Follow us on Twitter!
Society leans ever heavily on computers, if you have the power to take out computers you can take out society. - cubeman372
Wednesday, April 16, 2014
Navigation
Home
HellBoundHackers Main:
HellBoundHackers Find:
HellBoundHackers Information:
Learn
Communicate
Submit
Shop
Challenges
HellBoundHackers Exploit:
HellBoundHackers Programming:
HellBoundHackers Think:
HellBoundHackers Track:
HellBoundHackers Patch:
HellBoundHackers Other:
HellBoundHackers Need Help?
Other
Members Online
Total Online: 19
Guests Online: 15
Members Online: 4

Registered Members: 82811
Newest Member: IsaiahBowman
Latest Articles
View Thread

HellBound Hackers | HellBound Hackers | Questions

Author

Proxies


Member

Your avatar

Posts:
Location:
Joined: 01.01.70
Rank:
Guest
Posted on 28-06-08 04:40
Now when a hacker per say, uses a proxy, would they then after using the proxy service. Would the hacker then hack into the proxy and remove the logs made by the hacker.


Author

RE: Proxies


Member

Your avatar

Posts:
Location:
Joined: 01.01.70
Rank:
Guest
Posted on 28-06-08 04:48
That isn't necessary. Simply use a few different proxies so if someones trying to track you down they'll have to go through a lot of shit for it. When your done with w/e your doing simply change your IP address. Hacking the proxies shouldnt be necessary.


Author

RE: Proxies


Member

Your avatar

Posts:
Location:
Joined: 01.01.70
Rank:
Guest
Posted on 28-06-08 04:50
K_I_N_G wrote:
That isn't necessary. Simply use a few different proxies so if someones trying to track you down they'll have to go through a lot of shit for it. When your done with w/e your doing simply change your IP address. Hacking the proxies shouldnt be necessary.


TOR doesn't keep logs. It's also a rotating proxy.


Author

RE: Proxies


Member

Your avatar

Posts:
Location:
Joined: 01.01.70
Rank:
Guest
Posted on 28-06-08 04:55
slpctrl wrote:
K_I_N_G wrote:
That isn't necessary. Simply use a few different proxies so if someones trying to track you down they'll have to go through a lot of shit for it. When your done with w/e your doing simply change your IP address. Hacking the proxies shouldnt be necessary.


TOR doesn't keep logs. It's also a rotating proxy.


Yes I believe the intelligent move would be to use a proxy that doesnt track logs although should you use one that does you need not to hack the site. Wow that sounded weird....


Author

RE: Proxies


Member

Your avatar

Posts:
Location:
Joined: 01.01.70
Rank:
Guest
Posted on 28-06-08 04:57
I do use tor. However I have noticed that some pages try to block privoxy and judging how tor is configured to run through it then idk how safe it can really be.
Hmm.


Author

RE: Proxies


Member

Your avatar

Posts:
Location:
Joined: 01.01.70
Rank:
Guest
Posted on 29-06-08 06:24
All right cool. Thanks for the update.
For people who do use tor use the Network Map and test headers of the "open" site within your map. If no good, time to change your identity.



Author

RE: Proxies


Member

Your avatar

Posts:
Location:
Joined: 01.01.70
Rank:
Guest
Posted on 01-07-08 06:17
For the past few days I have been searching proxies. I was even hunting proxies, and I still never came across a functional/safe proxy. Actually on that note, I don't think I ever came across a functional one.
So how would somebody suggest to obtain a proxy? Is the best way to hack some rando and use that as your proxy? That seems harder to remove the trace, logs.


Author

RE: Proxies


Member

Your avatar

Posts:
Location:
Joined: 01.01.70
Rank:
Guest
Posted on 01-07-08 06:19
chronicburst wrote:
For the past few days I have been searching proxies. I was even hunting proxies, and I still never came across a functional/safe proxy. Actually on that note, I don't think I ever came across a functional one.
So how would somebody suggest to obtain a proxy? Is the best way to hack some rando and use that as your proxy? That seems harder to remove the trace, logs.


Use Tor, or sign up for an active proxy list.


Author

RE: Proxies

Uber0n
Member



Posts: 1963
Location: Sweden‭‮
Joined: 13.06.06
Rank:
Hacker Level 3
Posted on 01-07-08 11:19
chronicburst wrote:
So how would somebody suggest to obtain a proxy? Is the best way to hack some rando and use that as your proxy? That seems harder to remove the trace, logs.

Sure, clearing logs might be hard. But do you really think getting full access to a computer and setting it up as a proxy is that easy?


img230.imageshack.us/img230/724/uber0nsig3hj6.gif
http://uber0n.web. . .
Nope http://uber0n.webs.com/
Author

RE: Proxies


Member

Your avatar

Posts:
Location:
Joined: 01.01.70
Rank:
Guest
Posted on 01-07-08 19:00
No sir, I do not. However I could possibly go to a net cafe and execute and arp attack. From there I can use one of the local computer. Hoping the person is there long enough.
And an active proxy list. I will google for some subscriptions, if you know of one you like please share..