12
Title: Anonymity guide - How to be safe on the web Author : Daisuke Dan Date : March 18, 2014

Anonymity Guide

Embed Size (px)

Citation preview

Page 1: Anonymity Guide

Title: Anonymity guide - How to be safe on the web Author : Daisuke Dan Date : March 18, 2014

Page 2: Anonymity Guide

# Summary #

1) Introduction

2) Methods

3) Explanations

4) Preventions

5) Conclusion

Page 3: Anonymity Guide

1) Introduction

There are many reasons to go anonymous online - preventing tracking from authoritarian regimes in certain countries, maintaining privacy from companies who track online usage, or simply a desire to

remain anonymous. Some people want to avoid company or school tracking. In this paper you will learn how to be safe and use some methods to be anonyme.

Page 4: Anonymity Guide

2) MethodsWeb Proxies: Web proxies is browsing anonymously via another site: - http://goproxy.nl/ - http://www.hidemyass.com/ - http://www.kproxy.com/ Proxies: Proxies are used mainly for security purposes and IP Address, it may be also used to: - speed up the loading of web pages - open blocked sites - bypass IP controls VPNs: It enables a computer to send and receive data across shared or public networks as if it is directly connected to the private network, while benefiting from the functionality, security and management policies of the private network. A VPN is created by establishing a virtual point-to-point connection through the use of dedicated connections, virtual tunneling protocols, or traffic encryptions. Paid VPNs: - http://www.hidemyass.com/vpn/ - https://proxpn.com/#pricing - http://www.provpn.co.uk/ - http://hsselite.com/ Free VPNs: - http://hotspotshield.com/ - http://www.vpnbook.com/freevpn - http://www.vpngate.net/en/download.aspx - http://freevpn.me/accounts Web Browsing: - Pirate Browser http://piratebrowser.com/ (Based on Tor network) - Tor Network https://www.torproject.org/

Page 5: Anonymity Guide

3) Explanations # How to use a Proxy: You can configure your browser to use some proxy server. To do so first of all go to hidemyass.com and note down a highly anonymous IP. Now you need to configure your browser to use this IP. Follow these navigations according to the browser you are using:

For Mozilla: - Click on ‘Tools’, then ‘options’. Under the ‘Advance’ tab select ‘Network’ click ‘Settings’ select ‘Manual proxy configuration’ and Enter the IP noted from the proxy list.

For Chrome: - Click on ‘Customize and control’ button then click on ‘options’, select ‘Under the hood’ and click on ‘Change Proxy Settings’ the Internet option dialog box will appear, click on ‘LAN Settings’ tick ‘Use proxy server for LAN’ and enter the IP that you noted from IP-list as mentioned above.

Page 6: Anonymity Guide

For Internet Explorer: Haha, he sucks! Internet explorer serves to download Firefox \(^_^)/

# How to use TOR: Tor stands for "The Onion Router." To keep things basic, the TOR network keeps you anonymous by sending the data sent out from your computer through multiple "computers," or relays around the globe before going to it's intended location. This makes it impossible (if used right) to track where the information came from. Once you have set up and configured your Tor Browser bundle, you are done. Yep, that's it. You can now use Tor like you would normally use any other browser and feel much safer and secure about keeping your identity private. You will realize that web pages load a little slower than normally, but this is because of the encryption process and the time it takes for your packets of data to get sent and received. This slight increase in loading times is definitely worth the amount of privacy and anonymity you get in return.

