![]() |
Tutorial How to stay anonymous when hacking and surfing around. Part 2 - Printable Version +- Sinisterly (https://sinister.ly) +-- Forum: Computers (https://sinister.ly/Forum-Computers) +--- Forum: Networking (https://sinister.ly/Forum-Networking) +---- Forum: Anonymity (https://sinister.ly/Forum-Anonymity) +---- Thread: Tutorial How to stay anonymous when hacking and surfing around. Part 2 (/Thread-Tutorial-How-to-stay-anonymous-when-hacking-and-surfing-around-Part-2) |
How to stay anonymous when hacking and surfing around. Part 2 - workaholics - 12-01-2012 Hello! And welcome to my tutorial! Part 1 of this tutorial if you haven't read it. Lets begin! Hide like a hacker i- Protection ii- Encryption iii- Anonymity iv- Links Protection Basically what I am trying to say in this section is, before you go out hacking other people and other things, just check for a second and make sure it's not as easy to hack your device. There are some pretty simple steps for this though.
It is important that you are not infected because other could see you hacking and steal it from you or alternitively, if they get caught, you get caught. On the other hand you might want to stay infected by a bot or RAT so if and when you are caught you can claim you had no knowledge and the bot controlled your PC and performed the hack without your knowledge. However I am not someone who intends to be caught. (I'm not really a black hat either)
FireWall: (not tested) http://personalfirewall.comodo.com KeyScrambler: http://www.qfxsoftware.com HJT: http://download.cnet.com/Trend-Micro-Hij...27353.html Malewarebytes: http://www.malwarebytes.org Another way to prvent this is to use a Lixux-based O/S as altohugh these aren't 100% secure they have a lot on Windows machines due to the fact they are less common. But remember you are not invisible: Code: If you downloaded and installed the open-source Unreal IRC server in the last 8 months or so, you’ve been pwned. Encryption Be under no ilussions, this is one of the most important steps to keeping information secret. Now I am a big fan of encryption and here is why: Code: "if your encryption program uses 128-bit keys, your particular key could be any of more than 3.4 trillion billion billion billion possible combinations. More likely to win the lottery than to crack that level of encryption using the brute-force method"[b]Or just use RSA 4096-bit and 256-bit AES?[/b] Code: Individuals who are believed to have the cryptographic keys necessary for such decryption will face up to 5 years in prison for failing to comply with police or military orders to hand over either the cryptographic keys, or the data in a decrypted form. Therefore depending on the strength of your offence it could be more wise to with-hold your key on claims of a privacy breach, and face the maximum two years than to hand over your keys. The program I most recomend for doing this is TrueCrypt: http://www.truecrypt.org True crypt can provdie 256-bit encryption decrypted form. Code: The design and strength of all key lengths of the AES algorithm (i.e., 128, 192 and 256) are sufficient to protect classified information up to the SECRET level. TOP SECRET information will require use of either the 192 or 256 key lengths. Code: TrueCrypt allows you to create a hidden operating system whose existence will be impossible to prove (provided that certain guidelines are followed — see below). Thus, you will not have to decrypt or reveal the password for the hidden operating system. As there is a pre-boot authentication process which asks for your encryption password you can have two, one for people to see and one for hacking purposes. This is IMPOSSIBLE to prove so I highly recommed using it, although I don't use it myself... Anonymity Now, this is THE MOST IMPORTANT section of the whole tutorial, get this part right and you can pretty much forget about the rest (however if you are performing something illegal following the other steps might help you sleep better). Hidding your IP and identity is crucial. Here is my prefred methods:
