SOC Puppet Creation Guide

VEEXH
The Sleuth Sheet
Published in
7 min readJun 25, 2023
ART By VEEXH

Verus Nullus, Omnis Licitus

Welcome to my guide, but before I begin, I must state, “Please use this guide responsibly and respectfully.

A SOC puppet account is a kind of fake online persona that someone creates to deceive others or obtain information. The person behind the SOC puppet account may have different motives for doing so, such as promoting or defending a certain cause, influencing people’s opinions, or bypassing rules or bans on a website. The name SOC puppet account comes from the analogy of a person using a sock to make a simple hand puppet and pretending that it is a different character. A SOC puppet account is similar to a sock puppet in that it is controlled by someone who is hiding their true identity.

STEPS

The first step is crafting a background or narrative when creating a SOC puppet. This means inventing details about the SOC puppet’s life, such as their name, age, location, occupation, hobbies, interests, opinions, and personality. The background or narrative should be consistent and realistic, but not too specific or traceable. The goal is to make the SOC puppet seem like a real and credible person who has a reason to participate in the online community or platform where they will be used.

  • Use these two websites in conjunction to create personal details that can fill out your SOC profile

“https://fakenamegenerator[.]com”

“https://www.fakepersongenerator[.]com”

Alternatively, use Artificial Intelligence to construct a profile and background based on prompts.

ChatGPT

Profile Photo

In terms of a Twitter profile photo, for some reason, utilizing ones generated by “thispersondoesnotexist.com” gets flagged, and your SOC has a very high possibility of being suspended. So to overcome this use generative AI.

MidJourney

RAW mode on Midjourney is a feature that allows the user to generate images based on their input prompt without applying any additional filters or effects. This mode forces the image creator to be less “opinionated” when generating images, meaning that it does not impose any predefined style or aesthetic preferences on the output. Instead, it tries to produce images that are as close as possible to the natural appearance of the input prompt. This mode creates a more realistic profile photo on Midjourney than other style versions because it preserves the original details and characteristics of the input prompt, such as the facial features, skin tone, hair color, and expression. Other style versions may alter or distort these aspects, resulting in images that look unnatural or unrealistic.

MidJourney Settings Menu — Use RAW Mode
ultra-realistic latina woman, white lab coat, sleek hair appears young mid 40's, serious broad face, professional style photoshoot, cinematic photography, ultra high definition, 8k, unreal engine 5 --ar 4:5 --q 2 --s 750 --v 5.1 --style raw 
Results

Another tip is to use stable diffusion to develop and train your own models over time, resulting in nearly faultless results.

SMS

It’s so difficult and frustrating to bypass SMS when making SOC puppets because many online platforms require a valid phone number to verify and activate an account. This means that the SOC puppet creator needs to have access to a different phone number for each SOC puppet account they create, which can be costly and time-consuming. Moreover, some platforms may detect and block the use of disposable or virtual phone numbers, which are often used by SOC puppet creators to bypass SMS verification. Furthermore, some platforms may periodically ask for SMS verification again, which can expose and deactivate the SOC puppet accounts if the phone numbers are no longer available or valid. So here are some potential ways around that.

  • Textverified is an awesome way to bypass SMS feature on social media

https://www.textverified[.]com

https://www.receive-smss-online[.]com

  • Another yet costly method is to use a real burner phone but this varies by country. A burner phone is a cheap and disposable mobile phone that can be used to receive SMS verification codes. However, this method may not work in some countries where buying a mobile phone requires providing personal information or identification documents. Also, this method may raise suspicion if the same burner phone is used for multiple SOC puppet accounts on the same platform or network. Therefore, this method is not very reliable or scalable for creating many SOC puppet accounts.

EMAIL

In regards to email for SOC puppet, I have to say Proton, and GMX are the best. Proton is a secure and encrypted email service that does not require any actual personal information to create an account. GMX is a free and anonymous email service that allows unlimited email aliases and disposable email addresses. Both of these email services are ideal for creating and managing multiple SOC puppet accounts without revealing or compromising your identity.

https://protonmail[.]com

https://www.gmx[.]com

VPN

VPN is a hit or miss. Facebook seems to be getting better at allowing VPN at the time of account creation, but it may still detect and block some VPN servers or IP addresses. Therefore, using a VPN for creating SOC puppet accounts on Facebook and other websites is not always reliable or safe. It may be better to use a proxy or to change the VPN server frequently.

Best VPN’s

https://mullvad[.]net/en

NEVER FORGET

Mullvad VPN Was Hit With Search Warrant in Attempted Police Raid

However, Swedish law enforcement left with nothing after learning Mullvad VPN has a strict no-logging policy when it comes to customer information.

https://protonvpn[.]com

TOR

TOR is a network of servers that anonymizes and encrypts the user’s internet traffic by routing it through multiple nodes. TOR can be used for creating SOC puppet accounts by hiding the user’s real IP address and location. However, TOR might not be the best option for this purpose for several reasons.

First, TOR can be very slow and unreliable, as it depends on the availability and performance of the volunteer nodes. This can affect the user’s ability to create and access SOC puppet accounts on different online platforms. Second, TOR does not encrypt the user’s traffic at the exit node, which is the last node that connects to the destination website. This means that the user’s traffic can be intercepted or modified by malicious exit nodes or by the website itself. Third, TOR can be detected and blocked by some online platforms that have anti-TOR measures, such as verification or daunting CAPTCHA challenges. This can prevent the user from creating or accessing SOC puppet accounts on those platforms. Fourth, TOR can attract unwanted attention from law enforcement or other adversaries, as it is often associated with illegal or suspicious activities. This can compromise the user’s anonymity and safety.

Region Specific SOC’s

Conducting OS-INT can pose some risks and challenges, such as exposing your identity or intentions to the target of your investigation, arousing suspicion or hostility from the target or other online users, or being blocked or banned from accessing certain online sources or platforms. To avoid these risks and challenges, it is advisable to use SOC puppets when conducting investigations.

SOC puppets help you protect your identity and privacy when conducting OSINT, as well as blend in with the online community or platform where you are conducting your investigation. By using SOC’s, you can avoid being detected or traced by the target of your investigation or other online users who may have malicious intentions. You can also access more information or sources that may not be available to your real identity or location.

However, creating and using SOC puppets also requires some planning and preparation. One of the important aspects to consider is the region specificity of your SOC puppets. This means that you should create and use SOC puppets that match the region or location where you are conducting your OSINT investigation. For example, if you are investigating a target in China, you should create and use a SOC puppet that has a Chinese name, profile photo, language, IP address, etc.

The reason why it’s best to set up your SOC puppets region specific just in case is that it can help you avoid being detected or blocked by the target of your investigation or other online users who may have region-specific filters or restrictions. For example, some online platforms may require a phone number verification from a certain country to create or access an account. Some online sources may also have geo-blocking or censorship mechanisms that prevent users from certain regions or locations from accessing them. By using region-specific SOC puppets, you can bypass these filters or restrictions and access more information or sources that are relevant to your OSINT investigation.

--

--