EvilZone

Hacking and Security => Anonymity and Privacy => : rapture February 03, 2013, 01:14:36 PM

: Guide to Anonymity, Security and Anti-Forensics
: rapture February 03, 2013, 01:14:36 PM
I haven't seen some anonymity tutorials out there except the sticky, so I decided to create an updated guide for newbies out there. I'm not an expert on this field, but I want to share my knowledge to the other members.


Guide to Anonymity, Security and Anti-Forensics


So, you want to be secure and anonymous online, prevent threats and leave no traces? well, this is a comprehensive guide to anonymity and security on your computer and when surfing the internet. Alongside with the other tutorials, this one is effective, and I will try to keep it understandable. Please continue reading and I hope you might find this useful.


Online Anonymity
Hiding online identity and anonymity is essential; because it prevents you from getting traced or tracked down.


Proxies
Proxies are used mainly for security purposes and IP Address, it may be also used to speed up the loading of resources by caching, bypass parental controls and open blocked sites.


Proxy address switcher:
http://www.eliteproxyswitcher.com/EPS_setup.exe


Free working proxy server list (Updated realtime):
http://hidemyass.com/proxy-list/


Web Proxies
Web Proxies are services that provides proxy access using a website, the function is, when you request a webpage, the server will contact the website indirectly and will server the resource to your web browser.


Free Web Proxies:
http://zfreez.com/
http://vtunnel.com/
http://zendproxy.com/
http://4freeproxy.com/
http://boomproxy.com/
http://www.webproxy.ca/
http://webproxy.stealthy.co/
http://kproxy.com/
http://anonymouse.org/


VPNs
VPNs are similar to proxies, it hides your IP address but the advantage is, it encrypts your traffic so that it would not be intercepted by data sniffing tools, it is useful for public wifi hotspots and for home/office use.


Free VPNs:
Spotflux - http://spotflux.com/
HotSpotShield - http://hotspotshield.com/


Paid VPNs:
ExpressVPN - http://expressvpn.com/
HotSpotShield Elite - http://hsselite.com/




User-Agent Switcher
Spoofs and mimics a user-agent to hide the browsers' identification.
Chrome - https://chrome.google.com/webstore/detail/user-agent-switcher-for-c/djflhoibgkdhkhhcedjiklpkjnoahfmg
Firefox - https://addons.mozilla.org/en-US/firefox/addon/user-agent-switcher/


IPFuck/IPFlood
Used for hiding IP address by using multiple proxies simultaneously, which obfuscates the user's IP address.
Chrome - https://chrome.google.com/webstore/detail/ipfuck/bjgmbpodpcgmnpfjmigcckcjfldcicnd
Firefox - https://addons.mozilla.org/en-us/firefox/addon/ipflood/


Security
Getting secured and safe while on the computer is very important, and also the pattern of getting infected is not that pathetic, atleast you can prevent it by following different measures.


Disk Encryption
Disk encryption is a way of encrypting HDD so that the private files won't be breached,
the data won't be readable due to protection; and cannot be decrypted easily without authorization.


TrueCrypt Disk Encryption Software:
http://www.truecrypt.org


Antivirus, AntiMalware, AntiKeyloggers and Firewalls
Antiviruses and Antimalware are a great boon these days, it protects your computer against viruses and other malicious software.


Free Antivirus:
http://avast.com/


Free AntiMalwares:
http://malwarebytes.org/
http://superantispyware.com/


Free Virus Removal Tools:
http://www.softpedia.com/get/Antivirus/Kaspersky-Virus-Removal-Tool.shtml
http://www.bitdefender.com/free-virus-removal/
http://www.microsoft.com/security/pc-security/malware-removal.aspx


Free Antikeylogger:
http://www.aplin.com.au/neos-safekeys-v3...s-v3-works
http://networkintercept.com/vrkeyboard.html


Free Firewall:
http://personalfirewall.comodo.com/
http://www.zonealarm.com/security/en-us/zonealarm-pc-security-free-firewall.htm
Windows Firewall (Windows XP/7 built-in)


Paid AVs and AMs:
http://kaspersky.com/
http://bitdefender.com/

Online Malware-scanning tools:
http://camas.comodo.com/
http://virustotal.com/
https://mwanalysis.org/
http://anubis.iseclab.org/
http://bleepingcomputer.com/startups/
http://malwr.com/
http://minotauranalysis.com/
http://onlinescan.avast.com/
http://www.isthisfilesafe.com/
http://online.us.drweb.com/
http://vxvault.siri-urz.net/ViriList.php


Anti-Forensics
Anti-forensics, is basically a method to make it hard to recover data, secure deletion and system wiping to stay out of privacy and security breaches.


