Advertisement
SLaychickentheroozte

Stay Anonomous

Oct 17th, 2016
8,003
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 16.18 KB | None | 0 0
  1. educational purposes only
  2.  
  3. This tutorial is about two types of protection.
  4.  
  5. Online Protection
  6. Offline Protection
  7.  
  8.  
  9.  
  10. First, we should get some offline protection. There are many ways on protecting ourselves. Remember, you should always have offline protection before hacking.
  11.  
  12. Pro Tip : Never trust anyone on the Internet. There are a lot of bots and individuals that add us on IM services for the sole purpose of infecting us.
  13.  
  14.  
  15. Offline Protection
  16.  
  17. Note : In this part, offline protection refers to protecting your computer from viruses, Trojans, root kits, etc. It may also refer to encryption, such as File Encryption, OS protection, and such. It is very important to protect your files because we can't always trust the ways of Online Anonymity. If it goes wrong, our offline protection should save us. Trojans and viruses remain a great challenge to our Anonymity. There are always Trojans around and if we get infected, the attacker may use our machine as a proxy, and has full control on our machines.
  18.  
  19.  
  20. Protect yourself from Malware
  21.  
  22. Malwarebytes' Anti-Malware
  23.  
  24. Malwarebytes' Anti-Malware (MBAM) is a computer application that finds and removes malware. Made by Malwarebytes Corporation
  25.  
  26. More and download
  27.  
  28.  
  29. Encrypt your Keystrokes using KeyScrambler
  30.  
  31. KeyScrambler
  32.  
  33. KeyScrambler is an anti-keylogging program designed specifically to strengthen your PC security.
  34.  
  35. More and download
  36.  
  37.  
  38. Get a Firewall
  39.  
  40. COMODO firewall
  41.  
  42. It is always recommended to use a Firewall when doing hacking. I recommend Comodo Firewall. COMODO firewall is Award-Winning personal firewall software on Internet.
  43.  
  44. Download here
  45.  
  46.  
  47. Protect your files and OS using True Crypt.
  48.  
  49. TrueCrypt
  50.  
  51. TrueCrypt is a free open-source disk encryption software for Windows 7/Vista/XP, Mac OS X, and Linux.
  52.  
  53. Source and more: http://www.truecrypt.org/
  54.  
  55. Download here
  56.  
  57.  
  58. Use Virtual Machines for hacking (VMWare Player)
  59.  
  60. VMWare Player
  61.  
  62. It is always a good idea on hacking from a VM (Virtual Machine) because if anything goes wrong just delete it using a good file eraser.
  63.  
  64. Source and more : https://www.vmware.com/products/desktop_...rview.html
  65.  
  66. Download Here
  67.  
  68.  
  69. Deepfreeze your PC to prevent common attacks
  70.  
  71. DeepFreeze
  72.  
  73. Faronics Deep Freeze makes your PC indestructible. It protects your computer by freezing its original configuration, which prevents unwelcome or unwanted changes made while in-session from sticking. With a simple restore-to-reboot, your system integrity is maintained helping your machines to run smoothly and efficiently giving you more up-time and boosting user productivity.
  74.  
  75. Source and more : http://www.faronics.com/en-uk/enterprise...e_en-uk-2/
  76.  
  77. Download Here
  78.  
  79.  
  80. Spoof your Mac Address using TMAC
  81.  
  82. TMAC
  83.  
  84. Technitium MAC Address Changer allows you to change (spoof) Media Access Control (MAC) Address of your Network Interface Card (NIC) irrespective to your NIC manufacturer or its driver. It has a very simple user interface and provides ample information regarding each NIC in the machine.
  85.  
  86. Source and more : http://www.technitium.com/tmac/index.html
  87.  
  88. Download here
  89.  
  90.  
  91. Use CCleaner, the multi-purpose tool
  92.  
  93. CCleaner
  94.  
  95. Cleaner is a multi-purpose tool which can be used for deleting files, clearing temp files, cache, etc.
  96.  
  97. Source and more : http://www.piriform.com/ccleaner/
  98.  
  99. Download here
  100.  
  101.  
  102. Clear the evil cookies
  103.  
  104. Flash Cookie Remover
  105.  
