Login Register






Thread Rating:
  • 1 Vote(s) - 5 Average


Tutorial How-To Be Anonymous filter_list
Author
Message
How-To Be Anonymous #1
How-To Be Anonymous by Master Antrax
NOT Like The Hackers.

Introduction to Anonymity

Spoiler:
What is being anonymous on the web? Well the main part of it is protecting your IP(Internet Protocol). You do this using proxies. Also being anonymous is also not only proxies but VPNs(Virtual Private Network). Both a VPN and a proxy are very important tools in being anonymous. But lets not forget the homefront. Our computer itself! You might be thinking how do I be anonymous on MY computer. Well being anonymous on YOUR computer is doing things like protecting yourself from keyloggers. Keyloggers are basically used to log your key presses. You will learn how to protect from this threat in this tutorial, too. So lets get started! Smile

Hiding IP

Spoiler:
In this tutorial there are 2 tools we will use to hide our IP. These 2 tools are Tor Browser, and Cyber Ghost 5. You can use one or the other, or both at once. Which ever one you perfer. We will start with Tor Browser:
Spoiler:
Spoiler:
You can download Tor from HERE:
[spoiler]
[Image: ?di=0141671508510]
After you download and install Tor open it and you will get a window like this:
Spoiler:
[Image: init.png]
After that you will be at the Tor startup page:
Spoiler:
[Image: images?q=tbn:ANd9GcT9iW54fc6UksN74zJVG1l...4zYYXQiuBd]
Now your IP is protected:
Spoiler:
NOTE: YOUR IP MAY BE DIFFERENT
[Image: images?q=tbn:ANd9GcTlL4LrHvj1JQtzxWT3I4P...2GAIcG9oeQ]
Now we will install Cyber Ghost:
Spoiler:
You can download Cyber Ghost from HERE:
Spoiler:
[Image: ?di=14141671620213]
When you open it, let it load and then click this button:
Spoiler:
[Image: ?di=914167163327]
Wait for it and it will give you a proxy. In my experience these proxies are FAST! If you want even faster proxies you can upgrade to premium for $19.99/year!
Really there is not much need to use both. To wrap this up I will briefly explain the difference between the 2(Cyber Ghost, Tor)
Cyber Ghost: Uses 1 Proxy, Faster
Tor: Chain Proxies, Slower
That is the difference between Tor and Cyber Ghost. Tor chains proxies together, so it is harder to trace, even though it would be severely hard to get past 1 proxy.

Defending Against Keyloggers

Spoiler:
This seems complicated, but it is very simple. All you need is 1 just ONE program. 1 program? Yes! Are you sure 2 pineapples won't work? Yes. Now please bring your stupidity somewhere else, jk. Smile
Ok but the only program you need is a program called KeyScrambler. You can obtain this from HERE. This is how the preogram works:
Spoiler:
[Image: ?di=11141671744814]
Basically it encrypts your keystrokes, so lets say I type 'Hello World!' the keylogger may see it as 'a7pu2 ad24rp'. Therefore your passwords are safe! Unless they steal them from Chrome or FileZilla, etc. from their own programs files. Other than that your safe.

Anti-Fingerprinting

Spoiler:
Anti-fingerprinting I believe is not well recognized. Well enough as it should be, it is yet another one of things that help in your anonymity on the web. It does not work as well as Proxies, and VPNs, but it still helps. This also helps prevent RATs, and other tools from stealing your private data. Moving on, the first tool we will be using is TrueCrypt. This will encrypt your harddrive where only the people who have the password can get it. This can be replaced by bitlocker(comes defaultly installed on some machines). You can see if you have bitlocker installed by just searching bitlocker in Windows search bar. If not get true crypt from HERE. I would suggest using bitlocker though if you have it. You can use that to encrypt your hard drive. If that does not work for you then you can use other tools, too. There is just one last thing I would like to share on this topic. This is probably used by A LOT of people and they don't even realize they're doing it. It is using VMs. Yes VMs. Since the VM is in its own virtual state a virus cannot get to your physical computer. Now to make a VM is pretty simple you can look up an iso download for an os like Ubuntu and download that. Then go download VirtualBox or VMWare, it is your choice which one you choose. *psst I honestly like VMWare better, but what do I know?

