Have an account?
It looks like you're new here. If you want to get involved, click one of these buttons!
Apply for Membership
Who's Online (2)
Looking to introduce yourself? Look no further, and click here! We also have IRC! [irc.evilzone.org #iexploit]
Tor or a VPN?
I was wondering what is better to use, Tor or a VPN?
And does a VPN cover up everything you do on the internet rather than just web browsing such as connecting to servers via cmd ? :)
NOTHING hides you 100%. A VPN and a proxy-chain gives you a good chance though.
I don't like tor, not used it in ages.
Hmm okay. Are there free VPN's most of the ones i find are paid ones? Didnt think of proxy chains, will check that out now thanks.
I prefer proxy chains. I have a guide HERE
I use hotspotshield VPN, chronic's suggestions good too :)
Get a paid vpn there cheap it also covers all things rather than just web. Public vpns are junk though i would't use them.
More over if you use tor and planning to do any serious hacking means,it is possible for the LAW enfrocement to catch you easily,here is the advice i got it from one of my PRO friend regarding anonimzationbefore some months,but i tought it would be useful for you
1)never use vulnerable anonymouse networks like tor or any other public or unpaid proxy service.
2)never use a static ip while hacking.
3)never use different or somr rare browser agents in your browser
Here is one more information,As far as i know people who are doing serious hacking uses some kind of complex routing mechanisms for anonimization,but i don't know what exactly they are doing...
trying to find it...
Okay nice thanks guys for all of the suggestions. :)
How do I know if my IP is static or not ? Not really heard anything about that before.
pivoting through a server you've taken over is effective as you can delete the logs, thus cutting off alot of the evidence between you and the box that you commit your crimes from.
also, I've heard of people tunneling through infected hosts on botnets for anonymity. Just some ideas.
basically, if you have control over one of the links between you and your target and are able to erase your tracks on one of said links you'll be fine for the most part, using proxies inbetween will improve the effectiveness even more. remember though, there will always be something left over, leave no stone unturned. I realize neither of those methods are considered a VPN, nor are they part of Tor, but they're old techniques that still work great.
while( !(succeed = try() ) );
i mentioned this before in one of my last posts. i believe the elite way of doing it is controlling each route point (good luck!) by setting up a GRE tunnel. as i said in my post, not exactly easy by any means, but almost undetectable if you do it right
+ This ain't allowing me to register for a free account,says your country limit for the free account exceeds..
looks like it sucks...
Thanks for all the input guys. Have taken all of this into consideration. That GRE tunneling sounds a bit too difficult though for me :)
is IS difficult! i only know about the concept, i have not actually done it myself. i have seen how to set one up on a Cisco CLI but i have not actually done it
Add a Comment