  106. Flash cookies are evil because they persist even if you delete your browser's cookies. They are stored separately from normal site cookies and therefore need a special tool to delete them.
  107.  
  108. Source and more : http://www.trojanhunter.com/flash-cookie-remover/
  109.  
  110. Download here
  111.  
  112.  
  113. Other tips : Don't think that using Linux or Mac can't get you viruses. There are also malware that works on this Operating Systems. Malware programmers don't feel the need to write malware for this OSs since they are not used by many people.
  114.  
  115.  
  116. Online Protection
  117.  
  118. Now we are moving to Online Protection. As you know, this is very important also more than Offline Protection. Common methods of Online protection are discussed below.
  119.  
  120.  
  121. Types of Online Protection
  122.  
  123. VPN(s)
  124. Proxies
  125. Tor
  126. SSH Tunneling
  127.  
  128.  
  129.  
  130. VPN (Virtual Private Network)
  131.  
  132. A virtual private network (VPN) is a network that uses primarily public telecommunication infrastructure, such as the Internet, to provide remote offices or traveling users access to a central organizational network.
  133.  
  134. VPN provides us a secure way of connecting to websites by hiding our IP and encrypting our information.
  135.  
  136. Source and more : http://en.wikipedia.org/wiki/Virtual_private_network
  137.  
  138.  
  139. Free VPNs
  140.  
  141. Cyberghost
  142. HotSpot Shield
  143. Pro XPN
  144. Open VPN
  145.  
  146.  
  147. Paid VPNs
  148.  
  149. nVPN
  150. SwissVPN
  151.  
  152.  
  153. HTTP Proxies and SOCKS5
  154.  
  155. Get Proxy lists from this sites.
  156.  
  157. Alive Proxy
  158. Hide My Ass
  159. Proxy list
  160.  
  161.  
  162. More here.
  163.  
  164. Pro-Tip : Don't use HideMyAss for hacking.
  165.  
  166. You can also get Proxies from HF, here.
  167.  
  168.  
  169. For Premium and Private SOCKS5, you can search Google. Because the sites I use get down constantly.
  170.  
  171.  
  172. Some Proxy sites
  173.  
  174. Click to see (Click to View)
  175.  
  176. Credits : iMario
  177.  
  178.  
  179. Use Tor for secure browsing
  180.  
  181. Tor
  182.  
  183. Tor is free software and an open network that helps you defend against a form of network surveillance that threatens personal freedom and privacy, confidential business activities and relationships, and state security known as traffic analysis
  184.  
  185. Source and more : https://www.torproject.org/about/overview.html.en
  186.  
  187.  
  188. SSH Tunneling
  189.  
  190. Things you will need for SSH Tunneling
  191.  
  192. PuTTy
  193. Firefox (Preferred)
  194.  
  195.  
  196. Steps of Tunneling
  197.  
  198. Open PuTTY
  199. Enter your IP on the Hostname or IP Address text box
  200. To find your IP, you can use Command Prompt. Just type ipconfig and click Enter.
  201. Now to the left of PuTTy, you will see a list.
  202. Click the '+' symbol of SSH.
  203. From the drop down, click Tunnels
  204. You need to input a port and the click "Dynamic".
  205. Now click Add and open the connection. You will be connected.
  206. Now in your browser proxy settings, type 127.0.0.1 for IP and the selected port for port.
  207. That's it. It is done!!
  208.  
  209.  
  210.  
  211. Conclusion
  212.  
  213. It is a proven fact that nobody can be fully anonymous on the Internet. However, that does not mean nobody is secure. We should take steps to protect ourselves in the World Wide Web. Daily, a large amount of Cyber Crimes occurs and Identity theft is one of them. Black Hats ruin peoples' lives for personal gain. It is our duty to remain secure. I sincerely hope this guide helped you.
  214. =========================================================================================================================================
  215. Contents
  216. 1) Basic Internet Anonymity
  217. 2) Anonymity when Purchasing
  218. 3) Home Address Anonymity Methods
  219. 4) Stylometry Anonymity
  220. 5) Protection from Software
  221. Basic Internet Anonymity
  222. Basic Internet Anonymity is something every hacker or security expert should know. There are very many methods of securing your Internet Anonymity. First let’s focus on the two most common methods. Proxies and VPNs. These both re-route your internet traffic and hide your IP (Thus also hidng your Geo-Location) to make you appear differently to others on the internet. However there are key differences between them.
