1
Anonymity and Privacy / Re: How to stay Anonymous when Hacking ?
« on: May 27, 2012, 09:17:22 am »
Are you talking about simply anonymizing your IP?
Or when you say fear of being "traced", does that include people who may have access to your HD?
Assuming the former, you have:
1) VPN
2) Route through hacked system
3) Find anonymous proxy that's not blocked
4) You can possibly spoof packets depending on what you're trying to do, but if you are trying to access a website (Hence TCP), this won't work.
5) Get a free/paid shell and route through that.
Also, with TOR, people typically only block the exit nodes. It might be worth a try to set up TOR to use a relay node as your exit node, and see if you are still blocked. I don't remember the specifics of this, but I've seen that it's possible via TOR config.
You may also want to take a look at chaining one or multiple methods/systems, depending on the situation.
Or when you say fear of being "traced", does that include people who may have access to your HD?
Assuming the former, you have:
1) VPN
2) Route through hacked system
3) Find anonymous proxy that's not blocked
4) You can possibly spoof packets depending on what you're trying to do, but if you are trying to access a website (Hence TCP), this won't work.
5) Get a free/paid shell and route through that.
Also, with TOR, people typically only block the exit nodes. It might be worth a try to set up TOR to use a relay node as your exit node, and see if you are still blocked. I don't remember the specifics of this, but I've seen that it's possible via TOR config.
You may also want to take a look at chaining one or multiple methods/systems, depending on the situation.