Author Topic: The Art of Anonymity  (Read 90436 times)

0 Members and 2 Guests are viewing this topic.

Offline lucid

  • #Underground
  • Titan
  • **
  • Posts: 2683
  • Cookies: 243
  • psychonaut
    • View Profile
Re: [EvilTutorial] The Art of Anonymity
« Reply #45 on: July 12, 2013, 07:37:13 pm »
Gee i dunno.. maybe i tried that -.-... it doesnt work.

How do you connect to the internet?
"Hacking is at least as much about ideas as about computers and technology. We use our skills to open doors that should never have been shut. We open these doors not only for our own benefit but for the benefit of others, too." - Brian the Hacker

Quote
15:04  @Phage : I'm bored of Python

Offline Truth

  • /dev/null
  • *
  • Posts: 8
  • Cookies: -1
    • View Profile
Re: [EvilTutorial] The Art of Anonymity
« Reply #46 on: July 18, 2013, 09:40:38 pm »
I connect using the wireless lan card... I cant get past the rooter.
I am Truth. Your lies will spill and the Truth will be revealed.

Offline lucid

  • #Underground
  • Titan
  • **
  • Posts: 2683
  • Cookies: 243
  • psychonaut
    • View Profile
Re: [EvilTutorial] The Art of Anonymity
« Reply #47 on: July 19, 2013, 12:32:53 am »
Uh...yeah. I'm sure you use your NIC to connect to the network. What I mean is do you use Network Manager, Wicd, manual connection... After you spoof your mac and bring up the interface, perhaps try to reissue dhcp to assign a new local IP. Since the network issues unique IP addresses based on unique MAC addresses, and since you just spoofed your unique MAC, you'll probably need to get a new IP since your new MAC hasn't been authenticated yet.
« Last Edit: July 19, 2013, 01:26:53 am by lucid »
"Hacking is at least as much about ideas as about computers and technology. We use our skills to open doors that should never have been shut. We open these doors not only for our own benefit but for the benefit of others, too." - Brian the Hacker

Quote
15:04  @Phage : I'm bored of Python

Offline fox12345

  • Serf
  • *
  • Posts: 25
  • Cookies: -31
    • View Profile
Re: [EvilTutorial] The Art of Anonymity
« Reply #48 on: September 07, 2013, 05:41:28 pm »
 8) thanks my dear friend, it is really help full to my knowledge. so i have some problems with some anonymity topics.


# spoof the TTL values
how to spoof TTl values via backtrack? what are the best method to spoof the TTL values? I have no idea about that..


# HTTP header
how to edit HTTP header? are you talking about that? i have no idea....please give me some helpful information to hide my ID.


# MAC Address
are you think The Live USB OS is really spoof the our MAC? I think it is using the some encryption option and transport with our spoof MAC. but this is only my mind. it correct or wrong? "with Using wireshark
# Tor
why are you refuse to talk about Tor? it is not a secure browser?


please reply me.......
[size=78%] [/size]

Offline vezzy

  • Royal Highness
  • ****
  • Posts: 771
  • Cookies: 172
    • View Profile
Re: [EvilTutorial] The Art of Anonymity
« Reply #49 on: September 07, 2013, 07:23:05 pm »
# Tor
why are you refuse to talk about Tor? it is not a secure browser?

The feds fund 60% of its budget, it originated as DARPA technology, the exit nodes are best assumed as compromised, most Tor users use 1024-bit RSA/DH keys that the NSA can feasibly crack, the FBI recently made headlines for using a JavaScript exploit to infiltrate onion services, some protocols and poor browser configurations inadvertently leak information and so on.

It's pretty much time to leave Tor behind. While it may be useful for private casual browsing, anything more serious than that and you'll be sorry.
Quote from: Dippy hippy
Just brushing though. I will be semi active mainly came to find a HQ botnet, like THOR or just any p2p botnet

Offline lucid

  • #Underground
  • Titan
  • **
  • Posts: 2683
  • Cookies: 243
  • psychonaut
    • View Profile
Re: [EvilTutorial] The Art of Anonymity
« Reply #50 on: September 08, 2013, 07:52:11 am »
# MAC Address
are you think The Live USB OS is really spoof the our MAC? I think it is using the some encryption option and transport with our spoof MAC. but this is only my mind. it correct or wrong? "with Using wireshark

I would explain this to you but I have no idea what the fuck you are talking about. Please use clearer english or Google translate and I'll try to help you out with this.

For the HTTP Headers you could always get an add-on.
« Last Edit: September 08, 2013, 07:52:24 am by lucid »
"Hacking is at least as much about ideas as about computers and technology. We use our skills to open doors that should never have been shut. We open these doors not only for our own benefit but for the benefit of others, too." - Brian the Hacker

Quote
15:04  @Phage : I'm bored of Python

Offline lucid

  • #Underground
  • Titan
  • **
  • Posts: 2683
  • Cookies: 243
  • psychonaut
    • View Profile
Re: [EvilTutorial] The Art of Anonymity
« Reply #51 on: September 12, 2013, 04:52:34 am »
Lol you're going to need ten posts to give me that +1 sir. Thanks for the feeback I appreciate it.
"Hacking is at least as much about ideas as about computers and technology. We use our skills to open doors that should never have been shut. We open these doors not only for our own benefit but for the benefit of others, too." - Brian the Hacker

Quote
15:04  @Phage : I'm bored of Python

Offline SomeKid

  • NULL
  • Posts: 1
  • Cookies: -1
    • View Profile
-
« Reply #52 on: September 20, 2013, 02:06:49 am »
Thanks for the tutorial, quite informative for a nooblet.
....................../´¯/)
....................,/¯../    I couldn't be more jealous of
.................../..../         a skill set than that of
............./´¯/'...'/´¯¯`·¸     hacking.
........../'/.../..../......./¨¯\
........('(...´...´.... ¯~/'...')
.........\.................'...../
..........''...\.......... _.·´
............\..............(
..............\.............\...

