Show Posts

This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.


Messages - rapture

Pages: [1]
1
Anonymity and Privacy / Re: Guide to Anonymity, Security and Anti-Forensics
« on: February 27, 2013, 10:01:58 am »
No problem, I replied at your guide, very nice and descriptive.

imho, to get anonymity section productive, it should not be circulating in one topic which can be understood with just a single thread.

2
Anonymity and Privacy / Re: [EvilTutorial] The Art of Anonymity
« on: February 27, 2013, 09:58:00 am »
Thanks for this, better guide than mine, which is very generic and a bit useless because of too much linking. I felt bad on mine too, I will try to improve it. plus 1 for you.

3
General discussion / Re: Might be away for a bit.
« on: February 25, 2013, 09:55:40 am »
Good luck dude, that inspired me to struggle for myself more and become better.

4
Anonymity and Privacy / Re: Guide to Anonymity, Security and Anti-Forensics
« on: February 15, 2013, 10:22:03 am »
Post edited, thanks Fur and 0poitr.

5
Anonymity and Privacy / Re: Guide to Anonymity, Security and Anti-Forensics
« on: February 10, 2013, 07:14:30 am »
Thanks again for the nice feedback guys, enjoy my guide :)

good tut. but i must ask, why so windows. linux users would enjoy this too

Sorry, I'm not familiar with Linux much that's why I didn't included it.

6
Anonymity and Privacy / Re: Guide to Anonymity, Security and Anti-Forensics
« on: February 03, 2013, 01:39:39 pm »
Thanks for the kind words guys  ;D, I would post more self-written tutorials when I'm not busy.

@proxx Okay, I guess I would remove the web proxy only, because the proxies are from third-party.

7
Anonymity and Privacy / Guide to Anonymity, Security and Anti-Forensics
« on: February 03, 2013, 01:14:36 pm »
I haven't seen some anonymity tutorials out there except the sticky, so I decided to create an updated guide for newbies out there. I'm not an expert on this field, but I want to share my knowledge to the other members.


Guide to Anonymity, Security and Anti-Forensics


So, you want to be secure and anonymous online, prevent threats and leave no traces? well, this is a comprehensive guide to anonymity and security on your computer and when surfing the internet. Alongside with the other tutorials, this one is effective, and I will try to keep it understandable. Please continue reading and I hope you might find this useful.


Online Anonymity
Hiding online identity and anonymity is essential; because it prevents you from getting traced or tracked down.


Proxies
Proxies are used mainly for security purposes and IP Address, it may be also used to speed up the loading of resources by caching, bypass parental controls and open blocked sites.


Proxy address switcher:
http://www.eliteproxyswitcher.com/EPS_setup.exe


Free working proxy server list (Updated realtime):
http://hidemyass.com/proxy-list/


Web Proxies
Web Proxies are services that provides proxy access using a website, the function is, when you request a webpage, the server will contact the website indirectly and will server the resource to your web browser.


Free Web Proxies:
http://zfreez.com/
http://vtunnel.com/
http://zendproxy.com/
http://4freeproxy.com/
http://boomproxy.com/
http://www.webproxy.ca/
http://webproxy.stealthy.co/
http://kproxy.com/
http://anonymouse.org/


VPNs
VPNs are similar to proxies, it hides your IP address but the advantage is, it encrypts your traffic so that it would not be intercepted by data sniffing tools, it is useful for public wifi hotspots and for home/office use.


Free VPNs:
Spotflux - http://spotflux.com/
HotSpotShield - http://hotspotshield.com/


Paid VPNs:
ExpressVPN - http://expressvpn.com/
HotSpotShield Elite - http://hsselite.com/




User-Agent Switcher
Spoofs and mimics a user-agent to hide the browsers' identification.
Chrome - https://chrome.google.com/webstore/detail/user-agent-switcher-for-c/djflhoibgkdhkhhcedjiklpkjnoahfmg
Firefox - https://addons.mozilla.org/en-US/firefox/addon/user-agent-switcher/


IPFuck/IPFlood
Used for hiding IP address by using multiple proxies simultaneously, which obfuscates the user's IP address.
Chrome - https://chrome.google.com/webstore/detail/ipfuck/bjgmbpodpcgmnpfjmigcckcjfldcicnd
Firefox - https://addons.mozilla.org/en-us/firefox/addon/ipflood/


Security
Getting secured and safe while on the computer is very important, and also the pattern of getting infected is not that pathetic, atleast you can prevent it by following different measures.


