EvilZone
Hacking and Security => Anonymity and Privacy => : fox12345 September 09, 2013, 07:51:17 AM
-
Hey everyone I need serious help with that
What I'm looking for : i want to all advance hidden anonymity options in backtrack ("hide my privacy 99%")
So What are their? I have some options about that.
> spoof mac
> spoof ip
> spoof ttl values
> spoof http header
> spoof dhcp
> use live cd
> use rdp
> use proxy
anyone help me?
I always searching about that. now i am really tired.
I'm not a very good English writer :
help me... :'(
-
Well, i will spoof the TTL on this post to 1 hour because of newbischness.
Please, read up the anonymity tutorial and study this topic for a few months/years then we might help you out on these questions (you will have figured them out to be stupid by then)
-
wow why do you need to spoof all these values, are you planning to hack the CIA?. On the other hand, as the admin above me said, study and read by yourself. We simply don't spoon feed everyone here.
-
wow why do you need to spoof all these values, are you planning to hack the CIA?. On the other hand, as the admin above me said, study and read by yourself. We simply don't spoon feed everyone here.
We can't even spoonfeed somebody to spoof their IP :P.
-
Dear,
I know how to use backtrack and some anonymity method. But I want some advanced Hidden method.
why?
"The question is about how actually are hackers getting traced back and after getting jail for the 'operation'. I know that in the bigger plan it's simple, You'll read out the attackers IP from the logs and police will track it down. I'd like to know how the process actually works. Probably the attacker has an protection to keep himself safe & he starts the attack. He'll take down the target and then the good guys are coming after him. To track him down they have to get the real IP of the attacker, let's assume that the attacker used a VPN + TOR browser. I don't see how can they get the real IP if the attacker used a paid VPN and a TOR browser. Of course a big government would simply get the information with few moves"
How can forensics guys identify the real IP behind the VPN, TOR or a simple proxy?
I think we are mistake some advanced anonymity options. So i want to learn it....I want to need the all anonymity method. please help me.......
Education Only......
-
Dear,
I know how to use backtrack and some anonymity method. But I want some advanced Hidden method.
why?
"The question is about how actually are hackers getting traced back and after getting jail for the 'operation'. I know that in the bigger plan it's simple, You'll read out the attackers IP from the logs and police will track it down. I'd like to know how the process actually works. Probably the attacker has an protection to keep himself safe & he starts the attack. He'll take down the target and then the good guys are coming after him. To track him down they have to get the real IP of the attacker, let's assume that the attacker used a VPN + TOR browser. I don't see how can they get the real IP if the attacker used a paid VPN and a TOR browser. Of course a big government would simply get the information with few moves"
How can forensics guys identify the real IP behind the VPN, TOR or a simple proxy?
I think we are mistake some advanced anonymity options. So i want to learn it....I want to need the all anonymity method. please help me.......
Education Only......
If i would tell you the mechanics behind the forensics part you will not understand ANY shit of it. There are various layers you need to learn in order to figure out how they could trace back to you and how you could even be smarter than they are. You can't start at anonymity without learning about networking. You can't program without knowing how to program. In the same words, you can't do networking unless you know networking.
The reason they can trace back to most of the "anonymous browsing people" is because they are networking while they actually don't know how to network.
-
thanks Dear Factionwars,
Yes, i know you are correct. But my question is what are the advance hidden anonymity options in backtrack?
what are the location? ("/etc/sysctl.conf ")
How to config backtrack?
and other options.
-
thanks Dear Factionwars,
Yes, i know you are correct. But my question is what are the advance hidden anonymity options in backtrack?
what are the location? ("/etc/sysctl.conf ")
How to config backtrack?
and other options.
I find it very lovely that you are trying to write letters to me. But if you don't START listening i am really considering to delete every post you made and will make untill it's not full of rubish.
LISTEN TO ME, i said LEARN, you can't config backtrack unless you know linux, You can't use"advance hidden anonymity options in backtrack" unless you know linux, networking, programming. You can't ask questions unless you have done research. :)
-
Ok Thanks...........
-
Im am very amused.
Please trash this before I die when rofl.
-
If you are going to use the Interwebs I would like to recommend against spoofing your IP :)
-
Thanks Moiz,
-
Moiz' post removed because gross.
Secondly, fox12345 there is a thread at the very top of this section. It's been stickied for convenience. Obviously it isn't convenient enough as you somehow could not manage to locate it. It's labeled: The Art of Anonymity. Common sense states that if you want to learn some things about anonymity you might want to check our official anonymity tutorial...
It's very detailed, and I even update it still to this day with knew information as I discover it. In fact, I'm almost certain that the tutorial contains literally every topic you just mentioned except for using rdp. I will even be adding more detail to the spoofing ttl values later on when I find time. Literally can't get any more noob-friendly then that.
It's like people don't even bother looking around at all...
-
Dear,
I know how to use backtrack and some anonymity method. But I want some advanced Hidden method.
why?
"The question is about how actually are hackers getting traced back and after getting jail for the 'operation'. I know that in the bigger plan it's simple, You'll read out the attackers IP from the logs and police will track it down. I'd like to know how the process actually works. Probably the attacker has an protection to keep himself safe & he starts the attack. He'll take down the target and then the good guys are coming after him. To track him down they have to get the real IP of the attacker, let's assume that the attacker used a VPN + TOR browser. I don't see how can they get the real IP if the attacker used a paid VPN and a TOR browser. Of course a big government would simply get the information with few moves"
How can forensics guys identify the real IP behind the VPN, TOR or a simple proxy?
I think we are mistake some advanced anonymity options. So i want to learn it....I want to need the all anonymity method. please help me.......
Education Only......
It's so funny how you want to hide yourself because u want to do BIG THINGS. But I think if u can do something in this scale u must be aware on how to hide yourself and stop nagging here :p The internet is full of resources start there we are not your google
-
It's so funny how you want to hide yourself because blah blah blah
It's funny how you want to necro threads that are from last year.
-
I am bored :p
-
I don't see how can they get the real IP if the attacker used a paid VPN and a TOR browser.
Well then you're retarded and there is no hope for you.
-
Omfg everyone stop.
/