  223.  
  224. What’s the Difference?
  225. The difference is quite simple. A proxy is mainly used to re-route traffic on an internet Browser, meaning it only secures you through your internet browser. A VPN however secures ALL connections, not just your browser connection. It secures everything a proxy secures. They are usually encrypted heavily and are easily turned on and off.
  226.  
  227. Different Types of Proxies
  228. There are several types of Proxies which hide you (or not hide you, in some cases) in different ways.
  229.  
  230. Transparent Proxy
  231. Transparent Proxies are simplistic proxies that do not affect how secure you are. They are mainly used to cache web pages.
  232.  
  233. Anonymous Proxy
  234. Anonymous Proxies are used to cache websites (similar to Transparent Proxies) with the difference of actually hiding your IP address and replacing it with a new address.
  235.  
  236. Elite Proxy
  237. Elite Proxies appear to websites as if your system is non-proxied. It’s next to impossible to detect whether a system is using an elite proxy. It does not replace your IP, instead it removes it completely and appears blank.
  238.  
  239. Which should I use?
  240. A VPN would keep you more secure, as proxies can often not completely hide you.
  241.  
  242. What should I look out for?
  243. Some VPN’s and Proxies keep logs of who is using it and what they are visiting. Visit their Terms of Service page and check whether they keep logs before you use it.
  244.  
  245. What should I use?
  246. If you would like some Proxies, the Incog Group will be giving away elite proxies that will be updated every two days or so.
  247. Here are some VPN recommendations:
  248. CyberGhost VPN.
  249. [Image: JxW8MEx.png]
  250. This is by far one of the best VPN’s I have used. They have a facebook trial which allows you to use all the premium servers for free.
  251.  
  252. Hidemyass VPN
  253. [Image: pDukTIN.png]
  254. Hidemyass has had a fair amount of negative background, as they were involved in the capture of several members of a specific hacking group, however this is one of the cheapest VPNs around for only $6.55 a month and with around 53 countries covered. Please note that logs are kept for two years, so this VPN is not as trustworthy as other alternatives.
  255.  
  256. Anonymity when Purchasing
  257. Anonymity when purchasing items (virtual or physical) can be quite nerve-racking due to the general fear of your credit/debit card details and/or person information such as name and address being released or used against you. In this section we’ll be focusing on payment details alone. Anonymity when purchasing can be important to make sure you don’t get scammed. Let’s go through several payment methods.
  258.  
  259. PayPal
  260. [Image: vjCs0YU.png]
  261. PayPal is one of the most commonly used methods of payment. It allows you to pay without revealing any of your payment details to the person you’re paying.
  262.  
  263. Bitcoins
  264. [Image: bDFKLuY.png]
  265. Bitcoins are a fairly new currency that are most known for being secure. You can either download the wallet program, or use an online wallet to store your bitcoins. They are the primary method of payment on online blackmarket websites such as Silk Road. However recently there has been a lot of speculation over how secure bitcoins truly are. Please research before using this method of payment.
  266.  
  267. Liberty Reserve
  268. [Image: zbNYjss.png]
  269. Personally I have never used Liberty Reserve because I never understood how it worked. However using Liberty Reserve can often be cheaper than other methods of payment such as PayPal.
  270. Home Address Anonymity Methods
  271. Previously I talked about protecting your payment details. This is not the only information you may want to protect. Information such as your Address may be another thing you want to protect. There are several options here that allow you to hide your address.
  272.  
  273. Dead Drops
  274. Dead drops are basically a method that you can use to obtain packages where you don’t want it to be delivered at your official address. The most common method is listed below:
  275. •Find a local abandoned house (Or a house where the individuals residing there are on holiday).
  276. •Use that address when ordering.
  277. Option 1:
  278. •On the day your package is supposedly supposed to be delivered, leave a note on the house door saying “If I’m not in, please leave the package round back”. Towards the end of the day, check round the back for the package.
  279. Option 2:
  280. •If you have a spare key to the house, wait until the postman leaves a collection note through the letterbox.
  281. •Use the spare key to open the door and get the collection note.
  282. •Go to the local post office and use the collection note to get the package.