Page 7: Anonymity Guide

You can click on "Settings" to configure yout network:

Page 8: Anonymity Guide

# How to configure your browser: A lot of addons offers the possibility to setup proxies in your settings, here is a list of free addons for FireFox: User agent switcher: - https://addons.mozilla.org/en-us/firefox/addon/user-agent-switcher/ Foxy Proxy: - https://addons.mozilla.org/fr/firefox/addon/foxyproxy-standard/ Proxy Selector: - https://addons.mozilla.org/fr/firefox/addon/proxy-selector/ One click Proxy IP: - https://addons.mozilla.org/fr/firefox/addon/one-click-proxy/ Auto Proxy: - https://addons.mozilla.org/en-US/firefox/addon/autoproxy/ Best Proxy Switcher: - https://addons.mozilla.org/fr/firefox/addon/best-proxy-switcher/ For Chrome: Proxy SwitchySharp: - https://chrome.google.com/webstore/detail/proxy-switchysharp/dpplabbmogkhghncfbfdeeokoefdjegm Foxy Proxy for Chrome: - https://chrome.google.com/webstore/detail/foxyproxy-standard/gcknhkkoolaabfmlnjonogaaifnjlfnp Fast Proxy: - https://chrome.google.com/webstore/detail/fast-proxy/bkjcdfmmpdfjohenejbkaaafkoeknjnh Falcon Proxy: - https://chrome.google.com/webstore/detail/falcon-proxy/gchhimlnjdafdlkojbffdkogjhhkdepf For Internet Explorer: Haha!

"Internet explorer has encountered a problem and needs to close, We are sorry for the inconvenience.

[Send Error Report] [Don't Send] [Uninstall this bullshit]" To test your protection, an useful website is available to see if your proxy works or not: http://test.anonymity.com/

Page 9: Anonymity Guide

# How do hackers stay anonymous: Hacker/crackers who perform criminal activities and still they manage to flee away, usually implement highly sophisticated combination of techniques. They use the options that are discussed above but in addition they implement some other methods too, to achieve maximum anonymity. Few of those issues are [+] Virtual OS: Virtual machine is a guest operating system running on the top of host operating system. virtual OS is used to attain high anonymity as usage of guest OS allows user to easily get rid of log file, and gives flexibility to manipulate the MAC address. The most popular virtual machines are VMware and Virtual Box. [+] Spoofing MAC address: Every Network interface card has a unique MAC address assigned to it, which is used by forensic to trace hacker. Hence spoofing of MAC address makes it hard to trace a hacker. Mac address can be spoofed manually or by using some software like this. [+] TOR’s live CD: Use of live cd is another good option that can be used to add to the anonymity.Tor’s live cd named as ‘tails’ can be downloaded from TOR website. All the connections in tails goes through TORs networks and it leaves no evidence of whatever you’ve done.

Page 10: Anonymity Guide

4) PreventionsThis part gives general advice on safely using email,web...etc because they can easily breach your privacy! Banking, shopping, and interacting online is the ease with which other people can now steal your information. To stay safe on the internet, use the following strategies. Your connection: - Always check for secure transaction info. The best companies will have many security devices in place. You may see a gold lock at the bottom of the page to indicate a secure site. When giving any bank details or other information, make sure the connection is secure (URLs like this begin with https:// instead of http://) and the site is trustworthy. - Make sure you are using (and regularly updating) an anti-virus program, an anti-spyware program, and a firewall. - Use different passwords for every site Your identity: - Keep your eyes peeled for online scams. - Do not give out your full name, address, or phone number to anyone online that you don't trust or know in person. - Block or ignore unwanted users. - Keep your primary email address private. - Use a fake name. - When you change, really change! (name, adress, language, email, social network...) - Don’t use lazy passwords. - Watch what you "say" online. Downloading: - Never open e-mail attachments from strangers unless you can trust them and have security settings on your computer. - Don’t click on pop-up messages - Don’t follow links in unexpected emails - Only download files or software from sites that have been rated/verified by trusted sources. How your anonymity can be breached? - IP adress - Cookies - Browser fingerprint - Spyware - PC history (in case of a computer forensic investigation)

Page 11: Anonymity Guide

5) Conclusion

Using the Internet, you never will be able to protect your privacy 100%. But by choosing your provider wisely you can achieve enough privacy to protect yourself from spying investigators and even from governments. If used these techniques in proper combination, very high anonymity can be achieved

Page 12: Anonymity Guide

Hope you've enjoyed the paper! Cordially, Daisuke Dan. PenTester, Researcher.

The Hackers Bay.