Anti-forensic tools
CCleaner - http://piriform.com/
CCleaner can clear browsing history/cache/cookies, temporary system files, windows log files, DNS cache, IIS log and other files.

BCWipe - http://www.jetico.com/wiping-bcwipe/
BCWipe uses military-grade procedures to remove any traces of file, BCWipe complies with U.S. Department of Defense (DoD 5220.22-M), U.S. Department of Energy (DoE M 205.1-2) and other deletion standards.

BleachBit - http://bleachbit.sourceforge.net/
BleachBit quickly frees disk space and tirelessly guards your privacy. Free cache, delete cookies, clear Internet history, shred temporary files, delete logs, and discard junk you didn't know was there.

Eraser - http://eraser.heidi.ie/
Eraser is an advanced security tool for Windows which allows you to completely remove sensitive data from your hard drive by overwriting it several times with carefully selected patterns.


Windows Anti-Forensics Guide
[1.2 GB, 3hrs and 7 mins] - DL VID (http://www.archive.org/download/Anti-Forensics-One-Big-File/anti-forensics.wmv) | PDF DL (http://www.irongeek.com/downloads/anti-forensics-notacon.pdf)
Youtube: http://www.youtube.com/watch?v=YxlSqvIpq5w
More: http://www.irongeek.com/i.php?page=security/windows-forensics-registry-and-file-system-spots

Check your anonymity online
https://panopticlick.eff.org/index.php
http://browserspy.dk/headers.php
http://stayinvisible.com/


Anonymity Tips
1. Do not post private information in the web, including your address, birthdate and contact info, including on your registration details, if the authorities found one, they will use it to track you.
2. Do not engange private activities while on public places, other people might see you.
3. Always use anonymity tools so your IP address is masked, if in case they found it out, the IP is fake.
4. Do not brag or talk about hacking, obviously, if you brag/talk about it with your friends, they might report you to the police.
5. Hide your files in an encrypted container, encrypting data on the USB is better.
6. Always use SSL when its available; it encrypts your details so that it would be safe.
7. Use SSH (Secure Shell) when connecting to a remote system, one good example is PuTTy.
8. A quote of the game "Hitman": "Never trust anyone; and rely on your instincts."
9. Try "proxy chaining", or using of multiple proxies.
10. Use a VPN together with a high-anonymity proxy so that there would be an increased privacy advantage.


If you're caught
1. Do not panic, always be calm. never say anything suspicious when the cops are inspecting your computer.
2. If you store your files in a removable drive, hide and take it away off the scene (make sure they wouldn't see).


Written by: Rapture
Website: http://www.afflictionx.com
Other references: http://www.evilzone.org, https://websiteanalystsresource.wordpress.com/2012/08/19/list-of-tools-and-their-use/, IronGeek, Fur, 0poitr


end-notes:
-If you want to copy this guide, leave the author information below.
-It took me several hours to finish this tutorial, a simple thank you and a feedback would be very appreciated.
: Re: Guide to Anonymity, Security and Anti-Forensics
: parad0x February 03, 2013, 01:20:40 PM
A very nice tut, must be stickied. I was searching for something like this. Thanks.
And of course, +1.
: Re: Guide to Anonymity, Security and Anti-Forensics
: Silentz February 03, 2013, 01:27:54 PM
Well done mate. Good post.
: Re: Guide to Anonymity, Security and Anti-Forensics
: proxx February 03, 2013, 01:37:40 PM
Nice thread.

Please remove Hidemyass!!
These guys hand over logs without a hazzle!
: Re: Guide to Anonymity, Security and Anti-Forensics
: rapture February 03, 2013, 01:39:39 PM
Thanks for the kind words guys  ;D, I would post more self-written tutorials when I'm not busy.

@proxx Okay, I guess I would remove the web proxy only, because the proxies are from third-party.
: Re: Guide to Anonymity, Security and Anti-Forensics
: rasenove February 03, 2013, 01:50:34 PM
Nice thread.

Please remove Hidemyass!!
These guys hand over logs without a hazzle!

Yeah , they give away our asses to ass fuckers, insted of hiding it.

