Jump to content

S3V3N

Active Members
  • Posts

    36
  • Joined

  • Last visited

Recent Profile Visitors

767 profile views

S3V3N's Achievements

Newbie

Newbie (1/14)

  1. I am having an issue finding the latest firmware files... Please post the latest files.
  2. Has anyone used Fram modules instead of the Micro SD card for payload storage in their Rubber Ducky or Peensy??
  3. That is pretty sexy!! But Damn its expensive..
  4. A good payload would be to have a reliable persistent meterpreter payload with switches for multiple OS's. all stored internal to the Teensy 3.1. no need to download files immediately, do it later... :)
  5. Good points, Good points. I will look up grugq, I am always interested in learning more. I am not hiding from anything, just on a journey to educate myself in the proper ways of making this happen and putting it to proper use. Personally, if I were to go to these extremes, I would have a dedicated PC to isolate everything with. I also found another post that takes this all to the extreme. https://www.ivpn.net/privacy-guides/advanced-privacy-and-anonymity-part-1 Interesting reading.. s3v3n
  6. Ok, I have heard of the Dread Pirate Roberts, but he was caught basically because he relied entirely (from what I have read) on Tor to keep his anonymity, but one of the agencies found an exploit in the exit parameters from the Tor node from what I recall.
  7. I will look into Dread Pirate Roberts, I guess I am a noobie as I can't recall hearing that one. But as to lulz/Anonymous, they got sloppy and left meta data in their video posts, which was a big surprise to me that they overlooked that. But regardless. As to the proxychains Linux app, you can chain multiple proxies together, and your data hops from proxy to proxy. The biggest advantage is obviously to the agencies with endless funds or no budgets limits at all. I can concede this as a fact, if they want you, they will "probably" get you but I wouldn't want to make it easy on them. :) there's no money involved here, so no trails there, no partners, so no leaks there... Just trying to cover my basis and know what I am doing, and how to make it all work.
  8. I am not doing these "types" of things, but if I were, I wouldn't want to get caught. But truly it is for my education only. I want to know more about being untraceable (as possible) online regardless of who might be looking.
  9. I have a decent VPN I use to block my ISP, but if I want no traces of what I am doing tracing back to me, then a VPN won't really be enough, as VPN's can be theoretically hacked by the agencies hence the proxychains in countries that don't work with other countries. I don't want anyone with out having to spend many many many hours and lots of money.. Being able to trace back to me. (I know this makes me seem either really paranoid or up to no good)
  10. My thoughts on using multi-VPN's is because I have heard rumors of certain agencies piercing VPN's
  11. The point for me using a VPN, is mainly to hide what I am doing from my ISP. Proxychains is for not allowing my location to be discovered. (Yes I realize that certain Socks5 proxies are needed) but I want a way to make 100% of the traffic route out of the VM through the VPN (so I suppose running the VPN on the VM would not leave any traces of what I am doing on the host PC)
  12. I have also read of some ppl using Tails or the like, but most of them use Tor, which I would prefer not to if possible.
  13. as for the VPS, I have heard of ppl setting up free anon VPS as proxychains hop spots and VPN'ing to these boxes randomly. Any thoughts??
  14. To be honest, I know Tor has been cracked, and I know that not all VPN's can be trusted not to keep logs. I could also use a multi-hop VPN instead of using two, but I don't know of any "Free" reliable VPNs. And Proxychains is a given. Buy I haven't been able to figure out how to run 100% of the traffic from the VM (TCP/UDP and DNS) to the HOST VPN regardless of what connection I might be using (Wifi, 3G/4G or hardwire). Any suggestions?? Obviously this needs to be as transparent as possible. Automatic if possible
  15. Ok, so here is what I want to accomplish... - Run Debian Linux in a VM, routing 100% of traffic (TCP/UDP/DNS) through Proxychains/VPN1 - Run Ubuntu Linux as the Host routing 100% of traffic (VM Traffic + All TCP/UDP/DNS) through VPN2 - If required to increase Anonymity, hop through anonymous VPS running proxychains as well So, it will look like this; VM (Proxychains thru VPN1) --> HOST (VPN2) --> (possible Anon VPS) Please explain how to set this up, and how to test it is working correctly.. ;) Thanks!!
×
×
  • Create New...