Jump to content

s3cz0ne

Active Members
  • Posts

    4
  • Joined

  • Last visited

Recent Profile Visitors

733 profile views

s3cz0ne's Achievements

Newbie

Newbie (1/14)

  1. Never having actually used a pineapple I'm working on the assumption that there is a web gui for carrying out attacks as well as backend scripts for automation. That being said, i'm curious as to whether code from jasager responsible for the above could be borrowed and implemented in pwnpi for instance. Also, for a drop box easy use and automation through scripts/web ui is critical for fast deployment. Curious what peoples thoughts are here but it seems that with a rpi, two alphas, usb hub and power source you can create a far more powerfull and flexible pineapple and even a pwn plug for that matter. The possibilities seem wide open.
  2. As far as client side stuff goes: internal security. To prevent any snooping over a LAN. Granted this isn't necesarily meant as protection from someone trying to track you from a TOR exit node. Its really just there to tighten local security, which IMHO is an important part of a complete security framework. Certainly. I absolutely agree with that and actually mention that as an option in my last reply. Albeit in less technical terms. All very good points. People also tend to be IDed on message boards in that same fashion. So, that is a very good point and definately something to be cautious of. The issue of browsing habits can be a little trickier but I suppose one's best bet is to either seperate the types of browsing they do. IE - certain browsing patterns for anonymous browsing(TOR mail, bitcoin stuff, various message boards) and different patterns for unsecured browsing(visiting sites like facebook, gmail, etc. that could easily give away ones identity) As far as cellphones, flight records, credit card records, etc, that stuff is a bit outside of the scope of the OP. Thanks for the comments so far though. - s3cz0ne -
  3. Yeah it probably is overkill. However, the goal is to accomplish a setup that is extremely difficult to track. To the point of using a live boot dvd on a machine with no HDD is a good suggestion. Presumably(in the above setup) would be TAILS. Unfortunately, to my knowledge(and I may be incorrect), one is unable to connect to a VPN server with TAILS which is why I would run TAILS in a VM. As far as the VPN connections are concerned I'm aware that if I want a fast and secure connection I will have to pay for it, which raises another issue relating to anonymity. The issue is obviously payment and the ability of highly motivated person, company or government to track such transactions. The upside is that there are likely VPN services abroad that allow for anonymous payment with bitcoins. Another point to make reference to in regards to using a Live CD distro(TAILS), as well as the poster who mentioned the grugq/portal project, is that security is also just as important as anonymity. While I suppose I could alter the TAILS Live distro with the grsecurity/PAX patch, other various hardening techniques that are common but outside of the scope of this post, as well as including an encrypted partition on the USB drive to save data(Assuming I'm using a thumbdrive instead of a DVD). To address grugq/portal, let me first say it looks to be a very interesting project. Also, thank you for mentioning it to me as I was not previously aware of its existence. For the particular application mentioned in the OP, it is a bit inadequate as far as security is concerned. ClearOS and/or IPFire offer a fairly robust firewall, IDS, IPS, AV, Anti-Malware, Anti-Phishing and the ability to add other Linux software like TOR, JAP, L2P, OpenVPN, kernel patches(grsecurity/PAX), as well as others. While I'm aware that this is largely overkill I am curious as how to create the most effective, efficient, secure and robust model for layered anonymity. Granted, a model like this may be used by Blackhats with nefarious intentions and I'm sure similar concepts have already been implemented and used by such people. My interest is simply conceptual and, perhaps, may be applied to some of the network auditing that I do from time to time to take a look a just how "untraceable" such a model is. It's ironic to see hackers from anonymous, lulzsec and others get arrested. One would assume that they are using any anonymizing technology available, and likely in a layered fashion. Perhaps I'm giving these folks too much credit. The sense of privacy people get from the various proxy and VPN services out there seems to be a bit overinflated considering that by all appearances if somebody is determined enough, ie - the FBI, NSA, CIA, Scotland Yard, etc.