Title: Author: Date:: Anonymity Guide - How To Be Safe On The Web

Download as pdf or txt
Download as pdf or txt
You are on page 1of 12

Title: Anonymity guide - How to be safe on the web

Author : Daisuke Dan


Date : March 18, 2014
# Summary #

1) Introduction

2) Methods

3) Explanations

4) Preventions

5) Conclusion


1) Introduction

There are many reasons to go anonymous online - preventing tracking from authoritarian regimes in
certain countries, maintaining privacy from companies who track online usage, or simply a desire to
remain anonymous. Some people want to avoid company or school tracking.
In this paper you will learn how to be safe and use some methods to be anonyme.

2) Methods
Web Proxies:
Web proxies is browsing anonymously via another site:
- http://goproxy.nl/
- http://www.hidemyass.com/
- http://www.kproxy.com/

Proxies:
Proxies are used mainly for security purposes and IP Address, it may be also used to:
- speed up the loading of web pages
- open blocked sites
- bypass IP controls

VPNs:
It enables a computer to send and receive data across shared or public networks as if it is directly
connected to the private network, while benefiting from the functionality, security and management
policies of the private network. A VPN is created by establishing a virtual point-to-point connection
through the use of dedicated connections, virtual tunneling protocols, or traffic encryptions.

Paid VPNs:
- http://www.hidemyass.com/vpn/
- https://proxpn.com/#pricing
- http://www.provpn.co.uk/
- http://hsselite.com/

Free VPNs:
- http://hotspotshield.com/
- http://www.vpnbook.com/freevpn
- http://www.vpngate.net/en/download.aspx
- http://freevpn.me/accounts

Web Browsing:
- Pirate Browser
http://piratebrowser.com/ (Based on Tor network)

- Tor Network
https://www.torproject.org/
3) Explanations

# How to use a Proxy:
You can configure your browser to use some proxy server. To do so first of all go to hidemyass.com
and note down a highly anonymous IP. Now you need to configure your browser to use this IP.
Follow these navigations according to the browser you are using:
For Mozilla:
- Click on Tools, then options. Under the Advance tab select Network click Settings select
Manual proxy configuration and Enter the IP noted from the proxy list.


For Chrome:
- Click on Customize and control button then click on options, select Under the hood and click on
Change Proxy Settings the Internet option dialog box will appear, click on LAN Settings tick Use
proxy server for LAN and enter the IP that you noted from IP-list as mentioned above.


For Internet Explorer:
Haha, he sucks! Internet explorer serves to download Firefox \(^_^)/

# How to use TOR:
Tor stands for "The Onion Router." To keep things basic, the TOR network keeps you anonymous
by sending the data sent out from your computer through multiple "computers," or relays around the
globe before going to it's intended location. This makes it impossible (if used right) to track where
the information came from.

Once you have set up and configured your Tor Browser bundle, you are done. Yep, that's it. You can
now use Tor like you would normally use any other browser and feel much safer and secure about
keeping your identity private. You will realize that web pages load a little slower than normally, but
this is because of the encryption process and the time it takes for your packets of data to get sent
and received. This slight increase in loading times is definitely worth the amount of privacy and
anonymity you get in return.
You can click on "Settings" to configure yout network:

# How to configure your browser:
A lot of addons offers the possibility to setup proxies in your settings, here is a list of free addons for
FireFox:

User agent switcher:
- https://addons.mozilla.org/en-us/firefox/addon/user-agent-switcher/

Foxy Proxy:
- https://addons.mozilla.org/fr/firefox/addon/foxyproxy-standard/

Proxy Selector:
- https://addons.mozilla.org/fr/firefox/addon/proxy-selector/

One click Proxy IP:
- https://addons.mozilla.org/fr/firefox/addon/one-click-proxy/

Auto Proxy:
- https://addons.mozilla.org/en-US/firefox/addon/autoproxy/

Best Proxy Switcher:
- https://addons.mozilla.org/fr/firefox/addon/best-proxy-switcher/

For Chrome:

Proxy SwitchySharp:
- https://chrome.google.com/webstore/detail/proxy-switchysharp/
dpplabbmogkhghncfbfdeeokoefdjegm

Foxy Proxy for Chrome:
- https://chrome.google.com/webstore/detail/foxyproxy-standard/gcknhkkoolaabfmlnjonogaaifnjlfnp

Fast Proxy:
- https://chrome.google.com/webstore/detail/fast-proxy/bkjcdfmmpdfjohenejbkaaafkoeknjnh

Falcon Proxy:
- https://chrome.google.com/webstore/detail/falcon-proxy/gchhimlnjdafdlkojbffdkogjhhkdepf

For Internet Explorer: Haha!

"Internet explorer has encountered a problem and needs to close, We are sorry for the
inconvenience.
[Send Error Report] [Don't Send] [Uninstall this bullshit]"

To test your protection, an useful website is available to see if your proxy works or not: http://
test.anonymity.com/

# How do hackers stay anonymous:
Hacker/crackers who perform criminal activities and still they manage to flee away, usually
implement highly sophisticated combination of techniques. They use the options that are discussed
above but in addition they implement some other methods too, to achieve maximum anonymity.
Few of those issues are

[+] Virtual OS: Virtual machine is a guest operating system running on the top of host operating
system. virtual OS is used to attain high anonymity as usage of guest OS allows user to easily get
rid of log file, and gives flexibility to manipulate the MAC address. The most popular virtual
machines are VMware and Virtual Box.

[+] Spoofing MAC address: Every Network interface card has a unique MAC address assigned to
it, which is used by forensic to trace hacker. Hence spoofing of MAC address makes it hard to trace
a hacker. Mac address can be spoofed manually or by using some software like this.

[+] TORs live CD: Use of live cd is another good option that can be used to add to the
anonymity.Tors live cd named as tails can be downloaded from TOR website. All the connections
in tails goes through TORs networks and it leaves no evidence of whatever youve done.

4) Preventions
This part gives general advice on safely using email,web...etc because they can easily breach your
privacy! Banking, shopping, and interacting online is the ease with which other people can now
steal your information. To stay safe on the internet, use the following strategies.

Your connection:
- Always check for secure transaction info. The best companies will have many security devices in
place. You may see a gold lock at the bottom of the page to indicate a secure site. When giving any
bank details or other information, make sure the connection is secure (URLs like this begin with
https:// instead of http://) and the site is trustworthy.
- Make sure you are using (and regularly updating) an anti-virus program, an anti-spyware program,
and a firewall.
- Use different passwords for every site

Your identity:
- Keep your eyes peeled for online scams.
- Do not give out your full name, address, or phone number to anyone online that you don't trust or
know in person.
- Block or ignore unwanted users.
- Keep your primary email address private.
- Use a fake name.
- When you change, really change! (name, adress, language, email, social network...)
- Dont use lazy passwords.
- Watch what you "say" online.

Downloading:
- Never open e-mail attachments from strangers unless you can trust them and have security
settings on your computer.
- Dont click on pop-up messages
- Dont follow links in unexpected emails
- Only download files or software from sites that have been rated/verified by trusted sources.

How your anonymity can be breached?
- IP adress
- Cookies
- Browser fingerprint
- Spyware
- PC history (in case of a computer forensic investigation)
5) Conclusion

Using the Internet, you never will be able to protect your privacy 100%. But by choosing your
provider wisely you can achieve enough privacy to protect yourself from spying investigators and
even from governments. If used these techniques in proper combination, very high anonymity can
be achieved
Hope you've enjoyed the paper!
Cordially, Daisuke Dan.
PenTester, Researcher.
The Hackers Bay.

You might also like