-It took me several hours to finish this tutorial, a
simple thank you and a feedback would be very
appreciated.

i like the way you
organise your texts, its very nice to see members working hard to serve this forum. And +1
: Re: Guide to Anonymity, Security and Anti-Forensics
: Uriah February 03, 2013, 11:54:42 PM
+1 for a nice, thorough guide. Thank you for the included resources as well. :)
: Re: Guide to Anonymity, Security and Anti-Forensics
: Mike245 February 04, 2013, 02:03:32 AM
Definitely a good guide for anonymity!
: Re: Guide to Anonymity, Security and Anti-Forensics
: kenjoe41 February 04, 2013, 01:46:57 PM
great post mate. am sure though other guys could contribute more to this post so that everything is in one place.

[Q] can someone talk more on securing and obfuscating app data. i mean what the other applications send out to the internet rather than the browser.
: Re: Guide to Anonymity, Security and Anti-Forensics
: jonneburger February 04, 2013, 05:21:45 PM
good tut. but i must ask, why so windows. linux users would enjoy this too
: Re: Guide to Anonymity, Security and Anti-Forensics
: rapture February 10, 2013, 07:14:30 AM
Thanks again for the nice feedback guys, enjoy my guide :)

good tut. but i must ask, why so windows. linux users would enjoy this too

Sorry, I'm not familiar with Linux much that's why I didn't included it.
: Re: Guide to Anonymity, Security and Anti-Forensics
: yize February 11, 2013, 06:11:08 AM
Thanks for the kind words guys  ;D , I would post more self-written tutorials when I'm not busy.

@proxx Okay, I guess I would remove the web proxy only, because the proxies are from third-party.

You wrote this yourself? This very useful for me. Thanks.
: Re: Guide to Anonymity, Security and Anti-Forensics
: fonzi February 11, 2013, 06:20:42 AM
Awesome Tutorial, i just started experimenting with freenet, which is a network of personal nodes that can connect to friends only or the whole network who is usings freenet.
: Re: Guide to Anonymity, Security and Anti-Forensics
: yize February 11, 2013, 06:55:14 AM
I use elite proxy switcher and ipfuck. I check to http://www.stayinvisible.com/ . It show proxy i use as my Ip. but there is two additional IP wich one of them is my real IP and server. Is it save? or i am still not ivisible? I need strong proxy?
Note:If  I don't use ipfuck, it shows my real IP as only one additional IP.
: Re: Guide to Anonymity, Security and Anti-Forensics
: Fur February 11, 2013, 12:04:05 PM
http://www.irongeek.com/i.php?page=security/windows-forensics-registry-and-file-system-spots (http://www.irongeek.com/i.php?page=security/windows-forensics-registry-and-file-system-spots)

Eraser is a brilliant data disposal tool.
http://eraser.heidi.ie/ (http://eraser.heidi.ie/)

BleachBit is so much better than CCleaner.
http://bleachbit.sourceforge.net/ (http://bleachbit.sourceforge.net/)

Some of proxies don't really anonymise (is that a word?) you, some include headers that could contain your real IP or at least inform the site you're using a proxy.
http://stackoverflow.com/questions/5421144/php-get-real-ip-proxy-detection (http://stackoverflow.com/questions/5421144/php-get-real-ip-proxy-detection)


Encryption won't be much help in some countries.
http://en.wikipedia.org/wiki/Key_disclosure_law (http://en.wikipedia.org/wiki/Key_disclosure_law)

Some online AM tools:
 Comodo Analysis  (http://camas.comodo.com)
 VirusTotal  (http://virustotal.com)
 CWSandbox  (https://mwanalysis.org)
 Anubis  (http://anubis.iseclab.org)
 Bleeping Computer Statups  (http://bleepingcomputer.com/startups/)
 Malwr  (http://malwr.com)
 Minotaur Analysis  (http://minotauranalysis.com)
 Avast! Online Scan  (http://onlinescan.avast.com)
 Is This File Safe?  (http://www.isthisfilesafe.com)
 Dr.Web Online Check  (http://online.us.drweb.com/)
 VX Vault  (http://vxvault.siri-urz.net/ViriList.php)
From https://websiteanalystsresource.wordpress.com/2012/08/19/list-of-tools-and-their-use/ (https://websiteanalystsresource.wordpress.com/2012/08/19/list-of-tools-and-their-use/)


I don't trust TrueCrypt.