  283.  
  284. Private Mailbox / Mail Forwarding
  285. Private Mailboxes are useful if you want to conceal your own address. Unfortunately almost all of them cost money to use. Below are a few websites that allow Private Mailboxes
  286.  
  287. http://www.the-post-house.com/ - Private UK mailboxes
  288. http://prime-secretarial.co.uk/ - UK mailboxes
  289. http://www.usabox.com/ - USA Mail Forwarding
  290. http://www.privatebox.co.nz/ - New Zealand Mail Forwarding
  291.  
  292. Tips:
  293. One of the main things you should remember is that using your normal address on any purchasing website can be risky. A lot of websites are vulnerable to a hack of some sort. This means that if you use your normal address on websites, it may be released publically if the website is hacked.
  294. Stylometry Anonymity
  295. Stylometry is quite new in virtual terms, however has been around for a long time. An example of classic Stylometry is faking your parent’s signature on a letter. However this does not mean Stylometry is alone about the handwriting. It is about the linguistic style and analyzing a person’s unique writing style.
  296. Recently, Stylometry is being used heavily against hackers in an attempt to identify who they really are. Researchers from Drexel University used Stylometry to identify 80 per cent of users on underground online forums. This is the reason why I have incorporated this into the eBook.
  297.  
  298. Method of Protection:
  299. The most common way of protecting against Stylometry is to use JSAN, the open source dual tool project. JSAN consists of two parts (JStylo and Anonymouth).
  300. JStylo is the Authorship Recognition Analysis Tool. This is used to find out who the author is.
  301. Anonymouth is the Authorship Recognition Evasion Tool. This is used to avoid being recognized.
  302.  
  303. Even though there is a definitive threat for hackers with this, the method is very new and is not, as of this moment, likely to be a potential threat towards your security and anonymity. However as these tools exist, you can expect a large rise in usage.
  304. Protection from Software
  305. Another threat to individuals and companies is software. I’m not talking about average software such as Word, or Excel. I’m talking about malicious code such as viruses that steal your data and sensitive information you will probably want kept secret (Such as passwords to your accounts that may have your private data within).
  306.  
  307. Antivirus Software
  308. Antivirus software is more useful than you may think. Most people think it’s only useful to protect your computer from being completely destroyed. Although this is true, most people don’t see the effect of viruses, or if they do, don’t think it is the fault of a virus. For example, if someone finds their account password has been changed, most people with suspect that they have just forgotten it. Below are some famous anti-virus programs that are often recommended on HF.
  309.  
  310. Avast Anvast
  311. [Image: ssQjoTZ.png]
  312. My personal favorite Antivirus. It almost always alerts me when something’s going wrong.
  313.  
  314. Kaspersky
  315. [Image: rZ5N8fS.png]
  316. Kaspersky is really well know (Especially for being bloatware on computers) and has many good features.
  317.  
  318. BitDefender
  319. [Image: q13Q6zX.png]
  320. It was only recently that I was acquainted with BitDefender when I was recommended the program by a friend on HF. Unfortunately I had to uninstall my previous antivirus programs to allow this program to install, which was not very helpful. However the program was quite useful for defense.
  321.  
  322. MalwareBytes
  323. [Image: B9MBohX.png]
  324. There are no words to explain how much I love this program. Whenever I caught one of those annoying fake antivirus viruses, this program would ALWAYS be the one that cleared in up when I booted in safe mode. This program has helped me very much over the past few years to keep me safe from malware attacks.
  325.  
  326. Norton
  327. [Image: UrIm8U4.png]
  328. Norton is an antivirus I’ve heard quite a lot about. It seems to be advertised everywhere. Personally I have never used it, however I’ve been told it is quite good.
  329.  
  330. McAfee
  331. [Image: I7uZfmf.png]
  332. McAfee came pre-installed with my PC. It was annoying to try to remove and screwed up my firewall when it removed an important registry key that was infected by a virus (BFE). However, it did alert me whenever there were viruses. I should note that if you want an antivirus that you can disable, then this is probably not the right one.
  333.  
  334. Thank you for reading my tutorial, I hope it was of some use to you and that you learnt something new.
  335. -Max (Incog Leader)
  336. ========================================================================================================================================
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement