• XSS.stack #1 – первый литературный журнал от юзеров форума

how to be anonymous

Lots of servers block Tor's exit nodes, so you might not be able to route your network traffic through Tor. You can try Qubes OS + Whonix.

The other way is to pay for a VPS and VPN anonymously, connect to your VPN and tunnel your traffic through the VPS.
The VPS might get deanonymized if you use a VPN inside it, so it's up to you to use one inside it. The VPN and VPS providers might be saving logs.

Have good OPSec, don't be dumb nor greedy. You should be fine with these tips.

Recommendations: Njalla (VPS) and Mullvad (VPN).
 
Hello!

I have a question for each of you.

How to remain completely anonymous when attacking websites?
( I use Burp Suite, DirBuster e.t.c)


Thanks for the answers!
You could probably use proxychains, but that will be terribly slow. As above mentioned the best and easiest solutions. But you can also try find some free wifi spots and try from there if any available in your area.
 
Thanks!!
I use VPN and a anonsurf/nipe, additionally the neighbor's wifi.
My main system is Kali Linux, and sometimes i using tails for pendrive.
Of course, it encrypts its drive, using veracrypt.
Do you think this is enough?
You should be fine.
Remember that when they knock on your neighbor's door, they will knock on yours as well. It can buy you time, but nothing else.

Tails is very good. Give Qubes OS + Whonix a try as well.

Full disk encryption is the way to go if you don't risk leaving files in unencrypted sectors of any drive.
 
Thanks for the reply message, then I would have to give up my system for qubes os.
Somehow it does not encourage me, even the appearance itself, the lack of tools.

Mybe there is another solution?
Kali Linux's tools are public and open-source... You can install them in any Linux OS.
Add their repositories, and install the tools you need.

 


Напишите ответ...
  • Вставить:
Прикрепить файлы
Верх