How to become Anonymous on the Web.
http://haxordoubt.blogspot.com/2014/05/how-to-become-anonymous-on-web.html
Hello to
You.
This manual
will guide you on how to become anonymous while browsing the Web, there will
always exist a way to track you down, so i'd suggest that if you are doing
something that needs to be hidden, act differently while you are anonymous.
You can use
it when you need to:
• Hide when attacking a website or
scanning vulnerabilities.
• Keep your browsing history hidden.
• Hide your IP
• Bypass your ISP blocks or limits.
I will tell
you all the steps you need to take to become really anonymous, let's call it
Anonymity Layers, let's start with the first one:
1st Layer: Tails.
Tails is an
Open Source Linux Distro that can be loaded up from an USB drive.
this will
be our first layer of anonymity, whenever you need to hide you will have to
bootup
your PC
with the USB drive, and Tails Distro will loadup, it has a lot of features to
start.
Tails Linux
Distro is a secure and anonymous Operating System because:
1. connections to the Internet are
forced to go through the Tor network;
2. leave no trace on the computer you
are using unless you ask it explicitly;
3. use state-of-the-art cryptographic
tools to encrypt your files, emails and instant messa
For more
information about Tails go to:
https://tails.boum.org/about/index.en.html
2nd Layer: TOR
Tor is free
software and an open network that helps you defend against traffic analysis, a
form of network surveillance that threatens personal freedom and privacy,
confidential business activities and relationships, and state security.
HOW IT
WORKS
TOR is
already implemented on Tails Operating System, so you won't have to worry about
connecting
to the TOR Network, Tails won't let you have any connection outside TOR node.
For more
information about TOR visit:
https://www.torproject.org/about/overview.html.en
3rd Layer: VPN.
A VPN is an
acronym for Virtual Private Network it is a server that is used to connect to a
LAN securely. VPN's will encrypt your connection information and hide your real
IP from websites, people and it will keep your connection encrypted so you
won't be able to get traced.
Free VPN's:
Pro XPN
Create an
account.
Download
Link
Open VPN
Downloads.
Open VPN
requires configuration files. You add them to C:\Program Files\OpenVPN\config
Hot Spot Shield
HSS is OpenVPN based, you download the client and it will
hide your IP.
Paid VPNs:
Paid VPN services are better than free because they keep NO
logs and also their encyption are way better than free VPN services.
BlackShades VPN
This is by far the best Product for VPN.
nVPN ( OpenVPN based )
This is another good VPN service.
4th Layer: Proxy
What is HTTP Proxy ?
A HTTP proxy is kind
of the same thing as a SOCKS 5, except the fact it using the HTTP protocol
instead of the SOCKS protocol. When a browser is configured with a HTTP proxy,
it just hooks through the proxy server and bypasses any firewall put in place
on the LAN.
Web proxies and Proxy client/managerseb Proxies
• Proxy
Filter (By Omniscient)
• Hide my
ass
• Proxify
• FoxyProxy
(Firefox addon)
5th Layer: SSH Tunneling
What is SSH and SSH Tunneling ?
SSH is the acronym for Secure Shell, it is an network
protocol used to connect to Linux&Unix based machines. This will let
you access the shell (Terminal) via a remote connection to the machine/server.
The default port for SSH connection is 22.
SSH tunneling is using the SSH protocol to hook through the
machine/server as you send a command through your internet, say loading Google,
your machine will send the data through the "SSH Tunnel" and your IP
will be hidden from the website. As your data is going through the
"tunnel" it is encrypted using a Public-Key encryption.
Paid SSH Tunneling Service:
SDF
Onlybird
Alidage
6th Layer: MAC Address Spoofing.
MAC address is the acronym for Media Access Control address
it's the unique identifier for a network interface. I like to think of it as
the fingerprint of your connection.
MAC address spoofing is using a program (You can do it
manually but program is much easier.) to change your MAC address so it doesn't
leave behind your networks "fingerprint." Without doing this, you
will never be FULLY anonymous.
MAC Address Spoofers.
SMAC
Download link
NMAP
Download page.