Advertisement
Gh0ster

How To: VPN

Dec 15th, 2014
35,342
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 5.71 KB | None | 0 0
  1. ________.__ _______ __
  2. / _____/| |__ \ _ \ _______/ |_ ___________
  3. / \ ___| | \/ /_\ \ / ___/\ __\/ __ \_ __ \
  4. \ \_\ \ Y \ \_/ \\___ \ | | \ ___/| | \/
  5. \______ /___| /\_____ /____ > |__| \___ >__|
  6. \/ \/ \/ \/ \/
  7.  
  8. The Hackers Guide to VPNs
  9. =========================
  10.  
  11.  
  12. =========================
  13. /Notes Before Reading
  14. =========================
  15. -> NEVER use a free VPN!! If you don't have to pay for a product, you are the product being sold.
  16. -> NEVER use your own or anyone of your family/friends credit cards when buying a VPN.
  17. -> ALWAYS use a prepaid credit card and ALWAYS pay in cash.
  18. -> NEVER enter any information that can identify you when filling in account information.
  19. -> ALWAYS read the Privacy Policy and Terms of Service when deciding VPN providers.
  20.  
  21.  
  22. =========================
  23. /What is a VPN?
  24. =========================
  25. -> A Virtual Private Network [VPN] is a connection from your computer to another network. Some of you may be familiar with these type of connections as they are widely used by businesses to handle their internal communications needs and to allow employees to access systems from remote locations. Setup properly, they can also be used by anyone to create a safer connection to the internet and have the added benefit of disguising your true location. It encrypts your internet connection. So you can surf the web securely with no restrictions. It will allow you to visit websites that your ISP or government has blocked. You can also change your IP whenever you please by switching servers.
  26.  
  27.  
  28. =========================
  29. /Encryption Protocols:
  30. =========================
  31. -> PPTP:
  32. Point-to-Point Tunneling Protocol was created by Micro$oft and was designed for creating VPNs over dial-up networks. PPTP is a VPN protocol only, it relies on other methods of security [Like MS-CHAPv2]. PPTP mostly uses 128bit encryption keys, thus meaning its garbage, even Micro$oft has stopped support for it. DO NOT USE.
  33.  
  34. -> L2TP/IPSec:
  35. Layer 2 Tunnel Protocol is a VPN protocol only, so on its own it does not provide encryption. It is usually used with the IPSec encryption protocol to provide security. L2TP/IPSec is built in to pretty much all modern operating systems and other devices that support VPNs. L2TP uses UDP port 500, which is more easily blocked by NAT firewalls and may need to port forwarded.
  36.  
  37. -> OpenVPN:
  38. OpenVPN is a fairly new open source technology that uses the OpenSSL library and SSLv3/TLSv1 protocols to provide a strong and reliable VPN. It is highly configurable, and although it runs best on a UDP port, it can be set to run on any port, including TCP port 443. This makes it traffic on it impossible to tell apart from traffic using standard HHTP over SSL, and it is therefore extremely difficult to block. OpenVPN is that the OpenSSL library used to provide encryption supports a number of cryptographic algorithms [AES, Blowfish, 3DES, CAST-128, Camellia and more] with most common algorithms seen in use by VPN providers being AES and Blowfish. AES is the newer technology, and although both are considered secure, the fact that it has a 128-bit block size rather than Blowfish’s 64-bit block size means that it can handle larger [Over 1GB] files better. The differences are however pretty minor. How fast OpenVPN performs depends on the level of encryption used, but it is faster than IPsec. OpenVPN has become the default VPN connection type, and while natively supported by no platform, is widely supported on most through third party software. Since it is so flexible, it can be very tedious to setup.
  39.  
  40. -> SSTP:
  41. Secure Socket Tunneling Protocol was introduced by Micro$oft in Vista SP1, and although it is now available for Linux, RouterOS and SEIL, it is still largely a Windows only platform. SSTP uses SSLv3 and therefore offers similar advantages to OpenVPN [such as the ability to use to TCP port 443 to avoid NAT firewall issues] and because it is integrated into Windows may be easier to use and more stable.
  42.  
  43.  
  44. =========================
  45. /How to Purchase a VPN
  46. =========================
  47. -> NEVER use your own or anyone of your family/friends credit cards, because they can be backtraced to you. It is highly recommended that you buy a prepaid Mastercard [Or Visa, but it is NOT recommended] from a 7-11 or a gas station. ALWAYS pay for this prepaid CC with CASH and cash only! Using any other methods of payment such as Interact or CC will completely compromise your identity. When activating the prepaid CC online, it is highly recommended that you use a fake name and address. Go to http://www.fakenamegenerator.com/ and use a random name and address [Remember to write down the ZIP/Postal code you used, as you may need it in the future]. When you are on the VPN providers website and you are creating your account, use a throwaway email address that is with any email provider [Hotmail, GMail, Yahoo, ect]. Use http://www.fakenamegenerator.com/ again to fill in random information for the throwaway and in the VPN providers website.
  48.  
  49.  
  50. =========================
  51. /Secure VPN Providers
  52. =========================
  53. -> ALWAYS read the Privacy Policy and Terms of Service when deciding VPN providers!
  54.  
  55.  
  56. IP Vanish: https://www.ipvanish.com/?a_aid=start
  57.  
  58. VikingVPN: https://vikingvpn.com/
  59.  
  60. IVPN: https://www.ivpn.net/
  61.  
  62. AirVPN: https://airvpn.org/
  63.  
  64. Boxpn: https://boxpn.com/
  65.  
  66. Mullvad: https://mullvad.net/en/
  67.  
  68. PRQ: http://www.prq.se/?p=tunnel&intl=1
  69.  
  70. BlackVPN: https://www.blackvpn.com/
  71.  
  72. BolehVPN: http://bolehvpn.net/
  73.  
  74. NordVPN: https://nordvpn.com/
  75.  
  76. =========================
  77.  
  78. .-.
  79. ( " )
  80. /\_.' '._/\
  81. | |
  82. \ /
  83. \ /`
  84. .(__) /
  85. `.__.' @Gh0sterSec
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement