Cyber security awareness booklet for citizens from mahashtra cyber 10 jan2020Rahul Boga
 
Twitter fast start rebranded
Twitter fast start rebrandedTwitter fast start rebranded
Twitter fast start rebrandedKarl May
 
Cyber security-awareness-for-social-media-users - Devsena Mishra
Cyber security-awareness-for-social-media-users - Devsena MishraCyber security-awareness-for-social-media-users - Devsena Mishra
Cyber security-awareness-for-social-media-users - Devsena MishraDevsena Mishra
 
CAN I VIEW PRIVATE INSTAGRAM PROFILES 2021?
CAN I VIEW PRIVATE INSTAGRAM PROFILES 2021?CAN I VIEW PRIVATE INSTAGRAM PROFILES 2021?
CAN I VIEW PRIVATE INSTAGRAM PROFILES 2021?abhishek chackra
 
Twitter fast start rebranded
Twitter fast start rebrandedTwitter fast start rebranded
Twitter fast start rebrandedcynthiab49
 
Presentation (1) OF THE BUZZ CHAT APP (DETAILS).pptx
Presentation (1) OF THE BUZZ CHAT APP (DETAILS).pptxPresentation (1) OF THE BUZZ CHAT APP (DETAILS).pptx
Presentation (1) OF THE BUZZ CHAT APP (DETAILS).pptxEmmanuelAmarfioMensa1
 
A HillyBilly's Guide to Staying Anonymous Online - SecureWV
A HillyBilly's Guide to Staying Anonymous Online - SecureWVA HillyBilly's Guide to Staying Anonymous Online - SecureWV
A HillyBilly's Guide to Staying Anonymous Online - SecureWVAdam Compton
 
Bree keynote pp
Bree keynote ppBree keynote pp
Bree keynote ppMarq2014
 
HOW CAN I VIEW PRIVATE INSTAGRAM PROFILES IN 2021?
HOW CAN I VIEW PRIVATE INSTAGRAM PROFILES IN 2021?HOW CAN I VIEW PRIVATE INSTAGRAM PROFILES IN 2021?
HOW CAN I VIEW PRIVATE INSTAGRAM PROFILES IN 2021?abhishek chackra
 
Email Signatures For Business
Email Signatures For BusinessEmail Signatures For Business
Email Signatures For BusinessBruce Jones
 

Similar to Sock Puppet Accounts for OSINT Research (20)

Web 2.0
Web 2.0Web 2.0
Web 2.0
 
Web + Social Media + Cyber Security for Lawyers
Web + Social Media + Cyber Security for LawyersWeb + Social Media + Cyber Security for Lawyers
Web + Social Media + Cyber Security for Lawyers
 
10.a guide-to-facebook-security
10.a guide-to-facebook-security10.a guide-to-facebook-security
10.a guide-to-facebook-security
 
How to get your first 10,000 INSTAGRAM FOLLOWERS by foundr Magazine's
How to get your first 10,000 INSTAGRAM FOLLOWERS by foundr Magazine'sHow to get your first 10,000 INSTAGRAM FOLLOWERS by foundr Magazine's
How to get your first 10,000 INSTAGRAM FOLLOWERS by foundr Magazine's
 
Pam Perrys Twitter fast-start Bonus
Pam Perrys Twitter fast-start BonusPam Perrys Twitter fast-start Bonus
Pam Perrys Twitter fast-start Bonus
 
Guide to facebook security
Guide to facebook securityGuide to facebook security
Guide to facebook security
 
Digital Literacy Fundamentals.pptx
Digital Literacy Fundamentals.pptxDigital Literacy Fundamentals.pptx
Digital Literacy Fundamentals.pptx
 
Cyber security awareness booklet for citizens from mahashtra cyber 10 jan2020
Cyber security awareness booklet for citizens from mahashtra cyber  10 jan2020Cyber security awareness booklet for citizens from mahashtra cyber  10 jan2020
Cyber security awareness booklet for citizens from mahashtra cyber 10 jan2020
 
Twitter fast start rebranded
Twitter fast start rebrandedTwitter fast start rebranded
Twitter fast start rebranded
 
Unit 35 - L01
Unit 35 - L01Unit 35 - L01
Unit 35 - L01
 
Cyber security-awareness-for-social-media-users - Devsena Mishra
Cyber security-awareness-for-social-media-users - Devsena MishraCyber security-awareness-for-social-media-users - Devsena Mishra
Cyber security-awareness-for-social-media-users - Devsena Mishra
 
CAN I VIEW PRIVATE INSTAGRAM PROFILES 2021?
CAN I VIEW PRIVATE INSTAGRAM PROFILES 2021?CAN I VIEW PRIVATE INSTAGRAM PROFILES 2021?
CAN I VIEW PRIVATE INSTAGRAM PROFILES 2021?
 
