Welcome to HBH! If you have tried to register and didn't get a verification email, please using the following link to resend the verification email.

Anonimaty.


ghost's Avatar
0 0

I was thinking about this today, can we create a list of ways to hide your IP address while doing web hacking.

And give ideas and tips on how to go about it. this will help anyone new to the scene, and stop them being caught.

www.torpark.com is a windows mod for firefox, when you use it your IP is hidden behind a bank of random proxy servers. and can easily be used to mask your attacks.

nights_shadow wrote: HOW TORPARK WORKS When a user logs onto the Internet, a unique IP address is assigned to manage the computer’s identity. Each website the user visits can see and log the user’s IP address. Hostile governments and data thieves can easily monitor this interaction to correlate activity and pinpoint a user’s identity.

Torpark causes the IP address seen by the website to change every few minutes to frustrate eavesdropping and mask the requesting source. For example, a user could be surfing the Internet from a home computer in Ghana, and it might appear to websites that the user was coming from a university computer in Germany or any other country with servers in the TOR network.

It is important to note that the data passing from the user’s computer into the TOR network is encrypted. Therefore, the user’s Internet Service Provider (ISP) cannot see the information that is passing through the Torpark browser, such as the websites visited, or posts the user might have made to a forum. The ISP can only see an encrypted connection to the TOR network.

However, users must understand that there are limitations to the anonymity. Torpark anonymizes the user’s connection but not the data. Data traveling between the client and the TOR network is encrypted, but the data between the TOR network and websites is unencrypted. Therefore, the user should not use his/her username or password on websites that do not offer a secure login and session (noted by a golden padlock at the bottom of the Torpark browser screen).

DOWNLOAD TORPARK http://torpark.nfshost.com/download.html

More suggestions welcome.


ghost's Avatar
0 0

google, and articles will easily let you find this……..


Uber0n's Avatar
Member
0 0

Well there are many applications that use proxy servers to hide your IP, but are you talking about other methods than using proxy servers or just other programs to use them?


ghost's Avatar
0 0

that link takes me to a site in Japanese or Chinese. wtf? why not just roll with a proxy?


ghost's Avatar
0 0

HOW TORPARK WORKS When a user logs onto the Internet, a unique IP address is assigned to manage the computer’s identity. Each website the user visits can see and log the user’s IP address. Hostile governments and data thieves can easily monitor this interaction to correlate activity and pinpoint a user’s identity.

Torpark causes the IP address seen by the website to change every few minutes to frustrate eavesdropping and mask the requesting source. For example, a user could be surfing the Internet from a home computer in Ghana, and it might appear to websites that the user was coming from a university computer in Germany or any other country with servers in the TOR network.

It is important to note that the data passing from the user’s computer into the TOR network is encrypted. Therefore, the user’s Internet Service Provider (ISP) cannot see the information that is passing through the Torpark browser, such as the websites visited, or posts the user might have made to a forum. The ISP can only see an encrypted connection to the TOR network.

However, users must understand that there are limitations to the anonymity. Torpark anonymizes the user’s connection but not the data. Data traveling between the client and the TOR network is encrypted, but the data between the TOR network and websites is unencrypted. Therefore, the user should not use his/her username or password on websites that do not offer a secure login and session (noted by a golden padlock at the bottom of the Torpark browser screen).

DOWNLOAD TORPARK http://torpark.nfshost.com/download.html


ghost's Avatar
0 0

nights_shadow wrote: HOW TORPARK WORKS When a user logs onto the Internet, a unique IP address is assigned to manage the computer’s identity. Each website the user visits can see and log the user’s IP address. Hostile governments and data thieves can easily monitor this interaction to correlate activity and pinpoint a user’s identity.

Torpark causes the IP address seen by the website to change every few minutes to frustrate eavesdropping and mask the requesting source. For example, a user could be surfing the Internet from a home computer in Ghana, and it might appear to websites that the user was coming from a university computer in Germany or any other country with servers in the TOR network.

It is important to note that the data passing from the user’s computer into the TOR network is encrypted. Therefore, the user’s Internet Service Provider (ISP) cannot see the information that is passing through the Torpark browser, such as the websites visited, or posts the user might have made to a forum. The ISP can only see an encrypted connection to the TOR network.

However, users must understand that there are limitations to the anonymity. Torpark anonymizes the user’s connection but not the data. Data traveling between the client and the TOR network is encrypted, but the data between the TOR network and websites is unencrypted. Therefore, the user should not use his/her username or password on websites that do not offer a secure login and session (noted by a golden padlock at the bottom of the Torpark browser screen).

DOWNLOAD TORPARK http://torpark.nfshost.com/download.html

I should have added this, and will in fact copy and paste this into my OP.

At the others, what I am talking about, is sharing ways of keeping our hacks private and hidden from server admins.

Torpark is one method, so lets as a community start posting more ways. and yes other sites offer this information, but this site has a good community feeling to it, so why not add to it by compiling a nice list of information here as well, keep the users here for their hacking fix instead of asking them to go visit some other site.