Anonymity Network for Hackers / Guide

Talk anything about anonymity
User avatar
TheVikingsofDW
Posts: 283
Joined: Thu Feb 01, 2024 5:54 pm
Location: Budapest

Anonymity Network for Hackers / Guide

Postby TheVikingsofDW » Mon Jun 17, 2024 7:47 am

For hackers, preserving anonymity is of paramount significance, through an astute amalgamation of secure protocols, Virtual Private Networks (VPNs), proxies, and anonymisation networks, one can attain an elevated degree of anonymity without incurring exorbitant pecuniary costs.

In this instructional guide, we shall explore how to optimise one's Proxychains with two configurations for maximum security and anonymity.

Comprehending Proxychains
Proxychains compels any Transmission Control Protocol (T*****) connexion made by any given application to traverse proxies such as The Onion Router (TOR), SOCKS4, SOCKS5, and HTTP(S). This assists in obfuscating one's Internet Protocol (IP) address and achieving elevated levels of anonymity.

Configuration 1: VPN -> SSHuttle over Tor -> Virtual Machine -> I2P Privoxy -> Virtual Private Server
This configuration layers multiple anonymisation techniques to obfuscate one's origin and protect one's traffic at multiple points.

STEPS FOR CONFIGURATION 1:
1. VPN as the Base Layer:
The VPN encrypts all traffic from one's device to the VPN server, concealing one's IP address from one's Internet Service Provider (ISP) and providing a primary layer of anonymity.
Example utilising Mullvad VPN:

Code: Select all

sudo apt-get install mullvad-vpn
mullvad connect


2. SSHuttle over Tor Hidden Service:
SSHuttle routes all traffic through an SSH tunnel, adding another layer of encryption and obfuscation.

Code: Select all

sshuttle -r [email protected] 0/0


3. Virtual Machine (VM):
Running operations inside a VM provides isolation from the host machine, which is beneficial for maintaining security and anonymity.

Code: Select all

sudo apt-get install virtualbox
virtualbox


4. I2P Privoxy:
I2P provides another anonymisation layer, and Privoxy can help to further obfuscate HTTP traffic.

Code: Select all

# Install and start I2P
sudo apt-get install i2p
i2prouter start

# Configure Privoxy to use I2P
sudo apt-get install privoxy
sudo nano /etc/privoxy/config
# Add the following lines
forward-socks4a / 127.0.0.1:4444 .
listen-address 127.0.0.1:8118


5. Non-KYC Virtual Private Server (VPS) as the Final Destination:
Utilising a VPS as the exit point ensures that one's final traffic destination perceives the VPS's IP address, not one's own. Preferably, always use Non-KYC VPS providers and pay in XMR.

Code: Select all

# Connect to the VPS via I2P Privoxy
export http_proxy="https://127.0.0.1:8118"
curl -x https://127.0.0.1:8118 https://your-vps-address


Quick Recapitulation for Configuration 1:
Connect to VPN. > Utilise SSHuttle to route traffic over a Tor hidden service. > Operate inside a VM. > Route VM traffic through I2P utilising Privoxy. > Exit through a Non-KYC VPS.

Configuration 2: SSHuttle Concealed Service -> Tor Concealed Service -> Cloudflare HTTP Proxy
This configuration centres upon leveraging concealed services and commercial proxies to establish a robust anonymisation chain.

STEPS FOR CONFIGURATION 2:
1. SSHuttle as a Tor Concealed Service:
Running SSHuttle as a concealed service ensures that one's SSH tunnel endpoint is obscured within the Tor network.

Code: Select all

# Establish a Tor concealed service for SSH
sudo apt-get install tor
sudo nano /etc/tor/torrc
# Append the following lines
HiddenServiceDir /var/lib/tor/sshuttle/
HiddenServicePort 22 127.0.0.1:22
sudo service tor restart

# Obtain the .torify.net address
sudo cat /var/lib/tor/sshuttle/hostname


2. Exit to Another Privoxy Tor Concealed Service:
Adding another Tor concealed service layer ensures that traffic is routed through multiple Tor relays, augmenting anonymity.