Well that wraps this tutorial up. I hope you have enjoyed it, and remember to leave feedback. I love some feedback... Ok well I hope you enjoyed it,
Master Antrax Smile

Have Fun Being Anonymous!

[+] 3 users Like Master Antrax's post
Reply

RE: How-To Be Anonymous #2
You're suggesting backdoored software to prevent rats from stealing private data? Even if it wasn't backdoored, full-disk encryption cannot protect against malware that has full access to the decrypted content of the drive. This should be pretty obvious.

Also, VMs have been known to have guest-to-host RCE vulnerabilities, so saying malware on the guest cannot affect the host is not true by any means...

TrueCrypt's full-disk encryption is much better than BitLocker, but be sure to use the version that does allow it, the latest does not. It is not broken ad they say on their sourceforge page.

[+] 1 user Likes Xeru's post
Reply

RE: How-To Be Anonymous #3
(11-23-2014, 06:50 AM)Xeru Wrote: You're suggesting backdoored software to prevent rats from stealing private data? Even if it wasn't backdoored, full-disk encryption cannot protect against malware that has full access to the decrypted content of the drive. This should be pretty obvious.

Also, VMs have been known to have guest-to-host RCE vulnerabilities, so saying malware on the guest cannot affect the host is not true by any means...

TrueCrypt's full-disk encryption is much better than BitLocker, but be sure to use the version that does allow it, the latest does not. It is not broken ad they say on their sourceforge page.

Yes, but those VM vulnerabilities are rarely used.

[+] 1 user Likes Master Antrax's post
Reply

RE: How-To Be Anonymous #4
(11-23-2014, 06:58 AM)Master Antrax Wrote: Yes, but those VM vulnerabilities are rarely used.

Not as rare as you'd think, last one that was reported was found in a decompiled Java-based malware. That was just over a month ago.

[+] 1 user Likes Xeru's post
Reply

RE: How-To Be Anonymous #5
Being anonymous is mainly about protecting your Internet Protocol? The Internet Protocol is a communications protocol. That doesn't make much sense. In fact, most of the information you've presented is incomplete. For example, in order to protect against keyloggers and other malicious software all you suggest is that one uses some "keyscrambling" software. I'd say that your "solution" hardly increases anonymity and that it is most definitely not a means of protecting your system against malicious software in the first place. I think you need to put a little bit more research in before writing a tutorial on a topic as broad as this one.

[+] 1 user Likes Dong's post
Reply

RE: How-To Be Anonymous #6
@Xeru a redpill (VM detection) and actual VM breakout are two very different things. Source on an ITW malware using a VM breakout?
PGP
Sign: F202 79C9 76F7 40BB 54EC 494F 5DEF 1D70 14C1 C4CC
Encrypt: A5B3 1B21 55E1 80AF 4C6E DE83 467B 8EFC 3DEE 681C
Auth: CD55 E8A5 1A08 2933 8BA6 BC88 D81F 1943 739A 3C47

[+] 1 user Likes Reiko's post
Reply

RE: How-To Be Anonymous #7
How to be anonymous:

step 1: turn off your computer
step 2: shoot yourself

If you don't know this is common knowledge, then you have no right using any electronic device.

[+] 2 users Like phyrrus9's post
Reply

RE: How-To Be Anonymous #8
This topic has already been done better here. https://www.sinister.ly/Thread-Tutorial-...=Anonymous
[Image: master645.png]

Life before death, strength before weakness, journey before destination.” ― The Way of Kings by Brandon Sanderson

[+] 1 user Likes Master's post
Reply

RE: How-To Be Anonymous #9
this is not full tut...

Here is full Use the software called Tails. It keeps everything you do anonymous. Then use CyberGhost as a secondary defense. Browse the internet through TOR. That should be plenty for a few years.

[+] 1 user Likes samerlol's post
Reply

RE: How-To Be Anonymous #10
Doesn't matter how hard you try, you will never be anonymous on the internet, it wouldn't take anyone if they knew how to do it very long to figure out who you were even with all that.
[Image: xlbdwZT.png]

[+] 1 user Likes Blue's post
Reply







Users browsing this thread: 2 Guest(s)