EvilZone
Hacking and Security => Anonymity and Privacy => : Bl@ck De@th April 17, 2012, 12:33:25 AM
-
Hello im new at this so i need help how do hackers stay hidden when hacking i know there´s proxys but can you be traced even if you use a proxy in let´s say china,russia and are there other Software you can use ? thanks :)
-
Perhaps you should check out the anonymity section. There's so many way, Tor, proxy chaining, SSH, VPN, but then there is also little things. Such as changing your mac address, your user agent can help someone to identify you. You must be wary of ident look ups and the like. Be sure to disable Javascript or get Noscript. If you are looking to hide from the NSA, well, you my friend are in trouble. You can definitely be traced if you just use one proxy. It's best to use socks proxies. Make sure to chain proxies from different countries.....
But like I said, you should really look through the anonymity section more thoroughly.
-
Perhaps you should check out the anonymity section. There's so many way, Tor, proxy chaining, SSH, VPN, but then there is also little things. Such as changing your mac address, your user agent can help someone to identify you. You must be wary of ident look ups and the like. Be sure to disable Javascript or get Noscript. If you are looking to hide from the NSA, well, you my friend are in trouble. You can definitely be traced if you just use one proxy. It's best to use socks proxies. Make sure to chain proxies from different countries.....
But like I said, you should really look through the anonymity section more thoroughly.
Thanks =) i appreciate it but how many Proxys does it have to be in the chain ?
-
You can chain as many as you want. Just remember that the more proxies the slower your computer will be because its going through multiple networks. Also three proxies is enough. More than that is unneccesary
-
You can chain as many as you want. Just remember that the more proxies the slower your computer will be because its going through multiple networks. Also three proxies is enough. More than that is unneccesary
I wouldn't exactly call it unnecessary. You can never be too paranoid, it's healthy ;) Ideally (in my opinion), you want to firstly spoof your MAC address and connect to someone else's wireless network. Then start up TOR, or a VPN connection. Make sure you check your TOR exit nodes - you don't want your connection to be exiting anywhere in your current country, as that seriously degrades anonymity. Ensure your browser is configured correctly (no cookies, no scripts or flash content) as any of these could potentially screw you over, and then get on with your hacking.
You should also be professional about it - the more you fool around, the more mess you'll make in log files and the more chance there is of someone noticing you.
-
Are you talking about simply anonymizing your IP?
Or when you say fear of being "traced", does that include people who may have access to your HD?
Assuming the former, you have:
1) VPN
2) Route through hacked system
3) Find anonymous proxy that's not blocked
4) You can possibly spoof packets depending on what you're trying to do, but if you are trying to access a website (Hence TCP), this won't work.
5) Get a free/paid shell and route through that.
Also, with TOR, people typically only block the exit nodes. It might be worth a try to set up TOR to use a relay node as your exit node, and see if you are still blocked. I don't remember the specifics of this, but I've seen that it's possible via TOR config.
You may also want to take a look at chaining one or multiple methods/systems, depending on the situation.
-
It's simple, really.
I have never shared this before might make a thread on it, PM me if I should.....
1) Buy a laptop from craigslist or other local site like that, so you won't be a record if you buy a laptop in a store.
2) After you but a laptop, run DBAN's autonuke feature and install the OS of your choice.
3) Drive/walk to some residence and download TMAC(if on Windows) to spoof your MAC adress.
4) Now go to a different wifi hotspot and download the tools you will need while your mac is spoofed.
[Tools include hacking OS, VPNs, hash crackers, ebooks, etc.]
5) Encrypt your harddrive with truecrypt setting a password as long as you can remember.
[I found a good technique is to walk around your town, every other street block mentally note an item, do this until you have ~5 items.
For example: CatBenchTrainCoffeeJar. Now add numbers to the end of each word. so Cat1Bench2Train3Coffee4Jar5. If you want more security, replace characters, like @ instead of a.]
6) With your encrypted hard drive, use a keyfile stored on a USB.
[Here would be the procedure if you are going out to hack.
You leave your house, after unlocking your HD with the keyfile.
Now, leave the keyfile USB at your house(hidden) so if you or your laptop is intercepted they won't have the keyfile.]
7) Get a screen-guard like what banks use so you can't see what is on your screen from an angle to prevent snoopy people/cameras.
8. Put a band-aid over your webcam in case of virus your face is hidden.
9) Set your BIOS to require a complex password and to NOT boot from USB in first order.
Now when hacking:
1) Spoof your wireless cards MAC so no trace is left on the router/modem you are using to hack.
2) Once you spoofed your wireless cards MAC< also spoof your PCs.
3) Hop behind a VPN (No logs), then connect to a SSH tunnel, then setup your applications to run through that tunnel as well.(Tor + SSH +VPN is also an option.)
4) After every hack run CCleaner with all options enabled and make sure it is overwriting (3-pass).
5) Wipe your free space (3-pass.)
Uhhh yeah, that is what I could think of off the top of my head, PM me if you want to know more, I hope this helps you.
-
It's simple, really.
I have never shared this before might make a thread on it, PM me if I should.....
1) Buy a laptop from craigslist or other local site like that, so you won't be a record if you buy a laptop in a store.
2) After you but a laptop, run DBAN's autonuke feature and install the OS of your choice.
3) Drive/walk to some residence and download TMAC(if on Windows) to spoof your MAC adress.
4) Now go to a different wifi hotspot and download the tools you will need while your mac is spoofed.
[Tools include hacking OS, VPNs, hash crackers, ebooks, etc.]
5) Encrypt your harddrive with truecrypt setting a password as long as you can remember.
[I found a good technique is to walk around your town, every other street block mentally note an item, do this until you have ~5 items.
For example: CatBenchTrainCoffeeJar. Now add numbers to the end of each word. so Cat1Bench2Train3Coffee4Jar5. If you want more security, replace characters, like @ instead of a.]
6) With your encrypted hard drive, use a keyfile stored on a USB.
[Here would be the procedure if you are going out to hack.
You leave your house, after unlocking your HD with the keyfile.
Now, leave the keyfile USB at your house(hidden) so if you or your laptop is intercepted they won't have the keyfile.]
7) Get a screen-guard like what banks use so you can't see what is on your screen from an angle to prevent snoopy people/cameras.
8. Put a band-aid over your webcam in case of virus your face is hidden.
9) Set your BIOS to require a complex password and to NOT boot from USB in first order.
Now when hacking:
1) Spoof your wireless cards MAC so no trace is left on the router/modem you are using to hack.
2) Once you spoofed your wireless cards MAC< also spoof your PCs.
3) Hop behind a VPN (No logs), then connect to a SSH tunnel, then setup your applications to run through that tunnel as well.(Tor + SSH +VPN is also an option.)
4) After every hack run CCleaner with all options enabled and make sure it is overwriting (3-pass).
5) Wipe your free space (3-pass.)
Uhhh yeah, that is what I could think of off the top of my head, PM me if you want to know more, I hope this helps you.
Paranoid alart!
You seriously do not need to do all that shit. I agree on the crypting part and VPN/SSH/Proxy part (dont use TOR). Everything else is just unnecessary. Maybe except the MAC spoofing if you are directly exposing your computer to the Internet. Else, nobody except your router is ever going to know your MAC (and other local computers).
-
I really think that when everyone talks about staying Anonymous when hacking, they automatically assume it has to do with VPNs and Full Drive Encryption, etc.
Although the above plays a major role in NOT getting priority seating in the 4chan party van, you also have to remember the following: People are snitches, and information you post is often public.
1. Never, under any circumstances, tell someone you don't trust or haven't known for a long time that you even participate in hacking. What if it's someone you've known for a long time but recently fought with? Avoid any conversation on what you might be doing.
2. DO NOT BRAG. Someone who allows their work to go into the public without throwing their name all over the place is more likely to stay out of the hands of the Feds than someone who brags about everything they do.
And finally - Be overly paranoid. Especially once you start getting into deep shit.
-
It's simple, really.
I have never shared this before might make a thread on it, PM me if I should.....
1) Buy a laptop from craigslist or other local site like that, so you won't be a record if you buy a laptop in a store.
2) After you but a laptop, run DBAN's autonuke feature and install the OS of your choice.
3) Drive/walk to some residence and download TMAC(if on Windows) to spoof your MAC adress.
4) Now go to a different wifi hotspot and download the tools you will need while your mac is spoofed.
[Tools include hacking OS, VPNs, hash crackers, ebooks, etc.]
5) Encrypt your harddrive with truecrypt setting a password as long as you can remember.
[I found a good technique is to walk around your town, every other street block mentally note an item, do this until you have ~5 items.
For example: CatBenchTrainCoffeeJar. Now add numbers to the end of each word. so Cat1Bench2Train3Coffee4Jar5. If you want more security, replace characters, like @ instead of a.]
6) With your encrypted hard drive, use a keyfile stored on a USB.
[Here would be the procedure if you are going out to hack.
You leave your house, after unlocking your HD with the keyfile.
Now, leave the keyfile USB at your house(hidden) so if you or your laptop is intercepted they won't have the keyfile.]
7) Get a screen-guard like what banks use so you can't see what is on your screen from an angle to prevent snoopy people/cameras.
8. Put a band-aid over your webcam in case of virus your face is hidden.
9) Set your BIOS to require a complex password and to NOT boot from USB in first order.
Now when hacking:
1) Spoof your wireless cards MAC so no trace is left on the router/modem you are using to hack.
2) Once you spoofed your wireless cards MAC< also spoof your PCs.