Code: Select all

# Establish Privoxy as a Tor concealed service
sudo nano /etc/tor/torrc
# Add another concealed service for Privoxy
HiddenServiceDir /var/lib/tor/privoxy/
HiddenServicePort 8118 127.0.0.1:8118
sudo service tor restart

# Configure Privoxy
sudo apt-get install privoxy
sudo nano /etc/privoxy/config
# Add the following lines
forward-socks5 / 127.0.0.1:9050 .
listen-address 127.0.0.1:8118
sudo service privoxy restart


3. Cloudflare HTTP Proxy:
Cloudflare's HTTP proxy can mask one's final exit IP and add DDoS protection.

Code: Select all

# Utilise the Cloudflare proxy by configuring the application to use an HTTP proxy
export http_proxy="https://cloudflare-proxy:port"
curl -x https://cloudflare-proxy:port https://example.com


Quick Recapitulation for Configuration 2:
Establish SSHuttle as a Tor concealed service. > Exit from SSHuttle through another Tor concealed service utilising Privoxy. > Route the final traffic through a Cloudflare HTTP proxy.

Supplementary Implements and Methodologies

- Utilising Multiple Virtual Private Networks (VPN Concatenation):
Establish a connection to one VPN, and thereafter connect to another VPN within the Virtual Machine or container.
This can be accomplished by configuring the second VPN in the VM or container.

Exemplar:

Code: Select all

# Connect to the inaugural VPN
mullvad connect

# Inside VM or container, connect to another VPN
sudo openvpn --config second_vpn_config.ovpn


- Amalgamating IPv6 Mesh Networks:

a) Yggdrasil:

Code: Select all

sudo apt-get install yggdrasil
sudo yggdrasil -useconf /etc/yggdrasil.conf


b) CJDNS:

Code: Select all

git clone https://github.com/cjdelisle/cjdns.git
cd cjdns
./do
sudo ./cjdroute < cjdroute.conf


By ingeniously amalgamating and juxtaposing these implements and methodologies, one might engender intricate, multifaceted anonymisation configurations that markedly augment one's security and anonymity.
Comprehending the software and its capacities enables one to construct robust arrangements that safeguard one's identity and data.

Regularly rotating and updating these setups furthermore ensures that one's operations remain secure and anonymous.

Code: Select all

___  _____      __
| _ )/ __\ \    / /
| _ \ (__ \ \/\/ /
|___/\___| \_/\_/

----- TheVikingsOfDW -----
A Proud Staff Member Of BCW

User avatar
BlackMoneyFamily
Posts: 8
Joined: Sat Jul 06, 2024 2:45 am

Re: Anonymity Network for Hackers / Guide

Postby BlackMoneyFamily » Sat Jul 06, 2024 7:17 pm

Any more post or forums on these techniques, I would like to learn more!

Sincerely,
B<M<F
Black Money Family
B<M<F
Black Money Family

User avatar
TheVikingsofDW
Posts: 283
Joined: Thu Feb 01, 2024 5:54 pm
Location: Budapest

Re: Anonymity Network for Hackers / Guide

Postby TheVikingsofDW » Sun Jul 07, 2024 11:17 pm

BlackMoneyFamily wrote:Any more post or forums on these techniques, I would like to learn more!

Sincerely,
B<M<F
Black Money Family


Evidently, you are able to peruse the entries concerning anonymity here: viewforum.php?f=20

Now, if you desire further comprehension of "Anonymity", I highly recommend perusing these guides:

1. Jolly Rogers Security: viewtopic.php?f=20&t=14082

2. Whonix guides, in general, encompass all the fundamental and advanced guides pertaining to anonymity from Whonix, which are commendable: https://www.dds6qkxpwdeubwucdiaord2xgbbe ... troduction
Whonix Documentation: https://www.dds6qkxpwdeubwucdiaord2xgbbe ... umentation

3. The Hitchhiker’s Guide to Online Anonymity: https://thgtoa3jzy3doku7hkna32htpghjijef ... guide.html

Code: Select all

___  _____      __
| _ )/ __\ \    / /
| _ \ (__ \ \/\/ /
|___/\___| \_/\_/

----- TheVikingsOfDW -----
A Proud Staff Member Of BCW


Return to “Discussions about anonymity”