How do hacker's stay anonymous ( cyber security revieve )

" "

 

 How do hacker's stay anonymous

 Hackers use VPN or proxy servers to hide themselves from victim  

Because they don't want to get caught by police  and This is because they are engaging in illegal activities online or actions that would put their life at risk. One has set up an illegal money spinning website that hacks IP webcams in private homes and broadcasts the live feeds and hackers may be caught by some little mistake done by them example= using low maintained VPN Hackers will often use secure software such as a proxy server to hide their identity and funnel their communications through lots of different countries in order to evade detection. Other technologies like Tor and encryption enable them to add multiple layers to mask their identity


Warning !

This information is just for educational purposes only please do not miss understand it , This information is provided by hackerz2426k.blogspot.com author = Atharva pawar 


What is Proxy server ??

proxy server is a system or router that provides a gateway between users and the internet. Therefore, it helps prevent cyber attackers from entering a private network. It is a server, referred to as an “intermediary” because it goes between end-users and the web pages they visit online. So hackers connect multiple proxy server to each other to hide them selves ex. onion or tor is known as proxy chain


How proxy chain works??


 

More about how they stay anonymous !

1) Don’t use Windows

Windows is full of holes that can be exploited. Every month Microsoft issues a security patch with the latest fixes. These holes may allow spyware to infest, completely overcoming all your anonymity efforts. Any hacker worth his salt avoids Windows like the plague. Instead, they use security hardened open-source operating systems ex kali linux , ubantu 

2) Don’t connect directly to the Internet

Avoid anyone tracking down you’re real IP address through using VPN services and TOR.

VPN enables users to create a encrypted private tunnel. Anyone attempting to trace from the internet side can only see the address of the VPN server, which could be a server located in any country around the world you choose.

TOR is a whole network of nodes that route your traffic. Each node is only aware of the one ‘in front’ and ‘behind’. Ultimately, your traffic routes onto the normal internet from one of these nodes, called an exit point.

The most complete approach is to combine the two and use VPN before going into TOR or proxies 

3) Don’t use a real email address

Instead, use anonymous email services or remailers. Anonymous email services allow you to email someone without any trace back to you, especially if coupled with VPN or TOR access. Remailers are a service whereby you can send from a real email account and the remailer will forward it on anonymously. Some remailers enable return mail, but the risk is if the remailer itself is ever compromised, it would have a record of your real email address. However, remailers can be chained together for additional layers of anonymity.

4) Don’t use Google

Google makes it their business to track everything you do in order to serve up adverts that you might click on. And as useful as the search engine is, there are ways to get the best out of it without compromising your identity. Services such as StartPage serve up google results but doesn’t store IP addresses, cookies or records of your searches. DuckDuckGo provides a similar service.

5) Don’t use public wifi

wo issues here. The first is having your computer’s unique MAC address recorded by the router of the public location, although this is avoidable by MAC spoofing. If you’re ever traced back to your real MAC address then you can be linked to your original computer. Add to this any in-store CCTV and you’re busted! Secondly, wifi hacking attacks are commonplace. A man-in-the-middle attack over wifi will bypass all your hard earned anonymity. Admittedly, the other hacker would need to be on the same physical wifi network already, so he probably knows who you are anyway.

Guys if you like our content please like and share also comment down below

Thank you !

Comments