Intrusionz3r0
HacktheboxTwitter
  • Welcome
  • Windows Penetration Testing
    • Enumeration
    • Credentials Attacks On Windows
    • Kerberos
    • Abuse ACLS
    • Common Attacks
    • Abuse Tokens
    • Kerberos “Double Hop”
    • Privileged Groups
    • Defense Evasion
    • Active Directory Certificate Services
    • Windows Persistence
    • Privilege Escalation
    • Trust Enumeration and Attacks
    • Windows Lateral Movement
    • Powershell Cheetsheet
    • Microsoft Exchange and Office
  • Linux Penetration Testing
    • Linux Active directory
    • Tools
    • Privilege Groups
    • Post Exploitation
    • Privilege Escalation
      • Sudo Privilege escalation
      • Writable .service files
      • Wildcard on compression binaries
      • Path Abuse
      • Capabilities
      • Exploit Logrotate
      • Weak NFS Privileges
      • Hijacking Tmux Sessions
      • Shared Libraries
      • Shared Object Hijacking
      • Python Library Hijacking
      • Linux Enumeration
    • Stealing Linux Credentials
    • Critical Vulnerabilities
    • Upgrading TTY
    • Process monitoring
    • Miscellaneous
    • Escape Restricted Shell
  • Malware Development
    • Malware Development Essentials
    • Code Snippets
    • Malware Development Intermediate
  • Social Engineering
  • Portforwarding and tunneling
  • File Transfer Techniques
  • Password Attacks
  • Enumeration
    • Network Enumeration
    • (OSINT) Active Enumeration
    • (OSINT) Passive Enumeration
    • [22] SSH
    • [21] FTP
    • [25,465,587] SMTP
    • [53] DNS Enumeration
    • [80 443] HTTP HTTPS
    • [110,143,993,995] IMAP/POP3 Enumeration
    • [111,2049] Network File System
    • [139,445] SMB Enumeration
    • [161] SNMP
    • [512,513,514] R-Services
    • [623] IPMI
    • [873] Rsync
    • [1433] MSSQL
    • [1521] Oracle TNS
    • [3389] Remote Desktop Protocol (RDP)
    • [5985/5986] WinRM
    • [3306] Mysql
    • [513] Rlogin
  • Hacking Web
    • Methodology
    • Vulnerabilities
      • SQL Injection
      • Cross Site Scripting (XSS)
      • File path traversal/Local File Inclusion
      • File Upload Attacks
      • Denial of Service
      • Command Injection
      • Insecure Direct Object Reference (IDOR)
      • XML External Entity (XXE) Injection
      • Web Mass Assignment Vulnerabilities
      • Log4Shell Exploitation Guide
      • Authentication
      • Business Vulnerabilities
      • Access control vulnerabilities
      • Server-Side Request Forgery (SSRF)
      • Cross-site request forgery (CSRF)
      • Cross-origin resource sharing (CORS)
      • Clickjacking
      • DOM-based vulnerabilities
      • JWT vulnerabilities
      • Password reset poisoning
    • Web Tech Detection viaa Tokens, Headers & Cookies
    • Burpsuite through SOCKS5
    • Bypass 403 - Forbidden
  • OSINT
  • Common Applications
    • Gitlab
    • Splunk
    • Tomcat
    • Joomla
    • Microsoft Internet Information Services (IIS)
    • Nagios XI
    • Wordpress
    • Drupal
    • Tomcat CGI
    • osTicket
    • Attacking Thick Client Applications
    • PRTG Network Monitor
    • Jenkins
    • ColdFusion
    • WebLogic
    • Grafana
    • Umbraco
  • Containers Pentesting
  • C2 Command and Control
    • Sliver
    • Cobalt Strike
    • Mythic
    • Havoc
  • Report Templates
  • Anonymity Guide
  • Labs
    • Vulnlabs
      • Baby
      • Trusted (Chain)
      • Retro
      • Retro2
      • Hybrid (Chain)
      • Baby2
      • Breach
      • Sendai
      • Sweep
      • Delegate
      • Redelegate
      • Media
      • Bruno
      • Cicada
      • Lustrous2
      • Tengu (Chain)
      • Reflection (Chain)
      • Tea (Chain)
      • Heron (Chain)
      • Lustrous (Chain)
      • Kaiju (Chain)
      • Intercept (Chain)
      • Sidecar (Chain)
      • Vigilant (Chain)
      • Job
      • Job2
      • Puppet (Chain)
      • Mythical (Chain)
      • Push (Chain)
Powered by GitBook
On this page
  • Set up Tor & Proxychains
  • Email Provides
  • Anonymous Phone Number
  • Fake Identity
  • Secure Encrypted Messaging
  • Anonymous Package Delivery
  • Anonymous Payments

Anonymity Guide

Set up Tor & Proxychains

  • Tor: An open-source software that enables anonymous communication by directing internet traffic through a worldwide, volunteer-operated network of servers, concealing a user's location and usage from surveillance and traffic analysis.​

  • Proxychains: A UNIX program that forces any TCP connection made by any given application to follow through proxy servers like TOR or any other SOCKS4, SOCKS5, or HTTP(S) proxy, thereby hiding the user's real IP address.​

#Instalation
sudo apt-get update && sudo apt-get upgrade -y
sudo apt-get install tor -y
sudo apt-get install proxychains -y

# Enable Tor
sudo systemctl start tor
sudo systemctl enable tor

Proxychains offers three chain types:​

  • Dynamic Chain: Routes traffic through available proxies in the list, skipping any that are down.​

  • Strict Chain: Routes traffic through proxies in the exact order listed; if one proxy fails, the connection is terminated.​

  • Random Chain: Selects proxies randomly from the list for each connection.

For optimal flexibility and reliability, it's recommended to use the Dynamic Chain. Uncomment the dynamic_chain line and comment out the others

# strict_chain
dynamic_chain
# random_chain

To prevent DNS leaks, ensure that DNS requests are also routed through the proxy chain. Uncomment the proxy_dns line:

Proxy DNS requests - no leak for DNS data

At the end of the configuration file, specify the proxies to be used. To route traffic through Tor's SOCKS5 proxy, add or ensure the following line is present:

socks5 127.0.0.1 9050


Email Provides

Anonymous Phone Number

Permanent solution

  • Buy prepaid SIM card in cash without ID.

  • Consider VoIP services accepting cryptocurrency.

Fake Identity

Secure Encrypted Messaging

Anonymous Package Delivery

  • USPS General Delivery Pick up packages anonymously at post offices.

Anonymous Payments

PreviousReport TemplatesNextLabs

Last updated 2 months ago

Decentralized, no registration, offline capable.

Strong end-to-end encryption, register anonymously.

Decentralized messaging accessible via Tor.

Public lockers; pseudonyms accepted.

Parcel forwarding services with minimal registration.

Anonymous virtual credit cards (U.S. focused).

Cryptocurrency exchange without registration or KYC.

No KYC crypto exchanges, supports Monero (XMR).

ProtonMail
Tutanota
Mailfence
Crypton.sh
SMSPVA.com
SMS-Activate.org
Fake Name Generator
Fake Person Generator
This Person Does Not Exist
Briar
Signal
Matrix (Element)
Amazon Lockers
Reship.com
Privacy.com
SideShift.ai
ChangeNOW.io
Get a whole new identity at the Fake Name GeneratorFake Name Generator
Logo