From Wikipedia:
If relying on TrueCrypt encryption for life and death matters, it is worth noting that TrueCrypt (or any other software) is only as trustworthy as the people writing and reviewing the code. Also, when using distributed binaries instead of compiling from the source code, a user may be running code that was inserted during packaging and that is not available in the open source repository (possible backdoors, etc.). It is challenging to create binaries from source code that match the official binaries for purposes of verifying their integrity due to compiler options, etc.
The developers of TrueCrypt have been only anonymously referred to on the site as “The TrueCrypt Foundation” since 2010,  though there are potentially good reasons related to privacy why they might have chosen to remain thus.
There has been no known comprehensive review of the source code by a qualified cryptographer. Thorough security code review and testing is hard, tedious, and painstaking work, and very few people have the skills to do it. There was, however, a functional evaluation of the deniability of hidden volumes in an earlier version of TrueCrypt by Schneier et al. that found security leaks.
The "TrueCrypt License" is unique and contains distribution and copyright-liability restrictions.
Various other open source projects including Fedora and the Tails live CD have removed or forbidden TrueCrypt from their distributions due to the closed fashion in which development is performed.

Just remember forensics teams aren't stupid, but nor are they Einstein.
: Re: Guide to Anonymity, Security and Anti-Forensics
: 0poitr February 12, 2013, 11:15:43 AM
Thanks. I always looked forward to something like this. A nice guide. +1

The IPFuck plugin is great. As its info page (http://ipfuck.paulds.fr/) hints, three http headers supply host identity information(including ip address). Which are VIA, X-Forwarded-For and Client-IP
There are some more or maybe just aliases of them as I found on the web, but they seem to serve similar purposes.

    HTTP_CLIENT_IP
    HTTP_X_FORWARDED_FOR
    HTTP_X_FORWARDED
    HTTP_X_CLUSTER_CLIENT_IP
    HTTP_FORWARDED_FOR
    HTTP_FORWARDED

I found the specs of VIA here : http://www.w3.org/Protocols/rfc2616/rfc2616-sec14.html (http://www.w3.org/Protocols/rfc2616/rfc2616-sec14.html) (14.45)
and a draft RFC of X-Forwarded-for here : http://tools.ietf.org/html/draft-petersson-forwarded-for-02 (http://tools.ietf.org/html/draft-petersson-forwarded-for-02)
Couldn't find a RFC for client-ip though but a google search reveals some cisco and other manufacturers' documentation on how to modify that header.

So, after a bit of research, my conclusion is X-Forwarded headers are troublesome for anonymity if they are maintained properly throughout the route. Usually, using IPfuck with a medium anonymous proxy (public proxies with high anon are often very slow) should be able to hide the actual client address.

Here, I found some websites that check how much info can be gathered from your browser requests.
Funny thing is, when you use ipfuck with no proxy, whatsmyip.com checks the headers(which is spoofed) for your actual ip and the takes the content of the REMOTE_ADDR header (which has your original address) as the proxy server's ip. Try it. :D
: Re: Guide to Anonymity, Security and Anti-Forensics
: rapture February 15, 2013, 10:22:03 AM
Post edited, thanks Fur and 0poitr.
: Re: Guide to Anonymity, Security and Anti-Forensics
: lucid February 25, 2013, 07:43:58 PM
You know what, no offense to OP but I'm really sick of these generic Anonymity guides. They are all the same.

1. Proxy

2. VPN

3. Tor

4. Encryption

5. Disk Wipe

6. Virus

7. Don't talk about stuff to people

This one and the one that is stickied which I personally think should be unstickied in particular. I think I'm going to write a more comprehensive, less generic one that I want to be stickied. This shit gets annoying.
: Re: Guide to Anonymity, Security and Anti-Forensics
: Stackprotector February 25, 2013, 07:45:03 PM
You know what, no offense to OP but I'm really sick of these generic Anonymity guides. They are all the same.

1. Proxy

2. VPN

3. Tor

4. Encryption

5. Disk Wipe

6. Virus

7. Don't talk about stuff to people

This one and the one that is stickied which I personally think should be unstickied in particular. I think I'm going to write a more comprehensive, less generic one that I want to be stickied. This shit gets annoying.

