We are discussing the most important part of hacking where most people go wrong that is how to get anonymous. By getting anonymous we actually remove all the evidences or digital footprints of being present at the time of the happenings which take place.
How to Stay Anonymous?
First of all you have to change your IP Address. What is that? Internet Protocol Address. Each device is assigned by this numerical label. Two versions of the Internet Protocol (IP) are in use: IP Version 4 and IP Version 6.
Before knowing about getting anonymous we first need to know about the basic features that how each computer is recognized as an individual and how can one user be tracked down.
IPv4 addresses
In IPv4 an address consists of 32 bits which limits the address space to 4294967296 (232) possible unique addresses. IPv4 reserves some addresses for special purposes such as private (~18 million addresses) or multicast addresses (~270 million addresses).
An example of an IPv4 address is:
173.194.36.99 (This IP belongs to Google.)
IPv6 addresses
The rapid exhaustion of IPv4 address space, despite conservation techniques, prompted the Internet (IETF) to explore new technologies to expand the addressing capability in the Internet. The permanent solution was deemed to be a redesign of the Internet Protocol itself. This next generation of the Internet Protocol, intended to replace IPv4 on the Internet, was eventually named Internet Protocol Version 6 (IPv6) in 1995.
An example of an IPv6 address is:
2001:0db8:85a3:0000:0000:8a2e:0370:7334
So basically what you need to do is spoof your IP Address. How can you do that? Lets go through it now.
Virtual Private Network (VPNs)
It enables a computer to send and receive data across shared or public networks as if it were directly connected to the private network, while benefiting from the functionality, security and management policies of the private network. This is done by establishing a virtual point-to-point connection through the use of dedicated connections, encryption, or a combination of the two.
This seems pretty complex. Are they free? Yes and No. There are numbers free VPN services but they are not secured enough. It is always said that they keep logs. Few VPN(s) that claim they don’t keep any records and take anonymity very seriously:
SecurityKissTunnel – This limits the daily bandwidth to 300mb.
Visit: http://www.vpntutorials.com/- Around 15 VPN software’s that don’t keep logs. However I don’t vouch for them but you can try them out once.
Proxy
In computer networks, a proxy server is a server (a computer system or an application) that acts as an intermediary for requests from clients seeking resources from other servers. A client connects to the proxy server, requesting some service, such as a file, connection, web page, or other resource available from a different server and the proxy server evaluates the request as a way to simplify and control its complexity. There are other proxy changing websites you can find like www.newipnow.com
There are numerous tutorials on how to use Proxy Servers, so I’m not explaining much about them. However I suggest you to use Elite Proxy Switcher: http://www.eliteproxyswitcher.com. With this you can test your Proxy and use them.
Note: There is some transparent proxies that allow the IP Checking websites to trace back to your real IP. EPS shows that which proxy is Transparent and which is Anonymous.
Virtual Private Servers (VPS)
A virtual private server (VPS) is a virtual machine sold as a service by an Internet hosting service. A VPS runs its own copy of an operating system, and customers have super user-level access to that operating system instance, so can install almost any software that runs on that OS.
The Onion Relay (TOR)
Tor (The Onion Router) is an onion routed distributed anonymous network with a cooperatively developed freeware (Windows, Mac, GNU/Linux) software suite that enables anonymous use of the Internet.
Official Website: https://www.torproject.org/
Safety Note: If you fill out a form containing your email address, your name, or any other sensitive information while using the TOR browser, is aware that sometimes it is possible for an observer to see that information. When using TOR, use it to access websites and content that you are *not* connected to via your real identity or any username or nick name which links to your real identity. Let TOR be for anonymous browsing solely. Do your online banking, or any other activities involving your real identity using your normal web browser.
TAILS or The Amnesic Incognito Live System
Tails is a live operating system that you can start on almost any computer from a DVD or a USB stick. It aims at preserving your privacy and anonymity. It forces all Internet Connections to go through the TOR Network.
Mac Address
In computer networking, the Media Access Control (MAC) address is every bit as important as an IP address. The MAC address is a unique value associated with a network adapter. MAC addresses are also known as hardware addresses or physical addresses. They uniquely identify an adapter on a LAN.
Spoof Your Mac here: http://www.technitium.com/
Virtual Box
Let’s create a secure environment for you to browse the internet and communicate in a way that is totally anonymous and untraceable. You will have a setup that is so secure as to be virtually impossible to break. Download Oracle Virtual Box.
Official Link: http://www.virtualbox.org
There are numerous tutorials for the same so I’m not explaining this.
Perfect! So now I’m using a VPN as well as Mac Address spoofer and all that on a Virtual Box! I am totally anonymous? Sadly, I don’t think so. This brings us to our next topic:
Dns Leaks
When using an anonymity or privacy service, it is extremely important that all traffic originating from your computer is routed through the anonymity network. If any traffic leaks outside of the secure connection to the network, any adversary monitoring your traffic will be able to log your activity.
https://www.dnsleaktest.com Visit this website to find out if your DNS is leaking.
Data shredding
Data shredding — also called data sanitation, scrubbing, erasure, clearing or wiping — is the process of permanently deleting any physical trace of data which might otherwise be recoverable.
Ccleaner
It deletes all the internet temporary files and cookies which is stored in your computer as a piece of information thus it eliminates the chances of being caught.
How to Stay Anonymous?