Twitter fast start rebranded
Twitter fast start rebrandedTwitter fast start rebranded
Twitter fast start rebranded
 
Presentation (1) OF THE BUZZ CHAT APP (DETAILS).pptx
Presentation (1) OF THE BUZZ CHAT APP (DETAILS).pptxPresentation (1) OF THE BUZZ CHAT APP (DETAILS).pptx
Presentation (1) OF THE BUZZ CHAT APP (DETAILS).pptx
 
A HillyBilly's Guide to Staying Anonymous Online - SecureWV
A HillyBilly's Guide to Staying Anonymous Online - SecureWVA HillyBilly's Guide to Staying Anonymous Online - SecureWV
A HillyBilly's Guide to Staying Anonymous Online - SecureWV
 
Bree keynote pp
Bree keynote ppBree keynote pp
Bree keynote pp
 
Twitter Fast Start
Twitter Fast StartTwitter Fast Start
Twitter Fast Start
 
HOW CAN I VIEW PRIVATE INSTAGRAM PROFILES IN 2021?
HOW CAN I VIEW PRIVATE INSTAGRAM PROFILES IN 2021?HOW CAN I VIEW PRIVATE INSTAGRAM PROFILES IN 2021?
HOW CAN I VIEW PRIVATE INSTAGRAM PROFILES IN 2021?
 
Email Signatures For Business
Email Signatures For BusinessEmail Signatures For Business
Email Signatures For Business
 
Unit 35 - LO1
Unit 35 - LO1Unit 35 - LO1
Unit 35 - LO1
 

More from sweta dargad

RRD Tool and Network Monitoring
RRD Tool and Network MonitoringRRD Tool and Network Monitoring
RRD Tool and Network Monitoringsweta dargad
 
Architecture for SNMP based Network Monitoring System
Architecture for SNMP based Network Monitoring SystemArchitecture for SNMP based Network Monitoring System
Architecture for SNMP based Network Monitoring Systemsweta dargad
 
Snmp based network monitoring system
Snmp based network monitoring systemSnmp based network monitoring system
Snmp based network monitoring systemsweta dargad
 
Applications of RFID technology
Applications of RFID technologyApplications of RFID technology
Applications of RFID technologysweta dargad
 
Cyber security tutorial2
Cyber security tutorial2Cyber security tutorial2
Cyber security tutorial2sweta dargad
 
Cyber security tutorial1
Cyber security tutorial1Cyber security tutorial1
Cyber security tutorial1sweta dargad
 
Classifying Cybercrimes
Classifying CybercrimesClassifying Cybercrimes
Classifying Cybercrimessweta dargad
 
Open source nms’s
Open source nms’sOpen source nms’s
Open source nms’ssweta dargad
 

More from sweta dargad (11)

Stacks
StacksStacks
Stacks
 
RRD Tool and Network Monitoring
RRD Tool and Network MonitoringRRD Tool and Network Monitoring
RRD Tool and Network Monitoring
 
Architecture for SNMP based Network Monitoring System
Architecture for SNMP based Network Monitoring SystemArchitecture for SNMP based Network Monitoring System
Architecture for SNMP based Network Monitoring System
 
Snmp based network monitoring system
Snmp based network monitoring systemSnmp based network monitoring system
Snmp based network monitoring system
 
Applications of RFID technology
Applications of RFID technologyApplications of RFID technology
Applications of RFID technology
 
Cyber security tutorial2
Cyber security tutorial2Cyber security tutorial2
Cyber security tutorial2
 
Cyber security tutorial1
Cyber security tutorial1Cyber security tutorial1
Cyber security tutorial1
 
Classifying Cybercrimes
Classifying CybercrimesClassifying Cybercrimes
Classifying Cybercrimes
 
All about snmp
All about snmpAll about snmp
All about snmp
 
Open source nms’s
Open source nms’sOpen source nms’s
Open source nms’s
 
Cacti
CactiCacti
Cacti
 

Recently uploaded

Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991RKavithamani
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 

Recently uploaded (20)

Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 

Sock Puppet Accounts for OSINT Research

  • 1. Sock Puppet Prepared By: Prof. Sweta Dargad
  • 2.
  • 3. What is sock puppets? ● Sock puppets are nothing but detailed created fake social media accounts to research in OSINT without giving up the true identity. ● Sock Puppets are basically aliases, fictitious persona profiles created by someone else with specific goals in mind and is part of an OSINT Social Engineering technique. ● These type of accounts can be used by anyone like investigators, detectives, hackers, police, journalists, it can be anyone who wants to impersonate someone else. ● Now you will thinks like – yeah that’s an easy job like you just have to create a fake account. ● Well, it’s not as easy as it sounds, for creating a successful sock puppet it needs to be credible and consistent with how the real person behaves online. Sock puppets have a real name, real phone numbers, address, photographs, credit card number, various social media accounts, friends, etc.
  • 4. Purpose of sock puppets? 1.Investigators can use the sock accounts to collect information and do research o some cases. 1.Hackers can use sock accounts to do social engineering on the target to collect the information. 1.Detective can use these type of accounts to collect information and to know the nature of someone related to their cases.
  • 5. What does it takes to make a perfect sock puppet? Choosing the right platform to create the account is also important. If you are creating sock puppets for Indian user’s you have to do research on what social media is mostly used in India. Instagram, Facebook, WhatsApp, Signal are one of the most used social media in India, so make sure you have an account on these. To make your account more legit and real try to use it for long terms. For example, Create account (which we will discuss how to create in few seconds) and use it for like 3 to 4 months with daily posting something, following someone making online friends.
  • 6. What does it takes to make a perfect sock puppet? A perfect sock puppet will never be connected by any means to its original owner. To anonymize the account so that it doesn’t log your original IP address or location, You have to use VPN or TOR while creating the account. Another Best way to do it is to connect to any public Wi-Fi to create an account. Make sure you always log in to that account with the same network. Never ever use your own IP address to create sock accounts. According to Trace Labs creating a Sock on Facebook is the most difficult thing because Facebook uses to flag your account if you use TOR or VPN services.
  • 7. How to Create Sock Account? Name: https://www.elfqrin.com/fakeid.php Email Address: use any mail provider to create email address make sure not to use your IP address while doing this. Face : https://thispersondoesnotexist.com/
  • 8. What are Burner Phones and Sim Cards? ● Burner means to use and through or a phone that is not connected to you in any way. A hone or a sim card that you will only use for the sock account and nothing else. ● Burner Phone and sim cards are only important when you are into Deep OSINT for Basics a Sock Account is enough for Active or Passive investigation. ● But When a website needs to verify your phone number then it’s good to have burner sim cards. ● Although you always have options to buy a VoIP number or the cheapest sim card for mobile verification. ● This is it. Now you can create your own Sock Account.
  • 9. Tips ● Always have a two socks account, so that if one burned you have another. ● Make long terms account. Don’t start researching anyone without making your account enough legit. ● Don’t use real person’s face, because the first things anyone do is to google your photo. ● Try to post daily things creating good b on social media.

Editor's Notes

  1. https://hackernoon.com/how-to-make-sock-puppet-accounts-for-osint-in-2021-12r33gs
  2. According to TraceLabs creating a Sock on Facebook is the most difficult thing because Facebook uses to flag your account if you use TOR or VPN services. Choosing a Right Platform Choosing the right platform to create the account is also important. If you are creating sock puppets for Indian user’s you have to do research on what social media is mostly used in India. And make sure to create an account on those. Instagram, Facebook, WhatsApp, Signal are one of the most used social media in India, so make sure you have an account on these.
  3. According to TraceLabs creating a Sock on Facebook is the most difficult thing because Facebook uses to flag your account if you use TOR or VPN services. Choosing a Right Platform Choosing the right platform to create the account is also important. If you are creating sock puppets for Indian user’s you have to do research on what social media is mostly used in India. And make sure to create an account on those. Instagram, Facebook, WhatsApp, Signal are one of the most used social media in India, so make sure you have an account on these.
  4. 1. Name For account we need a name. https://www.fakenamegenerator.com/ From fake name generator you can create a person that never have existed with Name, address, mother’s Maiden name, Address, Email address, weight, height, credit card, date of birth, favorite color, vehicle number and all sorts of information you need to be that person. One More Important Thing Of course you can be any person but try to be a female person, because female accounts gets attraction soon. https://www.elfqrin.com/fakeid.php You can also use the elfqrin(above link) to create a fake user with lots of details. Now we have name and every information of fake person. Email Address Now you have name and all sorts of details, you need a email address matching to that name. You can use any mail provider to create email address make sure not to use your IP address while doing this. Email providers Gmail.com Yahoo mail Proton Mail Mail.com I recommend using mail.com to create email address and make sure you don’t use existing email address. Now we have email address. Face Now we need a face for image verification https://thispersondoesnotexist.com/ You can get a face from the above link just refresh the website until you are satisfied with your face. This website create fake faces with AI so the faces created by the website do not exists in real world. so you can be one. Now we have all the important ingredients to create account
  5. Do Socks account have to be some person? That’s a very good question if you get it in your mind. Answer to this is “NO”. Socks account don’t have to be a person. You can make a fan page or meme page grow it and use it for researching. For Example– You can make an account named robert_downey_fans or something like this and you can grow this account like any fan page and later can use this for research purposes. Look, if you have person’s account you have to maintain all sorts of information about that person. And if you have these type of fan page accounts you have to give a lot of time to grow this account and have as many followers as you can so that someone can trust your account. Choose yourself Which account do you want.
  6. Do Socks account have to be some person? That’s a very good question if you get it in your mind. Answer to this is “NO”. Socks account don’t have to be a person. You can make a fan page or meme page grow it and use it for researching. For Example– You can make an account named robert_downey_fans or something like this and you can grow this account like any fan page and later can use this for research purposes. Look, if you have person’s account you have to maintain all sorts of information about that person. And if you have these type of fan page accounts you have to give a lot of time to grow this account and have as many followers as you can so that someone can trust your account. Choose yourself Which account do you want.