Author Topic: "Cleaning Up"  (Read 3548 times)

0 Members and 4 Guests are viewing this topic.

Offline MapleThread

  • NULL
  • Posts: 1
  • Cookies: 0
    • View Profile
"Cleaning Up"
« on: July 11, 2012, 06:35:37 am »
I've been reading lots of anonymity posts, and it seems like although chaining proxies, using VPNs, and utilizing SSH Tunnels may help your maintain anonymity, there may be a small chance that someone can trace you.

My question is, how do you "clean up" after you've done an attack? Or just simply done something that can connect you with hacking and therefore possibly be used against you?

Cheers.

Offline Kulverstukas

  • Administrator
  • Zeus
  • *
  • Posts: 6627
  • Cookies: 542
  • Fascist dictator
    • View Profile
    • My blog
Re: "Cleaning Up"
« Reply #1 on: July 11, 2012, 08:23:59 am »
You simply erase, or better yet change, log files.

Offline NeX

  • Peasant
  • *
  • Posts: 74
  • Cookies: 5
    • View Profile
Re: "Cleaning Up"
« Reply #2 on: July 11, 2012, 10:50:11 am »
You simply erase, or better yet change, log files.

And what about remote logging? XD

Offline Kulverstukas

  • Administrator
  • Zeus
  • *
  • Posts: 6627
  • Cookies: 542
  • Fascist dictator
    • View Profile
    • My blog
Re: "Cleaning Up"
« Reply #3 on: July 11, 2012, 01:41:38 pm »
And what about remote logging? XD
Then you're fucked :D

Offline frog

  • Knight
  • **
  • Posts: 232
  • Cookies: 16
    • View Profile
Re: "Cleaning Up"
« Reply #4 on: July 11, 2012, 01:46:51 pm »
Consider this. SSH and proxychains with at least a 10-host proxy list(hand-picked of course). Once you have root-access on the boxes we are going to proxy through we can treat the admin as if he were a mushroom(feed shit and keep in the dark). Most of his logging tools will most likely be scripts that rely on unix commands that can be modified and/or tricked by some kernel-level code(theoretically). If you already have a good root-kit ready, you can load that bitch instantaneously and he could be wandering in the dark forever.

Offline 963.

  • NULL
  • Posts: 1
  • Cookies: -1
    • View Profile
Re: "Cleaning Up"
« Reply #5 on: July 20, 2012, 09:12:07 pm »
After I "attack" a computer I install a simple virus made with (dont hate) notepad. Erases the entire HDD including System32 folder. Thus, there would be nothing to link back to you, and even if they could link it back to you, the computer will never boot again without installing a new HDD. At every angle, they fail.
There are a lot of things you can do that start with, "@echo off".

Offline ande

  • Owner
  • Titan
  • *
  • Posts: 2664
  • Cookies: 256
    • View Profile
Re: "Cleaning Up"
« Reply #6 on: July 20, 2012, 09:32:04 pm »
After I "attack" a computer I install a simple virus made with (dont hate) notepad. Erases the entire HDD including System32 folder. Thus, there would be nothing to link back to you, and even if they could link it back to you, the computer will never boot again without installing a new HDD. At every angle, they fail.

Okay...

First of all. You dont make shit in notepad, you write it in the language Batch (for windows systems). It dosent matter what editor you use.

Further more, nobody uses windows for servers, those who do are retards and should be left alone for their incompetence.

Lastly, RM'ing a hard drive does nothing good... You can recover deleted files easely as shit and you can be damn sure an administrator will if you fucking screw up everything by corrupting the machine's system.

Stealth is the key. If a burglar robs a bank he dosent leave broken windows and bullets flying if he dosent have to.
if($statement) { unless(!$statement) { // Very sure } }
https://evilzone.org/?hack=true

Offline Homi

  • NULL
  • Posts: 2
  • Cookies: 0
    • View Profile
Re: "Cleaning Up"
« Reply #7 on: July 22, 2012, 07:45:36 am »
Quote
Stealth is the key. If a burglar robs a bank he dosent leave broken windows and bullets flying if he dosent have to.
well said brother..

Offline p@nd@

  • /dev/null
  • *
  • Posts: 16
  • Cookies: 0
    • View Profile
Re: "Cleaning Up"
« Reply #8 on: July 23, 2012, 03:42:39 pm »
After I "attack" a computer I install a simple virus made with (dont hate) notepad. Erases the entire HDD including System32 folder. Thus, there would be nothing to link back to you, and even if they could link it back to you, the computer will never boot again without installing a new HDD. At every angle, they fail.


Wow. That  was either the best troll post I have ever read or something beyond my comprehension. I do not even know where to begin but I think Ande pretty much took care of what anyone if anyone was going to say something about this post.

Offline EmilKXZ

  • Peasant
  • *
  • Posts: 109
  • Cookies: 10
  • likes monies :p
    • View Profile
    • EmilKXZ
Re: "Cleaning Up"
« Reply #9 on: July 24, 2012, 11:57:49 pm »
Remember, aside cleaning up logs, you can still be traced if you "always do the same".

When you are supposed to be stealth, you're supposed also to not be fingerprinted. A new attack will always require a new and innovative technique. Want to reuse code? For sure, just make sure you update it, let's say, optimize it more, or tweak it a bit. At least that way it will be treated as a single event, it won't be chained with others. Unless of course you're attacking an array of hosts by a single reason, that would be your loose tie.

Beware of anything that is "the same" always.