The act of keeping your identity hidden online by using connection methods and encryption methods, to make yourself untraceable to a person, website, company, school or whatever else you are doing/connecting to.
- Stay hidden when investigating a website, or scanning it for vulnerabilities.
- Keep your browsing history/activity hidden when at work, school, library or even your family computer.
- Keep your IP ( Internet Protocol Address ) hidden from victims of a RAT (Remote Administration Tool) or a botnet.
- Bypassing ISPs service usage limits.
A VPN is an acronym for Virtual Private Network, it is a server that is used to connect to a LAN ( Local Area Network ) securely. VPNs will encrypt your connection information and hide your real IP from websites, people and it will keep your connection encrypted so you won’t be able to get traced.
List of good Free VPNs.
n/a – do your own research
Paid VPNs.
Why are paid VPNs better than free ?
They are more secure and keep no logs. When free ones will keep logs and aren’t as securely encrypted as a paid.
n/a removed: do your own research – ask “what exactly do you log?”
SOCKS is the internet protocol that makes it easier for packets to be routed between the client/server via a proxy server. The SOCKS protocol has a designated port, but is not limited to that port. This port number is 1080.
Socks will let you get by the network firewall, usually with schools or workplaces, they will have a block on the browsing you are allowed to do.
What is HTTP Proxy ?
A HTTP ( Hypertext Transfer Protocol ) proxy is kind of the same thing as a SOCKS 5, except the fact it using the HTTP protocol instead of the SOCKS protocol. When a browser is configured with a HTTP proxy, it just hooks through the proxy server and bypasses any firewall put in place on the LAN ( Local Area Network )
Web proxies and Proxy client/managers
n/a removed: do your own research – ask “what exactly do you log?”
Proxy Manager
- Tor
- Download the client.
- READ THE PAGE. Tor isn’t as safe as people think it is.
How to set up SOCKS 4/5 & HTTP Proxies
Things needed.
- FireFox Browser
- It’s not NEEDED but it’s got an amazing proxy managing system.
- Download here.
- SOCKS or Proxy IP:Port – Get them :
REMOVED: DO YOUR RESEARCH
Configuring the SOCKS or Proxy. ( Used in SSH Tunneling. )
- Open up Firefox browser.
- Go up to the top. Tools >> Options. This will bring up a window.
Options Window (Click to View)
- From here, you will go to the advanced tab and then you’ll want to click “Network” tab within the advanced tab.
Network Tab (Click to View)
- Then click on the settings button. Then click on “Manual proxy configuration.”
Network Settings (Click to View)
- You will need to input the IP:Port combination in the correct protocol line. ( The checker I gave above, will tell you which protocol it is. )
- After you have done that, click Ok and it should be correctly configured.
What is SSH and SSH Tunneling ?
SSH is the acronym for Secure Shell, it is an network protocol used to connect to Linux&Unix based machines. This will let you access the shell (Terminal) via a remote connection to the machine/server. The default port for SSH connection is 22.
SSH tunneling is using the SSH protocol to hook through the machine/server as you send a command through your internet, say loading Google, your machine will send the data through the “SSH Tunnel” and your IP will be hidden from the website. As your data is going through the “tunnel” it is encrypted using a Public-Key encryption.
How to SSH Tunnel ?
Things you need.
- PuTTY
- An SSH client that runs on Windows or Unix Platforms.
- Downloads page.
- A Unix or Linux based system/server.
- IP and Log on to it. (Doesn’t have to be root.)
- Configuring SOCKS 5 proxy knowledge. ( Given above. )
How to configure PuTTY for tunneling.
- First thing is first, Open up PuTTY.
- You’re going to input your machine/server IP in the textbox that says “Host name (or IP Address )”
- Next you’re going to want to click the “+” sign beside “SSH.”
Spoiler (Click to View)
- From the drop down menu, click on “Tunnels”
- You will input a port ( Any port will do. ) and click the bullet “Dynamic” Change nothing else.
Spoiler (Click to View)
- Click “Add.” and then “Open” the connection. This will connect you to the machine/server via SSH with an Open tunnel.
- Next thing is configuring your browser. You will be configuring a SOCKS 5.
- The IP will be 127.0.0.1 and then the port will be same as the one you used when configuring the tunnel in PuTTY. ( For me it will be 1337 )
MAC address is the acronym for Media Access Control address it’s the unique identifier for a network interface. I like to think of it as the fingerprint of your connection.
MAC address spoofing is using a program (You can do it manually but program is much easier.) to change your MAC address so it doesn’t leave behind your networks “fingerprint.” Without doing this, you will never be FULLY anonymous.
MAC Address Spoofers.
- SMAC
- NMAP
- Download page.
- –spoof-mac is the command you use to spoof your MAC with NMAP.
- Your operating system will let you change your MAC.
- Good tutorial. (Mydigitallife)
- I would recommend using MAC Address spoofer.
Thanks for reading my tutorial, I hope you learned some stuff from it. And please remember, this is for educational purposes only.
-Anonymous
Leave a Reply