Advertisement
Guest User

Untitled

a guest
Jun 26th, 2017
247
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 3.82 KB | None | 0 0
  1. Disclaimer:
  2. [FOR EDUCATIONAL USE ONLY]
  3.  
  4. Hi
  5.  
  6. This is my first Tutorial and it is general knowledge so i don't need to credit(Site) anyone.
  7.  
  8. I've been apart of this community for about 4 month's. I must say the knowledge i have gained is vital to me in my job and in other aspects of network security.
  9.  
  10. I am a CEH and CHFI, among other things and i consider myself a Grey hat.
  11.  
  12. I'm trying to give back to the community and help others with basic knowledge and practical ways to help yourself not get caught.
  13.  
  14. Tutorial
  15.  
  16.  
  17. What ever your going to hack or do reconnaissance on you must do these basic things in order to not get caught.
  18.  
  19. 1) Change you MAC address
  20.  
  21. What is a Mac address?
  22. Mac Address Example
  23.  
  24. How do you tell what you mac address is?
  25. Go to:
  26. Start>Run>type in CMD(then hit enter)>then type in ipconfig /all and then enter
  27.  
  28. You should have gotten something that looks like this.
  29.  
  30. [Image: ipconfig-all.jpg]
  31.  
  32. That is your mac address, the example up is for and Ethernet (A wired Jack) adapter
  33.  
  34. This example is for a wireless adapter.
  35. [Image: ipconfig.PNG]
  36.  
  37. How to change your Mac address
  38.  
  39. Windows:
  40. SMAC is my program of choice for windows, it will randomize and change your mac address to whatever you want
  41.  
  42. I'm sure there are other out there, SMAC is just my favorite.
  43.  
  44. Linux:
  45. You can do this your self pretty easily, here's an article to help.
  46.  
  47. This may not work for all flavors of linux
  48.  
  49. Linux, change MAC address
  50.  
  51. 2)Changing your IP Address
  52.  
  53. Getting your current ip:
  54.  
  55. Use this to tell your current ip
  56. My IP
  57.  
  58. This is crucial to know before you do anything.
  59.  
  60. Change that IP
  61.  
  62. To change that IP we need to get either a VPN or a proxy.
  63.  
  64. What is a VPN?
  65.  
  66. It stands for Virtual Private Network. Essentially it allows you to join another network and change your ip to whatever the subnet range of that network is.
  67.  
  68. What is a Proxy?
  69.  
  70. there are many different kinds, probably the most common and relevant to you will be CGI-Proxies. Example Below.
  71.  
  72. CGI-Proxy Example
  73.  
  74. VPN's are so much better for hiding yourself then proxies.
  75.  
  76. Why?
  77.  
  78. Because VPN's mask all traffic and essentially make you an extension of another network around the world. The Best VPN's to use are offshore...That means not in US.
  79.  
  80. Where to get a VPN?
  81.  
  82. Getting a good vpn can be difficult sometimes.
  83.  
  84. You can search hack forums with the keyword "VPN" and usually there will be some listed.
  85.  
  86. I wouldn't pay for one, because you can typically find them all the time for free.
  87.  
  88. 3) Use fake accounts
  89.  
  90. Setup fake accounts only using what we discussed above!
  91.  
  92. Change you MAC address and IP Address before you make accounts!
  93.  
  94. Why is this important? Because Hotmail, Gmail, and all other email and service providers MAY log ip's. It's better safe to be sorry.
  95.  
  96. Make fake paypal accounts if you plan to monetize, using these fake accounts.
  97. NEVER EVER USE PERSONAL INFORMATION FOR ANYTHING
  98.  
  99.  
  100. That is the quickest way to get tracked.
  101.  
  102. 4)When your going to hack some heavy metal
  103.  
  104. Once you have planned a strike on a major website our company or whoever. There are some things you must do.
  105.  
  106. A: Never hack anything heavy from your house, especially if it's across state lines. You will get nailed by the FBI.
  107.  
  108. B: Take a drive to another town, or a big city and find someones open or easily crackable wireless access point. Why? Because when they trace your computer back it will resolve to that ip address. The FBI will go knocking on that persons door instead of yours.
  109.  
  110. C: If you are extremely paranoid like me Destroy the laptop your using, or bury. Laptops and hardware ARE CHEAP these days. Trust me its not as hard as you think it is. Laptops are almost like track phones these days.
  111.  
  112. I hope this helps.
  113.  
  114. If you like this article please say thanks, and +REP would be nice, since i have none.
  115.  
  116. Disclamer:
  117. [FOR EDUCATIONAL USE ONLY]
  118.  
  119. [warn]
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement