EvilZone
Hacking and Security => Anonymity and Privacy => : MapleThread July 11, 2012, 06:35:37 AM
-
I've been reading lots of anonymity posts, and it seems like although chaining proxies, using VPNs, and utilizing SSH Tunnels may help your maintain anonymity, there may be a small chance that someone can trace you.
My question is, how do you "clean up" after you've done an attack? Or just simply done something that can connect you with hacking and therefore possibly be used against you?
Cheers.
-
You simply erase, or better yet change, log files.
-
You simply erase, or better yet change, log files.
And what about remote logging? XD
-
And what about remote logging? XD
Then you're fucked :D
-
Consider this. SSH and proxychains with at least a 10-host proxy list(hand-picked of course). Once you have root-access on the boxes we are going to proxy through we can treat the admin as if he were a mushroom(feed shit and keep in the dark). Most of his logging tools will most likely be scripts that rely on unix commands that can be modified and/or tricked by some kernel-level code(theoretically). If you already have a good root-kit ready, you can load that bitch instantaneously and he could be wandering in the dark forever.
-
After I "attack" a computer I install a simple virus made with (dont hate) notepad. Erases the entire HDD including System32 folder. Thus, there would be nothing to link back to you, and even if they could link it back to you, the computer will never boot again without installing a new HDD. At every angle, they fail.
-
After I "attack" a computer I install a simple virus made with (dont hate) notepad. Erases the entire HDD including System32 folder. Thus, there would be nothing to link back to you, and even if they could link it back to you, the computer will never boot again without installing a new HDD. At every angle, they fail.
Okay...
First of all. You dont make shit in notepad, you write it in the language Batch (for windows systems). It dosent matter what editor you use.
Further more, nobody uses windows for servers, those who do are retards and should be left alone for their incompetence.
Lastly, RM'ing a hard drive does nothing good... You can recover deleted files easely as shit and you can be damn sure an administrator will if you fucking screw up everything by corrupting the machine's system.
Stealth is the key. If a burglar robs a bank he dosent leave broken windows and bullets flying if he dosent have to.
-
Stealth is the key. If a burglar robs a bank he dosent leave broken windows and bullets flying if he dosent have to.
well said brother..
-
After I "attack" a computer I install a simple virus made with (dont hate) notepad. Erases the entire HDD including System32 folder. Thus, there would be nothing to link back to you, and even if they could link it back to you, the computer will never boot again without installing a new HDD. At every angle, they fail.
Wow. That was either the best troll post I have ever read or something beyond my comprehension. I do not even know where to begin but I think Ande pretty much took care of what anyone if anyone was going to say something about this post.
-
Remember, aside cleaning up logs, you can still be traced if you "always do the same".
When you are supposed to be stealth, you're supposed also to not be fingerprinted. A new attack will always require a new and innovative technique. Want to reuse code? For sure, just make sure you update it, let's say, optimize it more, or tweak it a bit. At least that way it will be treated as a single event, it won't be chained with others. Unless of course you're attacking an array of hosts by a single reason, that would be your loose tie.
Beware of anything that is "the same" always.