I agree to cookies for making this site function. By using this site, I agree to the Privacy Policy and Terms of Use.
Accept
HACKTORIAHACKTORIA
  • Home
  • Articles
    • CyberSecurity
    • OSINT
    • Networking
    • Programming
    • Software
    • Cloud
    • Crypto & Blockchain
    • Opinion
  • Monthly CTF
    • Challenges
      • The Mona Lisa Heist
      • Operation Mare Nostrum
      • Downtown Murderer
      • Operation Galaxios
      • Operation Brutus
      • Operation Runner
      • Operation Warthog
    • Storyline
      • April 2022 – Operation Galaxios
      • March 2022 – Operation Brutus
      • February 2022 – Operation Runner
      • January 2022 – Operation Warthog
    • Characters
    • Finishers 2022
    • Write-Ups
  • Practice
    • Fact Checking
      • Fact Checking 10
      • Fact Checking 9
      • Fact Checking 8
      • Fact Checking 7
      • Fact Checking 6
      • Fact Checking 5
      • Fact Checking 4
      • Fact Checking 3
      • Fact Checking 2
      • Fact Checking 1
    • Geolocation
      • Geolocation 32
      • Geolocation 31
      • Geolocation 30
      • Geolocation 29
      • Geolocation 28
      • Geolocation 27
      • Geolocation 26
      • Geolocation 25
      • Geolocation 24
      • Geolocation 23
      • Geolocation 22
      • Geolocation 21
      • Geolocation 20
      • Geolocation 19
      • Geolocation 18
      • Geolocation 17
      • Geolocation 16
      • Geolocation 15
      • Geolocation 14
      • Geolocation 13
      • Geolocation 12
      • Geolocation 11
      • Geolocation 10
      • Geolocation 9
      • Geolocation 8
      • Geolocation 7
      • Geolocation 6
      • Geolocation 5
      • Geolocation 4
      • Geolocation 3
      • Geolocation 2
      • Geolocation 1
    • Image Analysis
      • Image Analysis 16
      • Image Analysis 15
      • Image Analysis 14
      • Image Analysis 13
      • Image Analysis 12
      • Image Analysis 11
      • Image Analysis 10
      • Image Analysis 9
      • Image Analysis 8
      • Image Analysis 7
      • Image Analysis 6
      • Image Analysis 5
      • Image Analysis 4
      • Image Analysis 3
      • Image Analysis 2
      • Image Analysis 1
  • Videos
  • Art
  • About
    • Frank
    • Noureldin
    • Maria
    • Roxanna
    • Dipti
    • Joy
    • Oriana
    • Simone
    • Rudraksh
    • Amogh
    • Tony
Reading: Generating Data with Mockaroo
Share
Aa
HACKTORIAHACKTORIA
Aa
Search
  • Home
  • Articles
    • CyberSecurity
    • OSINT
    • Networking
    • Programming
    • Software
    • Cloud
    • Crypto & Blockchain
    • Opinion
  • Monthly CTF
    • Challenges
    • Storyline
    • Characters
    • Finishers 2022
    • Write-Ups
  • Practice
    • Fact Checking
    • Geolocation
    • Image Analysis
  • Videos
  • Art
  • About
    • Frank
    • Noureldin
    • Maria
    • Roxanna
    • Dipti
    • Joy
    • Oriana
    • Simone
    • Rudraksh
    • Amogh
    • Tony
Follow US
© 2022 HACKTORIA
HACKTORIA > Articles > Software > Generating Data with Mockaroo
Software

Generating Data with Mockaroo

Frank
Frank June 23, 2022
Updated 2022/06/23 at 5:18 PM
Share
SHARE
Contents
What is Mockaroo?Creative Ways to use MockarooHow do I start using Mockaroo?Other Options in MockarooSchemasDatasetsMock API’sScenariosProjectsIn Conclusion

What is Mockaroo?

Imagine you make an application, database or any other place that needs data. Generating test data can be a huge hassle, or need actual programming to accomplish. What Mockaroo allows you to do, completely for free, is generate almost all common formats of data.

This allows for the simple generation of realistic looking data to use for any purpose. Main use case being the testing of applications, databases and such. Say for example you’re building a database that holds customer data. You can use Mockaroo to fill this with any type of date you want. Even using API’s.

Creative Ways to use Mockaroo

So what creative other things can we do with this? One of the ways I have used Mockaroo, is to create fake data to put in OSINT CTF Challenges. Given it can create names, IP addresses, email, coordinates and other interesting data, it can be used to either obfuscate the real data, or create massive rabbit holes for people to go through.

