Login Register






The stories and information posted here are artistic works of fiction and falsehood. Only a fool would take anything posted here as fact.
Thread Rating:
  • 0 Vote(s) - 0 Average
Thread Closed 


Tutorial What one hacker should have and should not have. filter_list
Author
Message
What one hacker should have and should not have. #1
[Image: DHp3P.png]

In this tutorial I will write what you should have and what you should not have to keep your privicy on.

I. Social networks.
Alot of hacker have accounts on Facebook and other social networks, which is very bad, let 's say that hacker have your nickname, see your account on forum which don't
protect the data and get your e-mail, after this he/she do search on social networks and see your account and get all information on it. So if you want to be a
hacker delete and don't create accounts in social networks.

II. Bitcoin.
Bitcoin is the best money-transfer service in internet for hackers, because it try to keep anonimity on high-level, so immediately create bitcoin account if you don't
have one. Because when you get some illegal money you can transfer it to BTC account and then to other money-transfer services. Lets say that you have hack web server
and sell the information from it but the hacker you have sell information get caught and say that he have buy the data from you feds see transfers from the service and get
directly to you.

III. Proxies every where.
Use proxies every where Skype, IRC, Downloading torrent, browsing web every where. Because when you chat with somebody he can try to dox you or be fed. its on your
intres to use proxy every time you access internet.

IV. JavaScript and Flash.
Those two popular components can be use to collect information for you like IP(your real even if you are using proxy), OS type, Contry and alot of things. Disable them.

V.Don't tell to every body that hacking is your interes. Extremly on chats with random/unfamiliar person/s you don't know who is trying to dox you, who is
federal agent(Those days they are very active) or who is trying to hack you.

VI. Be careful with VPNs.
Alot of VPNs keep logs almost every VPN keep logs because they are induced to keep them from federal agancy. First start proxy or TOR then connect to VPN its more
secure by that way.

VII.
Don't use E-mail services such as:.
Don't use E-mail services such as Gmail,Hotmail,Yahoo etc... This isn't good for you, somebody can try to dox you also if federals request information from the service
they will provide it immediately. Use services such as Tormail 10minutemail etc.. which are more hard to trace.

VIII. Use anti-forensics techniques.
If you get caught it will be good if you have protect your PC and its hard to get/recover information from it. You can read my anti-forensics guide.
Code:
http://www.anarchyforums.net/Thread-Tutorial-How-to-protect-from-computer-forensics-MUST-READ-Linux-incuded-Update

IX.
Protect from Blackmail.
You should keep your protection from viruses and doxing on very high-level, because you don't want to get blackmailed. My recommends are use sandbox and VMs all the time.

I think this is enough if somebody want to add something or ask he/she can write a commend.


Re: What one hacker should have and should not have. #2
Decent tips, although you can generally get away with using Liberty Reserve if not Bitcoin.
[Image: fSEZXPs.png]


RE: What one hacker should have and should not have. #3
(12-21-2012, 09:20 PM)The Anarchist Wrote: Decent tips, although you can generally get away with using Liberty Reserve if not Bitcoin.

Yeah LR is good but Bitcoins is better if you ask me, this is why I write for it.


RE: What one hacker should have and should not have. #4
Oh dear.

Bitcoin aren't made to anonymous, get your facts straight. Every transaction you make has the IP that made it(your IP) publicly available.

Social network accounts are fine, you shouldn't be using the same nickname on more than one site.( Since I'm registered as W00t on this site, none of my other accounts are registered as W00t )

Your OS can be determined without JavaScript or Flash, and only Flash can give away your IP, javascript can just be used in profiling.


RE: What one hacker should have and should not have. #5
Might want to check your grammar, otherwise decent TUT.


RE: What one hacker should have and should not have. #6
Thanks for the share. I'm sure all the new hackers here will really enjoy this!
[Image: sign.jpg]
A Proud Father and Supporter of the AF Radio!


RE: What one hacker should have and should not have. #7
(12-21-2012, 09:44 PM)w00t Wrote: Oh dear.

Bitcoin aren't made to anonymous, get your facts straight. Every transaction you make has the IP that made it(your IP) publicly available.

Social network accounts are fine, you shouldn't be using the same nickname on more than one site.( Since I'm registered as W00t on this site, none of my other accounts are registered as W00t )

Your OS can be determined without JavaScript or Flash, and only Flash can give away your IP, javascript can just be used in profiling.

1. There are things called proxies and proxychain(multiple proxy) but there are 2 variants.
- You are too stupid to guess.
- You just write random shits that are in your mind.
2.Social networks AREN'T fine I have tell the reasons above in the tutorial.

3. Yes and no your OS can be determinate from the browser user-agent but this was just and example, flash can store information on your computer.


RE: What one hacker should have and should not have. #8
Social Networks are not fine. If you share your email somewhere then I can just search that email on Facebook and I have your account right there in front of me. If you do wish to use a social network turn up your privacy settings and security goddammit.


RE: What one hacker should have and should not have. #9
(12-22-2012, 09:23 PM)The Protagonist Wrote: Social Networks are not fine. If you share your email somewhere then I can just search that email on Facebook and I have your account right there in front of me. If you do wish to use a social network turn up your privacy settings and security goddammit.

Or you can use a different email for your hacking and social life.


RE: What one hacker should have and should not have. #10
(12-22-2012, 09:29 PM)Kinanizer Wrote:
(12-22-2012, 09:23 PM)The Protagonist Wrote: Social Networks are not fine. If you share your email somewhere then I can just search that email on Facebook and I have your account right there in front of me. If you do wish to use a social network turn up your privacy settings and security goddammit.

Or you can use a different email for your hacking and social life.

Yes but a lot of hackers don't do it and there are other ways to find account in social network for example if he look on the wall and the hacker have post something with him name for example.








Users browsing this thread: 6 Guest(s)