First of all you have to change your IP Address. What is that? Internet Protocol Address. Each device is assigned by this numerical label. Two versions of the Internet Protocol (IP) are in use: IP Version 4 and IP Version 6.
Before knowing about getting anonymous we first need to know about the basic features that how each computer is recognized as an individual and how can one user be tracked down.
IPv4 addresses
In IPv4 an address consists of 32 bits which limits the address space to 4294967296 (232) possible unique addresses. IPv4 reserves some addresses for special purposes such as private (~18 million addresses) or multicast addresses (~270 million addresses).
An example of an IPv4 address is:
173.194.36.99 (This IP belongs to Google.)
IPv6 addresses
The rapid exhaustion of IPv4 address space, despite conservation techniques, prompted the Internet (IETF) to explore new technologies to expand the addressing capability in the Internet. The permanent solution was deemed to be a redesign of the Internet Protocol itself. This next generation of the Internet Protocol, intended to replace IPv4 on the Internet, was eventually named Internet Protocol Version 6 (IPv6) in 1995.
An example of an IPv6 address is:
2001:0db8:85a3:0000:0000:8a2e:0370:7334
So basically what you need to do is spoof your IP Address. How can you do that? Lets go through it now.
Virtual Private Network (VPNs)
It enables a computer to send and receive data across shared or public networks as if it were directly connected to the private network, while benefiting from the functionality, security and management policies of the private network. This is done by establishing a virtual point-to-point connection through the use of dedicated connections, encryption, or a combination of the two.
This seems pretty complex. Are they free? Yes and No. There are numbers free VPN services but they are not secured enough. It is always said that they keep logs. Few VPN(s) that claim they don’t keep any records and take anonymity very seriously:
SecurityKissTunnel – This limits the daily bandwidth to 300mb.
Visit: http://www.vpntutorials.com/- Around 15 VPN software’s that don’t keep logs. However I don’t vouch for them but you can try them out once.
Proxy
In computer networks, a proxy server is a server (a computer system or an application) that acts as an intermediary for requests from clients seeking resources from other servers. A client connects to the proxy server, requesting some service, such as a file, connection, web page, or other resource available from a different server and the proxy server evaluates the request as a way to simplify and control its complexity. There are other proxy changing websites you can find like www.newipnow.com
There are numerous tutorials on how to use Proxy Servers, so I’m not explaining much about them. However I suggest you to use Elite Proxy Switcher: http://www.eliteproxyswitcher.com. With this you can test your Proxy and use them.
Note: There is some transparent proxies that allow the IP Checking websites to trace back to your real IP. EPS shows that which proxy is Transparent and which is Anonymous.
Virtual Private Servers (VPS)
A virtual private server (VPS) is a virtual machine sold as a service by an Internet hosting service. A VPS runs its own copy of an operating system, and customers have super user-level access to that operating system instance, so can install almost any software that runs on that OS.
The Onion Relay (TOR)
Tor (The Onion Router) is an onion routed distributed anonymous network with a cooperatively developed freeware (Windows, Mac, GNU/Linux) software suite that enables anonymous use of the Internet.
Official Website: https://www.torproject.org/
Safety Note: If you fill out a form containing your email address, your name, or any other sensitive information while using the TOR browser, is aware that sometimes it is possible for an observer to see that information. When using TOR, use it to access websites and content that you are *not* connected to via your real identity or any username or nick name which links to your real identity. Let TOR be for anonymous browsing solely. Do your online banking, or any other activities involving your real identity using your normal web browser.
TAILS or The Amnesic Incognito Live System
Tails is a live operating system that you can start on almost any computer from a DVD or a USB stick. It aims at preserving your privacy and anonymity. It forces all Internet Connections to go through the TOR Network.
Mac Address
In computer networking, the Media Access Control (MAC) address is every bit as important as an IP address. The MAC address is a unique value associated with a network adapter. MAC addresses are also known as hardware addresses or physical addresses. They uniquely identify an adapter on a LAN.
Spoof Your Mac here: http://www.technitium.com/
Virtual Box
Let’s create a secure environment for you to browse the internet and communicate in a way that is totally anonymous and untraceable. You will have a setup that is so secure as to be virtually impossible to break. Download Oracle Virtual Box.
Official Link: http://www.virtualbox.org
There are numerous tutorials for the same so I’m not explaining this.
Perfect! So now I’m using a VPN as well as Mac Address spoofer and all that on a Virtual Box! I am totally anonymous? Sadly, I don’t think so. This brings us to our next topic:
Dns Leaks
When using an anonymity or privacy service, it is extremely important that all traffic originating from your computer is routed through the anonymity network. If any traffic leaks outside of the secure connection to the network, any adversary monitoring your traffic will be able to log your activity.
https://www.dnsleaktest.com Visit this website to find out if your DNS is leaking.
Data shredding
Data shredding — also called data sanitation, scrubbing, erasure, clearing or wiping — is the process of permanently deleting any physical trace of data which might otherwise be recoverable.
Ccleaner
It deletes all the internet temporary files and cookies which is stored in your computer as a piece of information thus it eliminates the chances of being caught.


4 comments
Wow this sounds very useful! I will bookmark this and keep referring back to it. Thanks!
ReplyI'm bookmarking your site and this page. I might be doing some blackhat tricks so xD :D
ReplyThanks man.
I might try this, thanks for the post.
ReplyExtremely usefull!
ReplyPost a Comment