I Am A Newbie
Posted 09 May 2012 - 06:31 PM
Posted 10 May 2012 - 03:32 PM
Very Interesting: Windows XP Source Code! and Windows Vista Source Code!!. Read'em and weap...
Posted 14 May 2012 - 11:33 AM
But to answer your question, like kingvandel said, it really depends on who you're trying to conceal yourself from. A friend? Coworker? Sysadmin? School? Government? You wouldn't spend $10,000 on a safe to protect $100 worth of jewelry. Thus your approach should change depending on what you perceive your environment to be.
Don't forget to Read the Rules before you post!
Posted 17 May 2012 - 09:17 AM
Posted 17 May 2012 - 09:25 AM
Posted 17 June 2012 - 10:42 PM
100% anonymity on the internet is a myth. If you want to hide yourself I suppose you could look around for open wireless networks and park on the street and use the net that way, bounce from proxy to proxy etc.. What are you trying to hide your address from (serious question there are different methods based on situations)?.
Feeling a bit nervous about dumping on a month old post, but for future readers it might be nice. I wanted to add that coffee shops, book stores, community colleges, libraries, and any other hot-spot with open WiFi networks are free game also. I'd just watch out for cameras (and eye witnesses), - I use a cheap booster for my WiFi card (USB - works very well if it's compatible with your drivers for whatever app). And be careful parking outside of houses, 'cause even my front-porch camera and backyard cameras extend all the way to the sidewalk across (city limitations or else I'd be recording the neighbors houses too).
Have a laptop just for pentesting; absolutely no hard-drives or other storage devices should exist in this machine and you should not ever use it for anything else. Boot a non-persistent environment from USB (or a dedicated, never before used hard-drive if you want), and you can still park outside of a coffee shop and hopefully you have dark tints and it's daytime...
Step 1: obtain a never before used laptop (at least by you, loved ones, or persons who you can be tracked through)
- just buy a new one and don't use it for anything else
Step 2: take all storage devices out
Step 3: get a USB WiFi card and a booster (or you can get them in one package too)
- make sure the make and model you're getting is compatible with the drivers you're going to use in your environment
- you can find drivers or search compatibility of your current drivers on search engines, don't ask on here
- Alfa's are amazing if you have extra money
Step 4: install a non-persistent environment on a USB stick
- make sure it's not persistent, whatever the platform is
- hopefully it'll run on your machine without problems, and if so, then hooray
- you can find out how to make a bootable USB from search engines, don't ask on here
Step 5: don't use your dedicated machine for anything else (exemplum gratia: e-mail, Facebook, Amazon, so personal-use, and never on your own ISP, et cetera)
Step 6: don't use your WiFi card on any other machine
Think sterile hardware.
This was just for informational purposes. If you were to pentest for a firm, IT Security teams can get pretty smart; it'd be embarrassing to horribly lose against them. You don't want to enable a game of capture the flag.
"It's not about what you know or what you do; it's about who you know.and sometimes who you do."
- if someone cared about you in the military and knew this piece, they passed it on to you
Posted 17 July 2012 - 10:14 PM
When connected to a WIFI, changed your MAC address and use a live CD, not to leave traces behind. Don't always use the same wireless AP, if you can keep on the move, this will reduce the chances of somone using triagulation techniques to detect your actual physical location.
0 user(s) are reading this topic
0 members, 0 guests, 0 anonymous users