Code: SOCKS Code: HTTP proxies are traditionally more HTTP protocol aware and do more high level filtering (even though that usually only applies to GET and POST methods, not CONNECT). SOCKS proxies can also forward UDP traffic and work in reverse - HTTP proxies can't do that. Use both HTTP and SOCKS if possible though this is known as "Proxy Chaining" this is used to make your actions harder to trace but its not truely effective. REMEMBER: Do not use an L3 HTTP proxy as they show your true IP in the header and are therefore essentially pointless. VPN This is by far the most effective way to conceal your identity. It channels you traffic and encrpts it with 128-bit. Although some support 256-bit. Often a VPN is much more reliable and does not slow down your connection as much (in fact I haven't noticed mine at all) A VPN is a virtual Private Network: Code: "Secure VPNs use cryptographic tunneling protocols to provide confidentiality by blocking intercepts and packet sniffing, allow sender authentication to block identity spoofing, and provide message integrity by preventing message alteration." A decent PAID VPN is: HMA A Awesome free VPN is: Vpnbook But always use this in conjunction with something else if you are breaking something... ProxyFirewall is a good program which runs SOCKS and HTTP proxies [http://uniqueinternetservices.com/proxy-firewall-download.html Bibliography: UK law report: http://arstechnica.com/tech-policy/news/...l-time.ars Regulation of Investigatory Powers Act: http://www.opsi.gov.uk/acts/acts2000/ukpga_20023_en_8 Goverment stance on AES: http://csrc.nist.gov/groups/STM/cmvp/doc...SS15FS.pdf Wikipedia review on AES: http://en.wikipedia.org/wiki/Advanced_En...d#Security TrueCrypt Hidden o/s: http://www.truecrypt.org/docs/?s=hidden-...ing-system SOCKS Information and example: http://en.wikipedia.org/wiki/SOCKS Proxy Chaining: http://www.freeproxy.ru/en/free_proxy/fa...aining.htm Linux infection news: http://www.zdnet.com/blog/bott/linux-inf...dated/2206 Official IRCd announcement: http://forums.unrealircd.com/viewtopic.php?t=6562 Downloads linked: Proxy firewall: http://uniqueinternetservices.com/proxy-...nload.html TrueCrypt: http://www.truecrypt.org/downloads UltraVPN: https://www.ultravpn.fr/download.htm FireWall: (not tested) http://personalfirewall.comodo.com KeyScrambler: http://www.qfxsoftware.com HJT: http://download.cnet.com/Trend-Micro-Hij...27353.html Malewarebytes: http://www.malwarebytes.org Special thanks to WhiteFlame for Most of this content. RE: How to stay anonymous when hacking and surfing around. Part 2 - Xeronations - 12-01-2012 Great tutorial. Very detailed, very easy to follow. Thanks! RE: How to stay anonymous when hacking and surfing around. Part 2 - Bannedshee - 12-01-2012 Awesome tutorial! This surely will help a lot!! RE: How to stay anonymous when hacking and surfing around. Part 2 - workaholics - 12-01-2012 (12-01-2012, 06:14 PM)Xeronations Wrote: Great tutorial. Very detailed, very easy to follow. Thanks! Thanks bro, your welcome! (12-01-2012, 06:29 PM)Cyber-Savage Wrote: Awesome tutorial! This surely will help a lot!! Thanks! Yeah will be posting part 3 in a little while. RE: How to stay anonymous when hacking and surfing around. Part 2 - w00t - 12-01-2012 For the love of god, make sure you aren't using a PPTP vpn, their encryption is useless. RE: How to stay anonymous when hacking and surfing around. Part 2 - workaholics - 12-01-2012 (12-01-2012, 09:12 PM)w00t Wrote: For the love of god, make sure you aren't using a PPTP vpn, their encryption is useless. Openvpn! I use openvpn then pptp both. But also it does encrypt everything you do in 126 aes I think. It would be hard for someone to decrypt them. So. I don't know. RE: How to stay anonymous when hacking and surfing around. Part 2 - w00t - 12-02-2012 PPTP inadvertently does two-time pad. Two time pad is easily broken. Any listener to PPTP traffic could get what you were sending/recieving. RE: How to stay anonymous when hacking and surfing around. Part 2 - workaholics - 12-02-2012 (12-02-2012, 12:34 AM)w00t Wrote: PPTP inadvertently does two-time pad. Two time pad is easily broken. Any listener to PPTP traffic could get what you were sending/recieving.Oh............. I didn't know that |