3) Hop behind a VPN (No logs), then connect to a SSH tunnel, then setup your applications to run through that tunnel as well.(Tor + SSH +VPN is also an option.)
4) After every hack run CCleaner with all options enabled and make sure it is overwriting (3-pass).
5) Wipe your free space (3-pass.)
Uhhh yeah, that is what I could think of off the top of my head, PM me if you want to know more, I hope this helps you.
That actually wasn't very simple. If you hacked/plan to hack the NSA database and leak information than perhaps this is necessary. Otherwise, I don't think hacking your cheating gf's facebook warrants all of this
-
Use VPNs like MaskMyIP or use TOR Browser.
-
Use VPNs like MaskMyIP or use TOR Browser.
TOR is crap.
-
:P tor might be crap but... anything else suggested? (and free for those who can't afford).
-
If you can't afford a proper VPN, then maybe you shouldn't yet be thinking of doing anything that requires it?
-
(http://www.motifake.com/image/demotivational-poster/1207/paranoid-paranoid-alert-nervous-scared-demotivational-posters-1343619981.)
Many of you here talking as if you're actuallt gonna hack something 'BIG' :P
-
If you can't afford a proper VPN, then maybe you shouldn't yet be thinking of doing anything that requires it?
That's the problem, what if you need to leak something for the freedom's sake? Can't leak because of not having enough money?
Privacy, anonymity, etc. those are not necessarily to do bad things. These should be as available as possible, for those who can't afford.
-
But they wont be available for free, because it takes money to run them.
Also, it doesn't cost much anyway.
-
Well, you'd be surprised. It isn't like it costs a fortune. It could cost half dollar. It can be so cheap, that an average person could pay a thousand of those. VPS' or similar.
The problem is with the oppresive countries that block access to foreign currencies. There are some (which I won't mention) where you can have a VISA/MasterCard, but the local policy is to use that card in the local currency only. Then you can buy in the internet only the stuff of that country. Want a book from Amazon? You can't afford it, even if it just does cost $2 USD. Want a VPS? perhaps it just does cost $5 at PRQ.se, but you can't pay it, because your credit card, bank, whatever, won't let you pay for it. You could be rich in the local currency, but it won't automatically convert into euros or whatever the currency is.
Having said this, you could instead, earn in dollars directly, in a virtual account. The problem comes when you are about to receive money and PayPal asks you to confirm your identity, with your credit card, they will just pull a $1 or $2, and give it back to you. But in essence, you can't confirm your identity if you can't even give away that $1. It gets all narrowed to alternatives, such as Moneybookers (not that is bad, it's just less mainstream).
That's my point when I say, "probably can't afford"
-
alternative to Tor? Thanks ;D
-
Well, there are free public proxies, but is not advised I just saw in a Blackhat USA 2012 video that is around. Proxies can inject code that could either pwn your browser or leave your cache infected. If you can afford a VPN solution, go for that (check data retention policies, and... it isn't like you can fully trust them anyways).
I don't know if I2P is currently working. Go test drive it, and tell us! :)
-
This is just a social observation but there are many groups and "meet-ups" all around the world where hacking is what the theme is. I don't think in general saying "hacking" is taking as taboo because the philosophy of hacking (the glider) has to do with a form of out-of-the-box creative problem solving, NOT something inherently negative. However, under critical missions of hacking for financial (or other) gain, this would be more important and would then have what I imagine to be similar to another organized "illegal" dynamic social system where anonymity must be maintained technically and socially.
BTW in my experience, proxies and especially tor are very slow. Also I don't think it is wise to go hang out in a random neighborhood or van lol with your laptop. Wifi capabilities are popping up everywhere in metro areas and a lot of them (small businesses) are not secure at all, while other's wont let you use proxies (like tor, even adblock for youtube, or googlesharing).
-
unrelated stuff]
BTW in my experience, proxies and especially tor are very slow. Also I don't think it is wise to go hang out in a random neighborhood or van lol with your laptop. Wifi capabilities are popping up everywhere in metro areas and a lot of them (small businesses) are not secure at all, while other's wont let you use proxies (like tor, even adblock for youtube, or googlesharing).
TOR and public proxies are not proxies(well they are but..). They are SHIT, of course they are slow when either there are 500 other people using it or its on a fuggin island in Australia.
Stop complaining about public proxies and do something about it instead. Like buying your own dedicated one for like 3 bucks a month, or even better get it by other means...
</rant>
-
you can use tor for small shit like irc and messaging but itś really slow for other shit.
-
Tor was cracked by the nsa. Lol
-
Tor was cracked by the nsa. Lol
NSA created Tor bruh,
@OP why worry so much about it? Spend some time learning how to hack something and this shit will become elementary. When you outgrow hacking your own shit, VMs, etc then worry about this. Till then its rather pointles.