Complete Sock Puppet Account Guide.

Sagar Shewale
9 min readMay 28, 2023

--

Hello dear hackers, welcome back to my new blog, I hope so you all are good !!
Today in this blog, we are going to discuss about, how to create your own sock puppet account and manage it in detail.
We are going to see about all tool, techniques, OS and everything that we are using it while making sock puppet account.

Read this blog until the end !!!

Before start writing the blog, I have such a small request to all of you, I always right articles on cyber security, ethical hacking, penetration testing. So if you didn’t follow, then follow me first and clap on this article, because that’s give me a motivation to write something new !!

If you didn’t follow me on my socials, here it is.

My-Twitter
My-Linkedin
My-GitHub

Thank you !!!
Let’s Start !!!

Sock Puppet Account

In this topic, I’m going to discuss about Sock Puppet Account in detail.

Sock puppet account is completely fake account, which looks like genuine.
A sock puppet is defined as a person whose actions are controlled by another. It is a reference to the manipulation of a simple hand puppet made from a sock, and is often used to refer to alternative online identities or user accounts used for purposes of deception.

✯ Purpose of Sock puppets. ✯

Sock puppets can be used in various different ways
☛ Investigators can use the sock accounts to collect information and do research o some cases.
☛ Hackers can use sock accounts to do social engineering on the target to collect the information.
☛Detective can use these type of accounts to collect information and to know the nature of someone related to their cases.
☛ Basically, sock accounts are used to collect information or to look into someone without letting them know. Anyone can use it in anyway they like.

☟ Sock puppet account including following factors you need to know. Let’s know about everything !!! ☟

1) Sock Puppet Account And General Details :

Your account and it’s general details should be looks like a real genuine, authentic and absolutely real.
For this, you should make your account updated, post something regularly, like, share, comment, following, followers all thingsshould be seem like normal and real person account.
For creating most genuine sock puppet account I’m going to five you some tools and website which will help you !!

☟ Here are some resourses to make sock puppet account. ☟
Fake-Name-Generator
Fake-Person-Generator
Fake-Person-Generator-2
Random-Name-Generator
Name-Fake
Fake-Info (Multipurpose Tool)
Random-User
Fake-ID-Generator

☟ These are profile picture generator sites. ☟
This-Person-Does-Not-Exist
This-X-Does-Not Exist (Treasure For OSINT Lovers)

⮘⮚⮘⮚⮘⮚⮘⮚⮘⮚⮘⮚⮘⮚⮘⮚⮘⮚⮘⮚⮘⮚⮘⮚⮘⮚⮘⮚⮘⮚⮘⮚⮘⮚⮘⮚⮘⮚

2) Encrypted Email :

Email Services

You should have 2 or more than 2 most secure and encrypted email address to access any online services.
There are mainly 2 types of email address, Permanent & Temporary.
☆ Permanent Email
Protonmail (Best ever email services)
Fastmail (Best paid email services)
Tutanota Mail (You can try this after protonmail)

☆ Temporary Email
Go on google, and type “Temp mail”, you will get lots of temporary email services.

⮘⮚⮘⮚⮘⮚⮘⮚⮘⮚⮘⮚⮘⮚⮘⮚⮘⮚⮘⮚⮘⮚⮘⮚⮘⮚⮘⮚⮘⮚⮘⮚⮘⮚⮘⮚⮘⮚

3) Free Internet Calling Services :

A free call refers to calls made over an internet network, that are carried out free of charge.
Free call services utilize a technology called Voice over Internet Protocol (VoIP). VoIP allows you to call over the internet, i.e. cellular as well broadband connection.

☟ Here are some free calling and texting services. ☟
TextNow (Best ever all the time)
Talktone
Call2friends
Numeroesim
GlobFone
TextFree
Darksms

⮘⮚⮘⮚⮘⮚⮘⮚⮘⮚⮘⮚⮘⮚⮘⮚⮘⮚⮘⮚⮘⮚⮘⮚⮘⮚⮘⮚⮘⮚⮘⮚⮘⮚⮘⮚⮘⮚

4) Best Ever VPN :

VPN

Virtual Private Network commonly called as VPN, is one of the most inportant part of sock puppet account and OSINT.
To hide your identity you have to always use best ever vpn.

☟ Here are some VPN services to use ☟
Windscribe (Free & Paid and best ever, which personally I use !!)
Express VPN
Nord VPN
Proton VPN

⮘⮚⮘⮚⮘⮚⮘⮚⮘⮚⮘⮚⮘⮚⮘⮚⮘⮚⮘⮚⮘⮚⮘⮚⮘⮚⮘⮚⮘⮚⮘⮚⮘⮚⮘⮚⮘⮚

5) Virtual Credit Card Services (VCC) :

Virtual Credit Card Services

As the card is available only online, thus minimising the chances of misuse or theft.
In some cases, a card holder can cancel the card if they do not require it. Similar to physical credit cards, VCCs also come with a set credit limit. Users can transact multiple times within this limit.

☛ The privacy.com is the best VCC services ever

⮘⮚⮘⮚⮘⮚⮘⮚⮘⮚⮘⮚⮘⮚⮘⮚⮘⮚⮘⮚⮘⮚⮘⮚⮘⮚⮘⮚⮘⮚⮘⮚⮘⮚⮘⮚⮘⮚

6) Your Own Blog OR Website :

Blogging

You have to your own website OR blog to write something, If you are pretend to be a doctor, engineer, writer or any professional person, then you must have your own blog website.