Disk Encryption
Disk encryption is a way of encrypting HDD so that the private files won't be breached,
the data won't be readable due to protection; and cannot be decrypted easily without authorization.


TrueCrypt Disk Encryption Software:
http://www.truecrypt.org


Antivirus, AntiMalware, AntiKeyloggers and Firewalls
Antiviruses and Antimalware are a great boon these days, it protects your computer against viruses and other malicious software.


Free Antivirus:
http://avast.com/


Free AntiMalwares:
http://malwarebytes.org/
http://superantispyware.com/


Free Virus Removal Tools:
http://www.softpedia.com/get/Antivirus/Kaspersky-Virus-Removal-Tool.shtml
http://www.bitdefender.com/free-virus-removal/
http://www.microsoft.com/security/pc-security/malware-removal.aspx


Free Antikeylogger:
http://www.aplin.com.au/neos-safekeys-v3...s-v3-works
http://networkintercept.com/vrkeyboard.html


Free Firewall:
http://personalfirewall.comodo.com/
http://www.zonealarm.com/security/en-us/zonealarm-pc-security-free-firewall.htm
Windows Firewall (Windows XP/7 built-in)


Paid AVs and AMs:
http://kaspersky.com/
http://bitdefender.com/

Online Malware-scanning tools:
http://camas.comodo.com/
http://virustotal.com/
https://mwanalysis.org/
http://anubis.iseclab.org/
http://bleepingcomputer.com/startups/
http://malwr.com/
http://minotauranalysis.com/
http://onlinescan.avast.com/
http://www.isthisfilesafe.com/
http://online.us.drweb.com/
http://vxvault.siri-urz.net/ViriList.php


Anti-Forensics
Anti-forensics, is basically a method to make it hard to recover data, secure deletion and system wiping to stay out of privacy and security breaches.


Anti-forensic tools
CCleaner - http://piriform.com/
CCleaner can clear browsing history/cache/cookies, temporary system files, windows log files, DNS cache, IIS log and other files.

BCWipe - http://www.jetico.com/wiping-bcwipe/
BCWipe uses military-grade procedures to remove any traces of file, BCWipe complies with U.S. Department of Defense (DoD 5220.22-M), U.S. Department of Energy (DoE M 205.1-2) and other deletion standards.

BleachBit - http://bleachbit.sourceforge.net/
BleachBit quickly frees disk space and tirelessly guards your privacy. Free cache, delete cookies, clear Internet history, shred temporary files, delete logs, and discard junk you didn't know was there.

Eraser - http://eraser.heidi.ie/
Eraser is an advanced security tool for Windows which allows you to completely remove sensitive data from your hard drive by overwriting it several times with carefully selected patterns.


Windows Anti-Forensics Guide
[1.2 GB, 3hrs and 7 mins] - DL VID | PDF DL
Youtube: http://www.youtube.com/watch?v=YxlSqvIpq5w
More: http://www.irongeek.com/i.php?page=security/windows-forensics-registry-and-file-system-spots

Check your anonymity online
https://panopticlick.eff.org/index.php
http://browserspy.dk/headers.php
http://stayinvisible.com/


Anonymity Tips
1. Do not post private information in the web, including your address, birthdate and contact info, including on your registration details, if the authorities found one, they will use it to track you.
2. Do not engange private activities while on public places, other people might see you.
3. Always use anonymity tools so your IP address is masked, if in case they found it out, the IP is fake.
4. Do not brag or talk about hacking, obviously, if you brag/talk about it with your friends, they might report you to the police.
5. Hide your files in an encrypted container, encrypting data on the USB is better.
6. Always use SSL when its available; it encrypts your details so that it would be safe.
7. Use SSH (Secure Shell) when connecting to a remote system, one good example is PuTTy.
8. A quote of the game "Hitman": "Never trust anyone; and rely on your instincts."
9. Try "proxy chaining", or using of multiple proxies.
10. Use a VPN together with a high-anonymity proxy so that there would be an increased privacy advantage.


If you're caught
1. Do not panic, always be calm. never say anything suspicious when the cops are inspecting your computer.
2. If you store your files in a removable drive, hide and take it away off the scene (make sure they wouldn't see).


Written by: Rapture
Website: http://www.afflictionx.com
Other references: http://www.evilzone.org, https://websiteanalystsresource.wordpress.com/2012/08/19/list-of-tools-and-their-use/, IronGeek, Fur, 0poitr


end-notes:
-If you want to copy this guide, leave the author information below.
-It took me several hours to finish this tutorial, a simple thank you and a feedback would be very appreciated.

Pages: [1]