Welcome to HBH! If you have tried to register and didn't get a verification email, please using the following link to resend the verification email.

Anonymous On A Network?


ghost's Avatar
0 0

Well im off to uni soon

all my activity on my computer will be monitored, not too bother but would be nice to find a way around it

My question is has anyone got experience with remaining Anonymous internally on a network?

And if so what is the theory behind it. I was thinking possibly spoofing the mac address, but that will still leave my static I.P =/

Cheers Guys

mambo


spyware's Avatar
Banned
0 0

Proxies, SSH tunneling, VPN'ing, whatever.


ghost's Avatar
0 0

Edited for emphasis:

Zephyr_Pure wrote: If that wasn't the answer you were looking for, then you should consider elaborating on what it is that you are trying to do that requires "evading the monitoring".


ghost's Avatar
0 0

yes, my question is regarding how to be anonymous on an internal network, LAN.

Is it possible to give yourself a different identity on an internal network, so they would not know it was moi.

regards

Mambo


ghost's Avatar
0 0

mambo wrote: how to be anonymous on an internal network

That depends on how you access the LAN. If you are using a wired connection that leads to your room or to something that specifically identifies you; and they have the best possible logging (logs of MAC/IP changes for specific physical ports) then you can't really stay anonymous. However, if you are accessing it via a public ethernet port (in an area that doesn't have cameras) or are using wifi, then you can spoof the MAC address of your network card and remain fairly anonymous. (assuming you don't send any unencrypted traffic that can identify you.)

If you just want it so people can't snoop on your traffic then you can use encryption via one of the options Spyware described.

I wouldn't be too worried about universities/other students logging your traffic… unless you're doing something exceptional - like something illegal that pisses off a large organization. In which case I would tell you that 'You're heading to uni, you're probably not a minor anymore, it's time that you begin contributing to open ideas instead of going on hacking power trips'.

Most students will probably make use of the same services you do.. (porn, e-mail, hacking sites).. so unless you do something that will make people want to target you (high profile illegal, rage the wrong geeks) then I wouldn't be worried about it.


ghost's Avatar
0 0

maug wrote: :whoa:

Well, isn't that special.


ghost's Avatar
0 0

Normally, I do take the time to respond in a way that refutes what a person says (which proves it being bad / wrong to some extent). This time, though, I didn't feel like digging through it all to make a knowledgeable retort with accurate explanations so… you get what you see.

Re-read your post, see how much sense it makes to you (pretending that you're knowledgeable about networking), then tell me what an "ID" is and how SSH will help you get one. Refute yourself.


ghost's Avatar
0 0

maug wrote: I'm not that knowledable when it comes to networking.

Well, there you have it. Still no idea what you mean by "ID"… maybe it's just a phonetic mistake on your part when attempting to refer to an "IP". Also, what are you going to SSH… to?


spyware's Avatar
Banned
0 0

Zephyr_Pure wrote: Well, there you have it. Still no idea what you mean by "ID"… maybe it's just a phonetic mistake on your part when attempting to refer to an "IP". Also, what are you going to SSH… to?

I think what Maug meant, is that you could hijack someone's (local) network account, and use that to establish any kind of "ambiguous" activity.

As for the SSH protocol, don't tell me you aren't hooked up to the Girlssh gone wild server?


ghost's Avatar
0 0

spyware wrote: I think what Maug meant, is that you could hijack someone's (local) network account, and use that to establish any kind of "ambiguous" activity.

That depends on how their DC is set up regarding login restrictions but, yes, you could compromise another account and login using that otherwise. It doesn't anonymize your traffic; only your domain identity. As previously mentioned, a changing MAC and wireless connection will go a long way towards anonymizing yourself. Also, if DHCP is allowed on the network, you could achieve a similar result by popping your IP on an interval. Ultimately, though, you need an encrypted tunnel to cover more than the origin / destination of your traffic.

As for the SSH protocol, don't tell me you aren't hooked up to the Girlssh gone wild server?

ASCII pr0n pwnz0rz.


ghost's Avatar
0 0

maug wrote: chillax it gangsta. … Don't do that. Ever.

Short for "identity". I wasn't trying to use words I didn't know. the op asked for basic theory, I gave key words "enumeration", "computer forensics", and a small joke about porn at the end.

ID != identity… at least, not in IT. It's good that you gave him keywords to research. Basic theory is good, but being too vague can also be non-constructive. That was the point of my responses.


ghost's Avatar
0 0

maug wrote: Point taken.

Wow… Can I get you to translate what I'm saying for all the morons that feel like arguing? It's never been THAT easy for me as it was just now. :)

And somehow I knew you wouldn't llike the gangsta thing. xD It's a very rare occasion in which someone says something so hideous that it actually embarasses me for being in the conversation at all. You have achieved that. Was a good laugh, though… somewhere.