I am looking forward to that :)
: Re: Guide to Anonymity, Security and Anti-Forensics
: lucid February 25, 2013, 07:46:26 PM
Will you sticky it if I do.....and it's good? I'm going to get started today.
: Re: Guide to Anonymity, Security and Anti-Forensics
: Stackprotector February 25, 2013, 07:48:23 PM
Will you sticky it if I do.....and it's good? I'm going to get started today.
If it's worth sticking :P
: Re: Guide to Anonymity, Security and Anti-Forensics
: lucid February 26, 2013, 01:24:33 AM
If it's worth sticking :P

Well, take at look at it (http://evilzone.org/anonymity/the-art-of-anonymity-9178/) do YOU think it's worth sticking?
: Re: Guide to Anonymity, Security and Anti-Forensics
: rapture February 27, 2013, 10:01:58 AM
No problem, I replied at your guide, very nice and descriptive.

imho, to get anonymity section productive, it should not be circulating in one topic which can be understood with just a single thread.
: Re: Guide to Anonymity, Security and Anti-Forensics
: Averagegenius August 12, 2013, 03:58:34 PM
Thanks a lot! Im new to hacking so this was very useful.
: Re: Guide to Anonymity, Security and Anti-Forensics
: Feyd August 12, 2013, 08:07:17 PM
I think it is worth mentioning that disk encryption is useless if you get raided while the drive is decrypted and if you don't have any special software that unmounts or powers of the disk before the forensics team have done a full copy.
If you store your files in a removable drive, hide and take it away off the scene (make sure they wouldn't see).
I guess you can call this an attempt to solve the problem I mentioned but seriously, don't expect the police to be THAT incompetent.
: Re: Guide to Anonymity, Security and Anti-Forensics
: proxx August 12, 2013, 08:29:50 PM
I think it is worth mentioning that disk encryption is useless if you get raided while the drive is decrypted and if you don't have any special software that unmounts or powers of the disk before the forensics team have done a full copy. I guess you can call this an attempt to solve the problem I mentioned but seriously, don't expect the police to be THAT incompetent.

Thats an interesting concept.
Making the disk useless upon 'cracking' gonna think about that for a little.
: Re: Guide to Anonymity, Security and Anti-Forensics
: Feyd August 12, 2013, 10:17:11 PM
Thats an interesting concept.
Making the disk useless upon 'cracking' gonna think about that for a little.
If a forensics team uncovers an encrypted hdd they will make a raw copy first thing. They won't start cracking away trying to break the encryption. With a decent algorithm and a sufficently good password this won't matter much however.
If it is found decrypted they will ofc also make a copy in which case you are screwed if you don't manage to power of or unmount the drive.
: Re: Guide to Anonymity, Security and Anti-Forensics
: proxx August 12, 2013, 10:23:29 PM
If a forensics team uncovers an encrypted hdd they will make a raw copy first thing. They won't start cracking away trying to break the encryption. With a decent algorithm and a sufficently good password this won't matter much however.
If it is found decrypted they will ofc also make a copy in which case you are screwed if you don't manage to power of or unmount the drive.


Yes exactly.
Use being screwed in your advantage.
They have to read from the disk to copy it.
There is the entry point, HDD's have firware , memory and ARM cores these days.
: Re: Guide to Anonymity, Security and Anti-Forensics
: Feyd August 12, 2013, 10:45:14 PM
Yes exactly.
Use being screwed in your advantage.
They have to read from the disk to copy it.
There is the entry point, HDD's have firware , memory and ARM cores these days.
That true. I've long thought about how to do such a dismount or whatever but never bothered to try to implement it. Would be a an interesting thing to look into.
In Truecrypt there is also the option to create a special partition (or whatever it is) that you can decrypt with a second password to provide you with plausible deniability in case you get forced to hand over your key.
: Re: Guide to Anonymity, Security and Anti-Forensics
: lucid August 13, 2013, 05:09:20 AM
In Truecrypt there is also the option to create a special partition (or whatever it is) that you can decrypt with a second password to provide you with plausible deniability in case you get forced to hand over your key.

You are thinking of the Hidden Volume option. Basically, you create a volume which has two passwords. One password opens up the volume in which you put a bunch of crap that wouldn't actually get you into any trouble, and the other password would open up the volume that has all your kiddy porn on it. LE wouldn't be able to tell that there is a hidden volume because the free space of any volume is filled with random data. The hidden volume would look just like this.
: Re: Guide to Anonymity, Security and Anti-Forensics
: EnderM5 August 13, 2013, 10:13:40 AM
I gave you a cookie. :D