Copy Link
Add to Bookmark
Report

The Discordant Opposition Journal Issue 05 File 02

  

::::::::::::::::::::::::::::::::::::::::::::::::::::::::May/99
::: The Discordant Opposition Journal ::: Issue 5 - File 2 :::
::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::

:Quenching the Source:
cronus

Any hacker who has ever hacked anything more immpressive then his Linux
partition will tell you that the most important part of hacking is
hiding your own location. It is so essential to hide your location that
it becomes instinctive for hackers. I shall discuss some techniques,
both new and old, of hiding you real location.

ISP

The most important part of your hacking sequence is going to be your
net account. If you are traced back to your ISP, then their logs will
be able to tell the victim who you are, where you live and what you eat
for breakfast. You can avoid being traced back to your own account by
hacking someone else's net account and using that. Some Internet
Providers allow you to set up a Guest account so you can test their
services. If you can’t hack another account on an ISP, then you should
try to get your hands on a Guest account to hack from. It is necessary
that you don’t hack from your own account so that you aren’t traced to
your name and address. Getting a Guest account should be easy enough.
Contact an ISP and ask about their services. Then ask if you can have
a Guest account to see if it compares to the others. You will need to
give false information to the ISP so that you are safe.

Bounce

After all this, you are still possibly being traced to your city and
general location. So next you want to hide your geographical location,
as well as your net location. There are several ways to hide your
physical location. First is a practice that has essentially vanished
from the mainstream. Wingate is a software package that allows many
computers to connect to the internet through a single internet
connection. A hole in the Wingate system was found that allowed people
to bounce thier connection from the Wingate machine. Wingating can be
used to 'bounce' your data packets off another system, to hide your IP
address.

Back Orifice is a trojan hacking program that allows people to take
control on certain functions on infected computers. The 'redirect'
option allows for IP redirects to be set up. A redirect is set up on
an infected computer. Any packets that are sent to the redirect port
on the infected machine will be bounced to the new destination without
being logged. This is a very anonymous way of bouncing a connection.
And several infected computers can be strung together to add greater
protection. Also the 'system password' option in Back Orifice allows
people to view any cached passwords on the infected system. This can
often render ISP passwords, letting you attack from a false account.

Also many companies over the net offer free shell accounts and these
are perfect ways to hide your IP address. You connect to the shell
account and do your hacking from there and so hide where you are coming
from. Again you will need to give false information for that to so that
you are totally safe.

Phone

You may want to take the added precaution of hacking from a different
phone line. By this I mean with a laptop at a pay phone or even in an
Internet cafe. Preferably one that allows you some privacy. You can
connect a laptop to the side of pay phone or even the side of a house.
This is called beige boxing and is used widely by phreaks.

Next is out-dials. These are diminishing fast, because of their use by
hackers, but some universities still run them for their students. An
out-dial is a computer that is set up to let you dial out over its
modem to another computer. These can be used to call another system
and from their you can hack away. This means that the trace can only go
as far as the out-dial and then it would slow down any trace allot as
anyone tries to move the trace to the university line. If the
University is logging the connection then they will have your IP
address. But if you are spoofing your IP address or if you are using
another net account that isn’t yours then this isn’t a problem.

Spoofing

IP spoofing is an extremely complex and difficult technique used by
hackers to hide their IP address. I can and will only skim the surface
of spoofing, giving you enough information so that you can go and
search for more information on your own.

If you have root access on an UNIX machine, then you can program a
program to hide your IP address in data packets. By creating custom
made packets you can choose what information to include, so you can
obscure your connection address. IP spoofing takes a huge ammount of
skill as you must adhere to known Internet standards. My site at
http://homepages.iol.ie/~cronus has some excellent files on IP spoofing.

Systems

As a hackers repertoir of hacked computers grows, it can be very useful
to route your connection through them. The more connections you have
and the more often you rearrange the stops, the less likely you are of
being traced to your originating connection. The more connections you
can make between you and the victim, the better you have hidden your
location, your identity and your freedom.



All this may seem like basic ideas that you would have used anyway. But
you'd be surprised at how many elite hackers have been arrested because
they got too big headed and neglected to use any protection. Also
remember that you should change the route you take each time. This is
so that over a few different hacking sessions you aren't slowly traced
section by section. If you change the route often then you will make
each trace a brand new one.

... intoxicated with the madness ...
cronus (at) iol (dot) ie
___________ ____ ____ __ __ ______
_/ ___\_ __ \/ _ \ / \| | \/ ___/
\ \___| | \( <_> ) | \ | /\___ \
\___ >__| \____/|___| /____//____ >
\/ \/ \/
http://homepages.iol.ie/~cronus

← previous
next →
loading
sending ...
New to Neperos ? Sign Up for free
download Neperos App from Google Play
install Neperos as PWA

Let's discover also

Recent Articles

Recent Comments

Neperos cookies
This website uses cookies to store your preferences and improve the service. Cookies authorization will allow me and / or my partners to process personal data such as browsing behaviour.

By pressing OK you agree to the Terms of Service and acknowledge the Privacy Policy

By pressing REJECT you will be able to continue to use Neperos (like read articles or write comments) but some important cookies will not be set. This may affect certain features and functions of the platform.
OK
REJECT