Dear,
I know how to use backtrack and some anonymity method. But I want some advanced Hidden method.
why?
"The question is about how actually are hackers getting traced back and after getting jail for the 'operation'. I know that in the bigger plan it's simple, You'll read out the attackers IP from the logs and police will track it down. I'd like to know how the process actually works. Probably the attacker has an protection to keep himself safe & he starts the attack. He'll take down the target and then the good guys are coming after him. To track him down they have to get the real IP of the attacker, let's assume that the attacker used a VPN + TOR browser. I don't see how can they get the real IP if the attacker used a paid VPN and a TOR browser. Of course a big government would simply get the information with few moves"
How can forensics guys identify the real IP behind the VPN, TOR or a simple proxy?
I think we are mistake some advanced anonymity options. So i want to learn it....I want to need the all anonymity method. please help me.......
Education Only......