Linux Short Anonymity Guide.
SSH TUNNELING.
First things first set up a ssh tunnel.
And encryption.
Command: sudo ssh-keygen -b 1024
Command: sudo ssh -D <port> <host>@127.0.0.1
Now you need to install vidalia and change the socksv4 proxy to 127.0.0.1.
and use the port that you used for the ssh tunnel above.
Now you need to open your browser preferably firefox, And type in the URL.
about:config.
Search dns.
And allow all.
Mac Chains And Proxychains
First things first.
Install macchanger: sudo apt-get install macchanger
Install Proxychains: sudo apt-get install proxychains
Run this command to randomize your mac address.
sudo macchanger -A -r -b <interface>
Next when scanning and exploiting sites.
Use proxychains.
Examples
proxychains nmap -sSV 0.0.0.0 -O -Pn --packet-trace
proxychains python2 sqlmap.py -u
http://test.com/cat.php?id=1 --dbs
proxychains nikto -h <host>
proxychains ping <host>
Tracing Cookies
There are some cookies that track your everyday browses.
The cookie will contain your ID number and be able to track you.
I recommend installing HTTPS anywhere.
And browsing cookies and also settings that track you.
TOR network
Now you all know about tor its pretty obvious.
Make sure you configured your vidalia with your ssh to tunnel threw
tor using 1024 bit encryption.
Allways Allways switch to TOR using proxyselector when visiting
A target site.
A victims page.
Or general browsing to remain secure.
I recommend using no script too.
Encrypting Disk And Wiping Data
Now some unix/linux distrobutions have a encryption option on install
i recommend doing so or using true crypt using sha256 encryption.
Fully encrypt your disks. use a high bit.
Allways keep a usb and cd spare
Keep the linux you are using on the disk
and keep files on the usb
wipe your harddrive and reinstall linux every 4 to 5 weeks and save
important files scans on the usb.
Then format the usb once the files are on your computer.
Final Notes
This is my first guide on here im sorry about the low quality.
Few more things to keep note there is also alot more stuff that i have missed out on
such as i2p networks, hotspots, Vpn software, vps servers, wifi, sockets, and more
Thanks for reading hope this helps out.