Offline Architect

  • Sir
  • ***
  • Posts: 428
  • Cookies: 56
  • STFU
    • View Profile
    • Rootd IRC
Re: [EvilTutorial] The Art of Anonymity
« Reply #53 on: October 16, 2013, 05:28:36 am »
Very informative from a security standpoint, +1

Offline JohnnyFeelgood

  • Serf
  • *
  • Posts: 22
  • Cookies: 3
    • View Profile
Re: [EvilTutorial] The Art of Anonymity
« Reply #54 on: November 01, 2013, 01:11:35 pm »
Hmmm, nice and all that. But I was thinking slightly different.
If Google(NSA) has 100 people indexed. And they offer via via via TOR as super secret privacy alternative. After some time x number of people disappeared from Google, due too using TOR.
 
Who would be more prone for inspection by NSA? 
 
So, my "How to keep private" suggestion would be a scenario like this:
Get generic laptop, using default installation and keep it like mister avarage. Perhaps even get some infections, be a general computer user.
 
Get a USB and use that for your portable internet browser from within hidden truecrypt storage. And yes I would also use TOR just to prevent those snooping locals.
 
Now look for open hotspot. Start your laptop for some basic browsing using the default browser. You need some alibi anyway. Now, also plugin your USB and start using the portable webbrowser or other tools you might need.
 
Afterwards, remove the USB. Although by using hidden truecrypt storage even the USB can be in plain sight.


Offline lucid

  • #Underground
  • Titan
  • **
  • Posts: 2683
  • Cookies: 243
  • psychonaut
    • View Profile
Re: [EvilTutorial] The Art of Anonymity
« Reply #55 on: November 03, 2013, 05:25:57 am »
I don't think anonymity in regards to the NSA really works like that..

And yes I would also use TOR just to prevent those snooping locals.

NO. Saying you would use Tor in order to prevent snooping is like saying you would take tequila shots and eat nothing but soup in order to prevent diarrhea.

It's better for everyone if we get used to the idea that Tor is pretty much useless for anything requiring any sort of real anonymity.

On the other hand though, you have a good idea about browsing and whatnot from a flashdrive. I did cover that in the tutorial..
"Hacking is at least as much about ideas as about computers and technology. We use our skills to open doors that should never have been shut. We open these doors not only for our own benefit but for the benefit of others, too." - Brian the Hacker

Quote
15:04  @Phage : I'm bored of Python

Offline GoldDust

  • /dev/null
  • *
  • Posts: 17
  • Cookies: 0
    • View Profile
Re: [EvilTutorial] The Art of Anonymity
« Reply #56 on: November 15, 2013, 09:57:35 am »
Great tutorial, Lucid. Thanks for the post. I know I should search, but would anyone be interested in an I2P tutorial?

-GD

Offline RedBullAddicted

  • VIP
  • Sir
  • *
  • Posts: 519
  • Cookies: 189
    • View Profile
Re: [EvilTutorial] The Art of Anonymity
« Reply #57 on: November 15, 2013, 01:16:21 pm »
Hi GoldDust,

I will give you the same reply I got when I started :) No one will beg for a tutorial. If you think you have something to share just do it. I am pretty sure ppl. will like it. So just go ahead and write whats on your mind.

Cheers,
RBA
Deep into that darkness peering, long I stood there, wondering, fearing, doubting, dreaming dreams no mortal ever dared to dream before. - Edgar Allan Poe

Offline Heisenburg

  • Serf
  • *
  • Posts: 32
  • Cookies: 4
    • View Profile
Re: [EvilTutorial] The Art of Anonymity
« Reply #58 on: November 21, 2013, 01:43:03 pm »
 8)  Enjoyed~
Me used to write a script that randomize the MAC address of network interface.


But this is way more informative and detailed. Great tutorial.


Offline lucid

  • #Underground
  • Titan
  • **
  • Posts: 2683
  • Cookies: 243
  • psychonaut
    • View Profile
Re: [EvilTutorial] The Art of Anonymity
« Reply #59 on: November 21, 2013, 08:31:09 pm »
8)  Enjoyed~
Me used to write a script that randomize the MAC address of network interface.
Glad you got something out of it.  I had created a script awhile back which randomized MAC on startup before DHCP, effectively making it look as though a different client is requesting an IP everytime I connected to said network. Eventually, my router stopped giving me new IP addresses..... lmao.

Which is how I learned about DHCP starvation as an avenue for MITM.
« Last Edit: November 21, 2013, 08:31:56 pm by lucid »
"Hacking is at least as much about ideas as about computers and technology. We use our skills to open doors that should never have been shut. We open these doors not only for our own benefit but for the benefit of others, too." - Brian the Hacker

Quote
15:04  @Phage : I'm bored of Python