☟ Here are some platform to write your own article. ☟
WordPress
Medium
Wix
Weebly
Tumblr
WebFlow
Strikingly
Jimdo
Site123
GitHub

⮘⮚⮘⮚⮘⮚⮘⮚⮘⮚⮘⮚⮘⮚⮘⮚⮘⮚⮘⮚⮘⮚⮘⮚⮘⮚⮘⮚⮘⮚⮘⮚⮘⮚⮘⮚⮘⮚

7) Virtual Machine :

Virtual Machine (VM)

A Virtual Machine (VM) is a compute resource that uses software instead of a physical computer to run programs and deploy apps. One or more virtual “guest” machines run on a physical “host” machine.

☟ Here are some populer VM software to use. ☟
VMware Workstation Pro
VMware Workstation Player
Virtualbox

☟ Here are some populer OS to use. ☟
Ubantu Linux
Kali Linux
CSI Linux

You can use anyone of these OS according to your comfort.

⮘⮚⮘⮚⮘⮚⮘⮚⮘⮚⮘⮚⮘⮚⮘⮚⮘⮚⮘⮚⮘⮚⮘⮚⮘⮚⮘⮚⮘⮚⮘⮚⮘⮚⮘⮚⮘⮚

8) Password Manager :

A password manager stores all your passwords in a single account.
The master password to your safe is the only password you’ll ever need to remember.
To take security up to the next level, I link my password manager with my biometrics.
So I only need to use my fingerprint to access my passwords.

☟ Here is the best offline password manager. ☟

KeePassXC (All time great !!!)

⮘⮚⮘⮚⮘⮚⮘⮚⮘⮚⮘⮚⮘⮚⮘⮚⮘⮚⮘⮚⮘⮚⮘⮚⮘⮚⮘⮚⮘⮚⮘⮚⮘⮚⮘⮚⮘⮚

9) Burner Phone :

A burner phone, or burner, is an inexpensive mobile phone designed for temporary, sometimes anonymous, use, after which it may be discarded.

while buying burner phone keep remind. “There are any type of your identity shouldn’t link with that phone.”

You have to buy burner phone using cash OR if you are gonna order it online then use virtual credit card services, as I mention above.

Burner phones usually come with a prepaid SIM card with credit already loaded into it for you to call or text right away. When the credit is used up, you can either dispose of the phone or load more credit into it.

There are many places where you can get a burner phone, like mobile phone vendors, department stores like Walmart or Target, or MVNO (Mobile Virtual Network Operator) like AT&T and T-Mobile. You can also get one online from sites like eBay or Amazon.

☟ Here are some features of burner phone. ☟
☛ To protect your identity when communicating by phone.
☛ This is totally untraceable phone. Some security researchers claim that, NSA can’t track your phone location.
☛ When online shopping, to avoid spam calls and messages.
☛ To protect your primary phone from accidents.
☛ To hide your communications.
☛ To get a phone cheaply. You can buy these phones just in 10$ to 15$.

☟ Here are some burner phone online sources. ☟
Tracfone is one of the best company who sells burner phones.
Mintmobile
Amazon-link 1
Amazon-link 2

☟ Use following keywords to find and get burner phone. ☟
☛ Prepaid flip phone at&t
☛ Prepaid flip phone tmobile
☛ Prepaid flip phone tmobile locked
☛ Prepaid flip phone At&t locked

☟ Here Some bonus tips to use burner phone ☟

☛ The difference is that a locked phone has a software code on it that, “prevents you from using it on another network.” An unlocked phone either doesn’t have the software lock on it or someone was able to get a code that unlocks the software.

☛ Always use locked and old type of keypad burner phone, rather than using smart phone, flip phone are the best !!!

☛ If you are not able to get burner phone then you can use burner app into your exesting smart phone. But somewahre it will less secure and you could be trace.

⮘⮚⮘⮚⮘⮚⮘⮚⮘⮚⮘⮚⮘⮚⮘⮚⮘⮚⮘⮚⮘⮚⮘⮚⮘⮚⮘⮚⮘⮚⮘⮚⮘⮚⮘⮚⮘⮚

10) Bonus Tips And Tricks For Sock Puppet account Holder :

☛ Don’t fill up your real information while generating sock puppet account. & Don’t use real person’s face, because the first things anyone do is to google your photo.

☛ Make long terms account. Don’t start researching anyone without making your account enough legit.

☛ You should have at least 2 to 3 sock puppet accounts. Because of any reason one account is damaged Or burned, then use other account.

☛ Use best ever VPN while using sock popat accounts. I already suggest you some VPN services above.

CSI Linux is a OS has built in specific tools, to generates sock puppet account.

☛ If you wants to know about some other OS which is use in cyber security then I written the aricle before on it. Check it out !!!

☛ Try to post daily things creating good behivour on social media.

☛ Keep updated your all tools and software always, which I suggest you

☛ I recommend you to use BRAVE browser with duckduckgo search engine.

☛ OS and lab on to run your sock puppet account with dedicated computer, it will take your one step ahead for anonymity purpose.

☛ Your sock puppet account could be hack by someone. So you should keep secure your account and I recently made a blog that how you can secure your social media account from hackers. If you are sock puppet account holders, then this blog will also help you, to some extent. Dont forget to check it out !!

☛ Don’t forget to use burner phone, if you wants to go and work with next level !!!

That it for today guys

I hope you guys enjoy the blog.
If you like it, then don’t forget to follow, subscribe and claps.
I’ll see you with next article.

--

--

Sagar Shewale
Sagar Shewale

Written by Sagar Shewale

Penetration Testing | Linux | CTF | Hacking | OSINT | Bug Bounty Hunting

No responses yet