Jump to content

Changing Default TTL in backtrack linux


Recommended Posts

Dear friends,

How to spoof the TTL(Time to Live) value in backtrack. I have no idea about that. I search this topic with Google. But i have not a good result. So please tell me how to do this ?


if you think TTL value is most important to hide my ID?


Link to post
Share on other sites

as root edit the /etc/sysctl.conf

net.ipv4.ip_default_ttl = <0-255>

Thanks dear, Then you think TTL value is most important to hide my ID?

with

Tor,

nmap,

msf,

sqlmap,

i have no idea about that....

Edited by fox123
Link to post
Share on other sites

How will Time To Live settings change any way to hide your ID/IP ? What is it you're really trying to do? TOR can be monitored, so use proxy chains, VPN, SSH Tunnels or free wifi with macchanger. Just about anything can be traced back if someone really wanted to, so unless you've got a reason to be hiding your IP, probably not going to get a whole lot of help with what you want to do as the end result since it sounds more like you have ill intent and want to cover your tracks.

Link to post
Share on other sites

How will Time To Live settings change any way to hide your ID/IP ? What is it you're really trying to do? TOR can be monitored, so use proxy chains, VPN, SSH Tunnels or free wifi with macchanger. Just about anything can be traced back if someone really wanted to, so unless you've got a reason to be hiding your IP, probably not going to get a whole lot of help with what you want to do as the end result since it sounds more like you have ill intent and want to cover your tracks.

guys, I've been keeping a lookout for one web site. What I'm looking for : TTL value is important or no? to hide my privacy. finally i want collect to the anonymous method.
" Something that was brought to my attention by proxx is that a network admin could potentially discover that you are being dishonest about your user agent via the TTL values of the packets. TTL stands for 'Time to Live' and is responsible for limiting the number of hops of a packet. This prevents the packets from floating around for eternity to explain it in a mundane way. So, an example would be that you are using a Windows user agent and spoofed it to be a Linux user agent. It would be possible for the net admin to analyze the TTL value and determine that it was changed and when.
A link provided by proxx might help to explain some of this: http://www.binbert.com/blog/2009/12/default-time-to-live-ttl-values/
It would be a safe bet to keep your windows user agents windows, and your linux user agents linux. You can easily spoof the TTL values in linux, perhaps using iptables."
Link to post
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

  • Recently Browsing   0 members

    No registered users viewing this page.

×
×
  • Create New...