Online Test Result

oDesk Certified Windows XP Expert oDesk Certified Firewall Concepts Expert oDesk Certified MS Word 2003 Expert

How to Become Anonymous with all aspect

Today I will tell you with example that how to become anonymous on internet. Read thoroughly and carefully.

So here I'll say my pseudonym is Ex094, your's is Guest.

Being anonymous means using an unknown or unacknowledged identity etc that differs your real ID with your pseudonym. This means that our real identity is hidden, for anonymity on the internet we mean that no one knows about our Location or Identity. To remain anonymous a person must not leave traces about his real Identity. To understand this I have made a simple flow chart:
 
Explanation:


Explanation:

Let me explain this to you, the person John wanted to join a top class black hat forum, for that he used his pseudonym as Lulz0r. John also had 1 Social Network account and also a email account, he used the same email of his Facebook account to link the Black hat forum account. John does not know any thing about anonymity and he connects to the forum directly through the internet without any VPN or Proxy. John also doesn't know that the blackhat forum was monitored and logged by an unknown agency. The agency had the forum database and they came across John's account which was Lulz0r.
From his forum account they got the following information:
Code:
Name: Lulz0r
IP: 192.168.1.1
Email: john@hotmail.com

Now as the agency has his IP, they saw he was not assigning any proxy etc so it made their task easy to track him down via IP. First they scrapped the net for his email and other credentials, came across his Facebook and MSN account.
John's Facebook account contains his complete identity so the agency now knows who he is. They can either track him by his MAC via IP or getting his address (As they have his real name).

So this was an example of poor anonymity instead we shouldn't be even using the word anonymous for him as he had himself compromised from the beginning! John had pseudonymity but he didn't have anonymity. From this example you now know what being anonymous means.

Mistakes:
Now I will point to John's mistakes which led him be compromised.


VPN, Proxy or Shell Tunneling:
As you can see in the image that John was directly accessing the forum through the internet. If he had used a Proxy or a VPN, it would have given him an edge on making the agency tilt on finding him. Using an SHH Tunnel or VPN would make him:



Fake Credentials:
It is also to be noted that John had a Facebook account where he had his complete identity, the agency traced the email he used for the forum and same for the Facebook page, to his account. It is advised that if you are a Hacker and you are making a Facebook or any other account, be sure to make Fake Credentials.


Spoofing MAC Address:
Yes it is true that you can be tracked by your MAC Address, infect MAC Address is used to trace and locate your stolen PC's, Cool eh? :) but not cool for Hackers as it is a very active hazard. You can easily spoof your MAC Address in Windows and Linux.

For Linux: See tutorial HERE
For Windows:  See Tutorial HERE 
Why change MAC, Still confused? Read this article HERE

How To Hack Anonymously:
Now lets forget the example above, you should by now have a basic understanding of anonymity. Now the question is how to remain anonymous while hacking. The solution is a simple one, in my opinion using an RDP for hacking is the best option unless it's a good one. Let me explain it with:


Leave No Traces:
This is the best way to become anonymous while hacking. Hope you enjoy the tutorial.

I you like it then promote it with your friends, newbie’s and those who don’t now what is exact anonymity.


Newer Post Older Post

Leave a Reply

Related Posts Plugin for WordPress, Blogger...

Comments

Eagle Eye Productions. Powered by Blogger.