Two advanced concepts: daisy chaining is using one compromised system to attack another—like a domino effect. Doxing is publishing private information about individuals, often with malicious intent.
⛓️
Daisy Chaining is a sequential process of several hacking or attacking attempts to gain access to network or systems, one after another, using the same information and the information obtained from the previous attempt.
Example: Hack System A → Use it to attack System B → Use both to attack System C
📄
The term Doxing refers to publishing information or a set of information associated with an individual. This information is collected publicly, mostly from social media or other sources.
Example: Publishing someone's real name, address, phone number, and employer from social media profiles.
A
→
B
→
C
→
D
⚠️ Doxing Warning: What you post online can be used against you. Practice good OPSEC (Operations Security).