Loading...

How to become Anonymous on the Web.


 


Hello to You.

This manual will guide you on how to become anonymous while browsing the Web, there will always exist a way to track you down, so i'd suggest that if you are doing something that needs to be hidden, act differently while you are anonymous.





You can use it when you need to:
•             Hide when attacking a website or scanning vulnerabilities.
•             Keep your browsing history hidden.
•             Hide your IP
•             Bypass your ISP blocks or limits.

I will tell you all the steps you need to take to become really anonymous, let's call it Anonymity Layers, let's start with the first one:


1st Layer: Tails.


Tails is an Open Source Linux Distro that can be loaded up from an USB drive.
this will be our first layer of anonymity, whenever you need to hide you will have to bootup
your PC with the USB drive, and Tails Distro will loadup, it has a lot of features to start.
Tails Linux Distro is a secure and anonymous Operating System because:
1.            connections to the Internet are forced to go through the Tor network;
2.            leave no trace on the computer you are using unless you ask it explicitly;
3.            use state-of-the-art cryptographic tools to encrypt your files, emails and instant messa

For more information about Tails go to:
https://tails.boum.org/about/index.en.html


2nd Layer: TOR

Tor is free software and an open network that helps you defend against traffic analysis, a form of network surveillance that threatens personal freedom and privacy, confidential business activities and relationships, and state security.
HOW IT WORKS
 

TOR is already implemented on Tails Operating System, so you won't have to worry about
connecting to the TOR Network, Tails won't let you have any connection outside TOR node.

For more information about TOR visit:
https://www.torproject.org/about/overview.html.en

3rd Layer: VPN.

A VPN is an acronym for Virtual Private Network it is a server that is used to connect to a LAN securely. VPN's will encrypt your connection information and hide your real IP from websites, people and it will keep your connection encrypted so you won't be able to get traced.

Free VPN's:
Pro XPN
Create an account.
Download Link

Open VPN
Downloads.
Open VPN requires configuration files. You add them to C:\Program Files\OpenVPN\config

Hot Spot Shield
HSS is OpenVPN based, you download the client and it will hide your IP.

Paid VPNs:
Paid VPN services are better than free because they keep NO logs and also their encyption are way better than free VPN services.

BlackShades VPN
This is by far the best Product for VPN.

nVPN ( OpenVPN based )
This is another good VPN service.

4th Layer: Proxy

What is HTTP Proxy ?
A HTTP  proxy is kind of the same thing as a SOCKS 5, except the fact it using the HTTP protocol instead of the SOCKS protocol. When a browser is configured with a HTTP proxy, it just hooks through the proxy server and bypasses any firewall put in place on the LAN.

Web proxies and Proxy client/managerseb Proxies
•             Proxy Filter (By Omniscient)
•             Hide my ass
•             Proxify
•             FoxyProxy (Firefox addon)

5th Layer: SSH Tunneling

What is SSH and SSH Tunneling ?
SSH is the acronym for Secure Shell, it is an network protocol used to connect to Linux&Unix based machines. This will let you access the shell (Terminal) via a remote connection to the machine/server. The default port for SSH connection is 22.

SSH tunneling is using the SSH protocol to hook through the machine/server as you send a command through your internet, say loading Google, your machine will send the data through the "SSH Tunnel" and your IP will be hidden from the website. As your data is going through the "tunnel" it is encrypted using a Public-Key encryption.

Paid SSH Tunneling Service:

SDF
Onlybird

Alidage



6th Layer: MAC Address Spoofing.

MAC address is the acronym for Media Access Control address it's the unique identifier for a network interface. I like to think of it as the fingerprint of your connection.

MAC address spoofing is using a program (You can do it manually but program is much easier.) to change your MAC address so it doesn't leave behind your networks "fingerprint." Without doing this, you will never be FULLY anonymous.


MAC Address Spoofers.
SMAC
Download link

NMAP
Download page.


web 989511561354106042

Post a Comment

emo-but-icon

Home item

Popular Posts

Random Posts

Flickr Photo