Donate to us via Paypal!
Don't judge the unknown - Grindordie
Saturday, November 28, 2020
Navigation
Home
 Find:
 Information:
Learn
Communicate
Submit
Shop
Challenges
 Exploit:
 Programming:
 Think:
 Track:
 Patch:
 Other:
 Need Help?
Other
Members Online
Total Online: 88
Guests Online: 86
Members Online: 2

Registered Members: 130554
Newest Member: Mr Clown
Latest Articles

View Thread

HellBound Hackers | Computer General | Web hacking

Author

Anonimaty.


Member

Your avatar

Posts:
Location:
Joined: 01.01.70
Rank:
Guest
Posted on 15-11-06 13:47
I was thinking about this today, can we create a list of ways to hide your IP address while doing web hacking.

And give ideas and tips on how to go about it. this will help anyone new to the scene, and stop them being caught.

www.torpark.com is a windows mod for firefox, when you use it your IP is hidden behind a bank of random proxy servers. and can easily be used to mask your attacks.
nights_shadow wrote:
HOW TORPARK WORKS
When a user logs onto the Internet, a unique IP address is assigned to manage the computer’s identity. Each website the user visits can see and log the user’s IP address. Hostile governments and data thieves can easily monitor this interaction to correlate activity and pinpoint a user’s identity.

Torpark causes the IP address seen by the website to change every few minutes to frustrate eavesdropping and mask the requesting source. For example, a user could be surfing the Internet from a home computer in Ghana, and it might appear to websites that the user was coming from a university computer in Germany or any other country with servers in the TOR network.

It is important to note that the data passing from the user’s computer into the TOR network is encrypted. Therefore, the user’s Internet Service Provider (ISP) cannot see the information that is passing through the Torpark browser, such as the websites visited, or posts the user might have made to a forum. The ISP can only see an encrypted connection to the TOR network.

However, users must understand that there are limitations to the anonymity. Torpark anonymizes the user’s connection but not the data. Data traveling between the client and the TOR network is encrypted, but the data between the TOR network and websites is unencrypted. Therefore, the user should not use his/her username or password on websites that do not offer a secure login and session (noted by a golden padlock at the bottom of the Torpark browser screen).

DOWNLOAD TORPARK
http://torpark.nfshost.com/download.html


More suggestions welcome.

Edited by on 15-11-06 20:01
Author

RE: Anonimaty.


Member

Your avatar

Posts:
Location:
Joined: 01.01.70
Rank:
Guest
Posted on 15-11-06 14:05
google, and articles will easily let you find this........
Author

RE: Anonimaty.

Uber0n
Member



Posts: 1963
Location: Sweden‭‮
Joined: 13.06.06
Rank:
Hacker Level 3
Posted on 15-11-06 19:31
Well there are many applications that use proxy servers to hide your IP, but are you talking about other methods than using proxy servers or just other programs to use them?


img230.imageshack.us/img230/724/uber0nsig3hj6.gif
http://uber0n.web. . .
Nope http://uber0n.webs.com/
Author

RE: Anonimaty.


Member

Your avatar

Posts:
Location:
Joined: 01.01.70
Rank:
Guest
Posted on 15-11-06 19:34
that link takes me to a site in Japanese or Chinese. wtf? why not just roll with a proxy?


Author

RE: Anonimaty.


Member

Your avatar

Posts:
Location:
Joined: 01.01.70
Rank:
Guest
Posted on 15-11-06 19:50
HOW TORPARK WORKS
When a user logs onto the Internet, a unique IP address is assigned to manage the computer’s identity. Each website the user visits can see and log the user’s IP address. Hostile governments and data thieves can easily monitor this interaction to correlate activity and pinpoint a user’s identity.

Torpark causes the IP address seen by the website to change every few minutes to frustrate eavesdropping and mask the requesting source. For example, a user could be surfing the Internet from a home computer in Ghana, and it might appear to websites that the user was coming from a university computer in Germany or any other country with servers in the TOR network.

It is important to note that the data passing from the user’s computer into the TOR network is encrypted. Therefore, the user’s Internet Service Provider (ISP) cannot see the information that is passing through the Torpark browser, such as the websites visited, or posts the user might have made to a forum. The ISP can only see an encrypted connection to the TOR network.

However, users must understand that there are limitations to the anonymity. Torpark anonymizes the user’s connection but not the data. Data traveling between the client and the TOR network is encrypted, but the data between the TOR network and websites is unencrypted. Therefore, the user should not use his/her username or password on websites that do not offer a secure login and session (noted by a golden padlock at the bottom of the Torpark browser screen).

DOWNLOAD TORPARK
http://torpark.nfshost.com/download.html


Author

RE: Anonimaty.


Member

Your avatar

Posts:
Location:
Joined: 01.01.70
Rank:
Guest
Posted on 15-11-06 19:58
nights_shadow wrote:
HOW TORPARK WORKS
When a user logs onto the Internet, a unique IP address is assigned to manage the computer’s identity. Each website the user visits can see and log the user’s IP address. Hostile governments and data thieves can easily monitor this interaction to correlate activity and pinpoint a user’s identity.

Torpark causes the IP address seen by the website to change every few minutes to frustrate eavesdropping and mask the requesting source. For example, a user could be surfing the Internet from a home computer in Ghana, and it might appear to websites that the user was coming from a university computer in Germany or any other country with servers in the TOR network.

It is important to note that the data passing from the user’s computer into the TOR network is encrypted. Therefore, the user’s Internet Service Provider (ISP) cannot see the information that is passing through the Torpark browser, such as the websites visited, or posts the user might have made to a forum. The ISP can only see an encrypted connection to the TOR network.

However, users must understand that there are limitations to the anonymity. Torpark anonymizes the user’s connection but not the data. Data traveling between the client and the TOR network is encrypted, but the data between the TOR network and websites is unencrypted. Therefore, the user should not use his/her username or password on websites that do not offer a secure login and session (noted by a golden padlock at the bottom of the Torpark browser screen).

DOWNLOAD TORPARK
http://torpark.nfshost.com/download.html


I should have added this, and will in fact copy and paste this into my OP.

At the others, what I am talking about, is sharing ways of keeping our hacks private and hidden from server admins.

Torpark is one method, so lets as a community start posting more ways. and yes other sites offer this information, but this site has a good community feeling to it, so why not add to it by compiling a nice list of information here as well, keep the users here for their hacking fix instead of asking them to go visit some other site.