EvilZone
Hacking and Security => Anonymity and Privacy => : zohraan April 02, 2012, 05:42:10 PM
-
Hay.
After I watched (enjoyed too), the movie Untraceable, I came to know about an idea that may be adopted to be untraceable 100%. What if a person hacks several servers, and then connect them all together and use that network for his hacking purposes, in this way, he can use it as a DDoS tool, or also as an untraced exploited location. What you think guys ... !
-> Sorry for my poor english. :)
-
And what if one or multiple of those servers gets compromised by police/feds? This is basic knowledge. Unless you have multiple servers linked up after each other, not centralized and they are all in different countries with bad communications in terms of law enforcement. It is "easy" to trace you.
If the servers are centralized they know all the exit nodes when/if the center server gets compromised, and tracing is easy. If all servers are US or in the same country it is easy/fast for police/feds to go from server to server until they reach the server you connect to.
However if you have 5 servers in different countries across the globe where each server connects to the same next server each time, it will be hard or at least time consuming to trace it back to you.
You -> Server1 -> Server2 -> Server3 -> Server4 -> Destination
-
A normal DoS (single packets flood) can already be spoofed, and routing that would make it useless.
Just hack servers and create a botnet, when done right, you are untraceable (close enough)
-
And what if one or multiple of those servers gets compromised by police/feds? This is basic knowledge. Unless you have multiple servers linked up after each other, not centralized and they are all in different countries with bad communications in terms of law enforcement. It is "easy" to trace you.
If the servers are centralized they know all the exit nodes when/if the center server gets compromised, and tracing is easy. If all servers are US or in the same country it is easy/fast for police/feds to go from server to server until they reach the server you connect to.
However if you have 5 servers in different countries across the globe where each server connects to the same next server each time, it will be hard or at least time consuming to trace it back to you.
You -> Server1 -> Server2 -> Server3 -> Server4 -> Destination
YEAH, you got it nicely. :D
-
I imagine he would get it nicely he's the admin...and like they said this is not a new idea
-
Hmm yeah. :D
-
Nothing is completely untraceable. Nothing you hear?!
You'd have to physically have access to every server between you and the target node, including all those in the traceroute between you, the target and all the servers you've bounced off, which then means you'd have to own routers, managed switches and servers, maybe even get physical access to your DSLAM and make sure logging was turned off on every one of those suckers.
But even still, if you managed to do ALLLLLLLLLLLLLL of that wizardry - up to the point where you actually broke into those devices, they'd have logged your ass to high hell. Most servers, switches and routers all send their logs to a syslog server that literally only accepts incoming logs, one port open. Again a device you'd have to have physical access to in order to completely remove / prevent the logging.
In other words, try as you might, any one with have an asshat about them in cyber-security and the right resources can track your black ass down.
-
I think I can defeat the lazy admins. ;)
-
I'm not into doing anything illegal since I'm scared of jail and/or getting a huge fine but I think the easiest way (probably not the nicest) is to hack someones wifi (which is easy) and then do whatever you want to do through that IP. When you hacking the wifi just change your MAC and I don't know of any way they'd be able to trace you. In combination with that use a proxy as well. Public access terminals are another choice but a lot more risky (there are cameras in kinkos :P )!
1. change MAC
2. hack wifi (or use an open one)
3. use proxy
4. spread love across the land
-
I'm not into doing anything illegal since I'm scared of jail and/or getting a huge fine but I think the easiest way (probably not the nicest) is to hack someones wifi (which is easy) and then do whatever you want to do through that IP. When you hacking the wifi just change your MAC and I don't know of any way they'd be able to trace you. In combination with that use a proxy as well. Public access terminals are another choice but a lot more risky (there are cameras in kinkos :P )!
1. change MAC
2. hack wifi (or use an open one)
3. use proxy
4. spread love across the land
If you do something really fucked up, be aware that they will catch you when you do this ;).
To use someone else his wifi, you have to be close, and that is a major vulnerability for you.
-
I'm not into doing anything illegal since I'm scared of jail and/or getting a huge fine but I think the easiest way (probably not the nicest) is to hack someones wifi (which is easy) and then do whatever you want to do through that IP. When you hacking the wifi just change your MAC and I don't know of any way they'd be able to trace you. In combination with that use a proxy as well. Public access terminals are another choice but a lot more risky (there are cameras in kinkos :P )!
