Jump to content

Concealing IP


ArkNinja

Recommended Posts

I was wondering what your guys' perspective was on the best way to conceal your IP/identity. I'm talking about how in the movies you see the internet connection bouncing off many different points before finally connecting to the victim/attacker (depending on if it is from an attacker or victims point of view). I know there are programs (such as Tor) that do this already, but I am wondering about the effectiveness of this tactic. So here are my questions:

1. Can a person who is investigating an attack figure out who connected to the proxy machine without access to the machine logs, and if so how?

2. Does adding to the amount of proxy machines increase the probability of not being caught significantly if access to the logs are not available?

3. Are there ways to mask/spoof your external IP without the use of proxies?

~ArkNinja

Link to comment
Share on other sites

I was wondering what your guys' perspective was on the best way to conceal your IP/identity. I'm talking about how in the movies you see the internet connection bouncing off many different points before finally connecting to the victim/attacker (depending on if it is from an attacker or victims point of view). I know there are programs (such as Tor) that do this already, but I am wondering about the effectiveness of this tactic. So here are my questions:

Some TOR exit nodes may be monitored. However, providing there is at least one additional TOR nodes between you and the exit nod, the exit node does not know your real IP address, the 'middle' TOR node does know your IP address.

1. Can a person who is investigating an attack figure out who connected to the proxy machine without access to the machine logs, and if so how?

No*

2. Does adding to the amount of proxy machines increase the probability of not being caught significantly if access to the logs are not available?

Yes*

3. Are there ways to mask/spoof your external IP without the use of proxies?

Depends

*As long as you don't give the target any information about your self.

Link to comment
Share on other sites

Wouldn't that be a moot point then? It wouldn't really be a connection, unless you were sending over an exploit maybe, then thats when I could see it being useful, but wouldn't a download require a two-way connection as well?

Link to comment
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

  • Recently Browsing   0 members

    • No registered users viewing this page.
×
×
  • Create New...