(state actors), that a service like TOR is almost useless. So, again, I'll restate the end goal here, perhaps, in clearer terms: to create a system by which it is almost impossible to track the end user. If the above in the OP accomplishes that, great! If not what are some improvements that can be made? Is there a more effective approach to anonymity and security? Is there any means available for one to be truly concealed and hidden on the interwebs? Also another piece of info that is also relevant to this conversation is that often time TOR exit nodes are operated by law enforcement and are used as a honeypot of sorts(hence the "multi-layered" approach) This next little piece may be a bit outside of the scope of this post but it does have to do with secure online browsing. Currently I use FF as my primary browser and for additional security I employ the following add-ons: Calomel SSL Validation, DNSSEC, HTTPS Everywhere, NOScript, Foxy Proxy, RequestPolicy, DoNotTrackMe, Better Privacy, Sanitize Me, and Caffeine Security. The reason I mention this is that such add-ons clearly have a role in a secure and anonymous system and I'm curious as to peoples thoughts and recommendations about such add-ons. Sorry for the long post!!! Hope to hear back and thanks for the replies so far!!! - s3cz0ne -
  4. My question is how reliable would the following setup be in regards to the most effective means to anonymous internet usage. Lets start with the router: The router will only be used for anonymous internet activity and will use a version of either IPFire or, more likely ClearOS. The version of ClearOS will be hardened and secured in few ways. Namely the boot drive will be entirely encrypted. The kernel will be hardened with the application of the grsecurity patch and security best practices will be followed such as minimum password requirements, unnecessary processes and services will be killed manually with additional (common) security practices implemented. Integrity of client-to-router communications over the LAN will come in the form of the router running a RADIUS server on the router and requiring all clients to authenticate via 802.1x, thus creating an encrypted tunnel through which all client-to-router and router-to-client traffic is encrypted. This measure prevents against local eves dropping(and if Wifi is present and compromised.) ClearOS appears to offer a great array of firewall capabilities including SNORT(an IDS). In order to keep those intact the only way to legitimately gain access to the lan from the internet will be through a VPN server hosted on the router itself. The first and second layers of anonymity will be provided at the router level and will be in the following form: Layer 1 - A VPN connection with an endpoint in a foreign country. This will be the routers connection to the internet. Layer 2 - A JAP proxy will run locally on the router and all outgoing traffic will proceed through it. So thus far anything exiting the network will follow this path: Router--->VPN--->JAP Servers-to-JAP end point--->Internet. The Client: The next part of the equation is the host computer which will run a flavor of linux with a hardened kernel as well as a fully encrypted disk. Also it will have a secure connection to the router via 802.1x. The client will in turn connect to its own, seperate VPN server. The path so far looks like this: Router--->VPN--->JAP--->VPN--->Internet. However, an additional layer will be added by running a copy of TAILS in VirtualBox. (Anyone unfamiliar with TAILS can google it) For our purposes I'll describe some of the more important aspects of TAILS. TAILS will route all internet traffic and DNS requests through TOR as not to be intercepted by ones ISP. It also uses l2p. Additionally TAILS enforces HTTPS everywhere, does not allow tracking by way of cookies and allows for User Agent modification. Furthermore TAILS saves NOTHING to your local drive. At this point the connection to the internet now looks like this: Client Computer(W/ enc. conn. to gw)--->Router--->VPN1--->JAP--->VPN2--->TOR--->Internet I realize that this is likely a high latency model and connection speeds will be highly dependant on the quality of the VPN servers use, however it does provide a layered approach to anonymity that seems hard to beat! I have not fully tried this yet though I am in the process of implementation. I'm curious as to any feedback about the potential effectiveness of such a setup as well as any errors I may have made iin outlining its operation. I look forward to hearing everybody's idea, opinions and criticisms! Thanks, s3cz0ne
×
×
  • Create New...