1. change MAC
2. hack wifi (or use an open one)
3. use proxy
4. spread love across the land
To hack a wifi access point and use it you will have to be reasonably close. You can't just sit outside a house with a laptop or people will get suspicious. You would have to sit in your car/van. All it would then take is a shot of your registration plate on a cctv camera and they could trace it back to you. Not to mention if your sitting outside someone's house for a reasonable length of time people living close by may become suspicious and call law enforcement, you could find yourself busted before you're even finished.
Of course the authorities would only look into it that much if you committed a high profile attack.
-
To hack a wifi access point and use it you will have to be reasonably close. You can't just sit outside a house with a laptop or people will get suspicious. You would have to sit in your car/van. All it would then take is a shot of your registration plate on a cctv camera and they could trace it back to you. Not to mention if your sitting outside someone's house for a reasonable length of time people living close by may become suspicious and call law enforcement, you could find yourself busted before you're even finished.
Of course the authorities would only look into it that much if you committed a high profile attack.
VNC to a laptop in your trunk with your smartphone, and an array of infrared LEDs around your plate would make it awfully hard to spot. especially from the false since of security the suburbs have.
But like you said, they are more. worried about them pesky kids stealing their WiFi, Get Off My Lawn!
-
-.- movies are useless, don't get any false ideas, just get inspired. Inspired for something to work on not to reconstruct. And don't let anonymity stop you from hacking.
-
Here's how, if I were doing some heavy hacking that required to be untraceable here's how I would accomplish this...
1. Use live OS, only save files on remote servers
2. Never hack from home network, always use open wifi networks or hotspots (ever connect to a hotspot that other people are connected to their open shares are always fun)
3. When it comes to hotspots, do not use ones that put you on camera!
4. Connect to private VPN on a random or hacked network
5. Always use proxies/tor on the VPN network
6. NEVER go to the same spot again ;)
Follow those steps and most people wont ever be able to find anything on you, you would be an internet ghost ;)
Oh yes, it may be slower, but never use USA proxies or public proxies for that matter. Set up proxies on hacked servers and go that route.
If you live in the US, then always use out of country VPN's and proxies, jurisdiction issues tend to put a damper on things as well.
-
Yes exactly ... Nice share !!
-
Ehhhh Here's my idea for being more anon and screwing over investigators caz am a fucking genius.
A proxy chain looks like this:
H4x0r->she11l1->fbi.gov she3ll->NASA shell->random bawt
My idea is this
H4x0r->she11l1->fbi.gov she3ll->NASA shell->random bawt----|///
/|\
/_________________________________________________/////
Instead of a chain, a loop. The software would work like this: It allows your computer to be controlled and used as a shell. It will accept connections from anywhere and allow connections to anywhere using Telnet.
Use it like this: Install the software on your computer and then hack a remote bawks. Then install that software on their computer and use that shell. Keep going till you have a chain of about 5 of yours shells running your software but at the end of the chain (and here is where it gets really tricky): connect back to yourself, and use YOUR computer as the shell to attack from.
At the start of the process, you connect to a target's shell with your shell to hop through other victims back to yourself. In other words, forming a circle, and "a circle has no beginning" -- Luna Lovegood, and therefore no originator.
Now, who the fuck hacked who? Who is the hacker? You are being hacked?
Problem, investigator? Tralolololol.
-
Its a good one but would leave your machine too vulnerable Sir, not to mention implicate your machine. Hotspot+Your Idea=Safer so you could still have your circle and your machine, just not on yours or your neighbors wifi, although hop on your neighbors wifi and get them as one of your chain wouldn't hurt though :P
-
That's the whole point. You leave yourself open so you are "hacked" ;D If other hackers want to use the shell and hack you for real then they can. It will be even more plausible. This idea isn't really about being anonymous. It's about plausible deniability, I guess. :P
-
/me is giggling ;D
Even as "stupid" in terms of anonyminity the idea is, imagining the investigator(s) getting to the last hop and then it jumps back to the first machine is price less.
-
/me is giggling ;D
Even as "stupid" in terms of anonyminity the idea is, imagining the investigator(s) getting to the last hop and then it jumps back to the first machine is price less.
Sir and 57 other people like this.
-
Bunch of wireless repeaters with good omni antenas spreaded in area of 10 miles in urban area.mmmmm
-
Well heres the deal with antennas....they can only grab what is there. Your limitation is the broadcast range which maybe only a matter of a couple of feet (indoors) to maybe a few hundred (outdoors) at best. No signal means no signal no matter how powerful the antenna is on the receiving end.
-
This video sucks, but you get the idea. Build a high gain biquad antenna and mount that on a parabolic dish for best affects, don't use a usb one.
http://www.youtube.com/watch?v=te97FzUItaI