You could also use mock data like this to generate the fake personality of a sock puppet really quickly. Or make the profile for non existent companies, including infrastructure and fake certificates.

How do I start using Mockaroo?

Head over to https://www.mockaroo.com/ and register for an account. Either use Single-Sign-On, or use your own email address (or a sock puppet). It is completely possible to use this tool without registering, though saving your custom datasets and such won’t be possible.

In our example we will make a mock dataset for secret agents and their safehouse coordinates.

Upon opening or logging into Mockaroo, we are greeted with the schema overview, here you can modify the data you want to generate. Or add additiona fields, remove fields and preview your data.

Let’s start modifying our dataset. We have a total of 157 different types of data available to generate. All neatly ordered into categories. I will add the coordinates of fake safe houses and other data I think would make for a nice rabbit hole.

So we have our dataset ready, let’s preview what this looks like using the preview option.

Looks great, we now have a fun rabbit hole for people to go into. Or something to fill up a database, for example used for world building in a game setting.

Other Options in Mockaroo

Schemas

You can create your own schema’s for later use. This comes in handy if you want to generate the same types of data more often. Let’s say you make websites for clients and need to fill up booking systems more often, you can have certain schemas ready to make this easy.

Datasets

If you have pre-defined datasets in the form of CSV files, you can upload these to Mockaroo and make them into schemas. For example, a client gives you a sample set of data, but you don’t want to use the real personal information. You can upload the dataset and make the columns into a schema, without using the actual personal data.

Mock API’s

Making sure your data works with common API’s or with your own, you can write Mock API’s to test the effects of your data when using an API. This is great if there’s a lack of staging environments and you don’t want to throw your mock data at a production environment.

Scenarios

Scenarios allow you to shape numeric distributions based on other columns in your schema. For example, let’s say your want to generate a file where each row represents the sale of a car including the model, region, sale price, and date of sale. This means that if the generated data isn’t realistic enough, you can set scenarios after more realistic modeling, to create more believable datasets.

Projects

Allowing for collaboration and to segment the datasets, schemas, API’s in Mockaroo. You can make projects that you share with others. For example, having a project with your customer allows for collaboration in making realistic test data.

In Conclusion

This was just a quick overview of a neat tool that can be used with great creativity. I personally use Mockaroo to generate data for CTF’s, or to test databases. But the possibilities of generating realistic looking fake datasets are almost endless. Play around with Mockaroo and look around in your own work and personal interests what creative solutions this can be used for. Being free to use for most of the important functionality, it can be a great asset in your toolbox.

TAGGED: api, cybersecurity, data, databases, datasets, osint, programming

Sign Up For our Weekly Digest

Receive a weekly digest of everything new on Hacktoria

By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Frank June 23, 2022
Avatar
Posted by Frank
Interest in technology and gamification. I enjoy hiking and weightlifting in my free time. Occupied various roles in IT over 12 years. Founder of Hacktoria, working to enable our teams to create engaging CTF exercises and quality content.
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

More from this Category

Software

Why nobody uses Linux on desktop

5 Min Read
Software

10 Best Linux Terminal Games

6 Min Read

About Us

Hacktoria is a passion project run by volunteers.  We aim to create something we enjoy making that provides value to our readers, viewers and players. Our backgrounds vary from Information Technology, Cybersecurity to Data and Law.

Capture the Flag

We provide a Monthly Story Based Capture the Flag exercise. Players solve tasks using OSINT, Hacking, Social Engineering and Cryptographic skills to complete story driven missions. The winner of each competition is written into the fictional story. Participants receive a certificate of completion.

We also offer Practice Labs in various categories. These are intended to improve your investigative skills and provide a good dose of challenge and entertainment.

Articles & Videos

Besides CTF Exercises, our Editorial Team writes Articles about Cybersecurity, OSINT and Technology. We also host a YouTube channel that provides informative content and CTF material. This channel is hosted by Tony, aka “CyberVikingUK“.

HACKTORIAHACKTORIA
Follow US

© 2022 HACKTORIA - Capture the Flag Exercises & Cybersecurity, OSINT and Technology Articles

  • Sitemap
  • Privacy & Disclaimer
Join Us!

Subscribe to our weekly digest!

Zero spam, Unsubscribe at any time.
Welcome Back!

Sign in to your account

Lost your password?