A. VPN
VPN is the acronym of Virtual Private Network. As from a hacker's point of view, here are the facts that justifies its need:
1) Counterfeit the ISP's packet detection measures.
Maintain your anonymity and boost by keeping your ISP from throttling, inspecting and prioritizing the data sent to and from your system.
2) Keep your IP address anonymous.
Prevent the places your packets are traversing from identifying your connection information and location.
3) Hide your online activities from third parties.
As a VPN provides a secure tunnel to make a connection to the outside world, it will keep the third parties away from finding your online activities.
4) And of-course, prevent location identification and Geo targeting.
Yeah! the title says it all.
To help you start, below are some of the FREE VPN's that are available.
Cyberghost http://cyberghostvpn.com/ --> Good for germanyUSA IP http://www.usaip.eu/en/free_vpn.php
Free VPN http://thefreevpn.com/
VPN Tool http://www.vpntool.com/services.php --> good
USSecurityKIS http://www.securitykiss.com/sk/index.php
Hotspot Shield http://anchorfree.com/downloads/hotspot-shield/
ProXPN http://proxpn.com/
Open VPN http://openvpn.net/
Tor VPN https://torvpn.com/information.html
Its Hidden http://itshidden.com/
B. Proxies
Proxies are another less secure alternative for VPN's . Proxies does the same job as VPN's as it hides your IP when you are surfing through the internet. There are different types of proxies ranging from less anonymous to high anonymous proxies. One thing that you have to keep in mind is that the proxies will not last for ever. The available proxy address will change from time to time (which is a best thing for staying anonymous).
Below are some of the Proxy sites that you can use as a starting leveler.
http://proxify.com/
http://www.hidemyass.com/
http://hidefromyou.com/
http://proxy6.org/
http://www.httpsurf.com/
http://www.safersurfing.net/
http://unblocked.in/
http://www.proxeasy.com/webclient.aspx
http://newipnow.com/
Below are some of the Popular VM's that you can use .
VMLite - http://www.vmlite.com/index.php?option=c...Itemid=153
VMWare - https://my.vmware.com/web/vmware/downloads
Virtual Box - https://www.virtualbox.org/wiki/Download
C. Virtual Machines
I suggest you to use a virtual machine while doing your stuffs. It is a best way to test your exploits without the pain of buying a new computer. For White hatters this is a heaven, because using a Virtual machine to test the servers(Remote Administration Tools) without the fear of a breach into your actual working environments. Now a days, the RATS and crypting techniques (will be discussed in RAT and Keyloggers section) became far more advanced in the favor of Black Hat hackers so that they can bye pass the Virtual machine environment and actually do their stuff in the host environments.
D. Be Easy With Your DOX Info
Another common mistake someone will do is that, he will put his details like nick name, email address, country etc on their slaves for the sake of name, You should do it only if you feel that much confident. As you are reading this now, I am pretty sure that, you take my word for this. Your confidence is what I say "Over Confidence". Don't put any kind of information after you are done. There is a site Fake Name Generator - http://www.fakenamegenerator.com/ which can help you generate some fake profiles. Believe me, you can get random profiles with a lots and lot of information from this site.
E. A Final Word
As I said in the starting of this tutorial, these are only some basic level Anonymity tools whose service you can make use of to stay anonymous. These cannot assure 100% anonymity and if you did something Black Hat stuffs and when you hear a door knock and see some cops outside your door, don't blame me :)
No comments:
Post a Comment