Jump to content

staying anonymous on college network


b0xybr0wn

Recommended Posts

I was wondering what is the best method for staying anonymous on a school network. From what all I have been told before, they block computers by mac address, so a simple mac addr spoofing tool would take care of that would it not? also what other tools and software can be used to hide information about the computer? The campass has both wireless and wired access. the wired access is in the dorms, so is it possible to trace things back to a certain room? I dont plan on doing anything sketchy, at least not on the schools network honestly, but basically I've been told they watch every tiny thing you do so it just would be nice to be reassured of some privacy. It doesnt matter if the tools etc are for windows or linux because i use both. thanks

Link to comment
Share on other sites

I was wondering what is the best method for staying anonymous on a school network. From what all I have been told before, they block computers by mac address, so a simple mac addr spoofing tool would take care of that would it not?

That would be ifconfig

also what other tools and software can be used to hide information about the computer?

A firewall

Link to comment
Share on other sites

Most schools will be able to track everything back to your room.  It doesn't matter what type of MAC spoofing or web annonymiouser you use, they will be able to track it back to your room.  If you're worried about doing something that might be viewed as 'bad' by the admins then spoof your MAC and get into someone's wireless network, that's the best protection you'll be able to get from the admins if you're doing anything inside the network.  If you're going to be doing things outside the network there are several options you could look into:

If you're going to be doing alot of just web browsing then look into http://tor.eff.org/.  What TOR does basically is bounce your traffic through a series of 8 proxies, each connection having its own unique SSH encrypted session, including (most importantly) the initial connecttion between you and the first node.  Each time you connect to the TOR network you get a new series of proxies.

If you're going to be doing alot of torrenting or file transfers then your best bet would be to setup an off-campus server with a good upstream.  Then, set it up as an SSH proxy, and SSH into it.  This will create (again) an encrypted connection, admins won't be able to see what you're doing.

Note: no matter what you do, if you use TOR or the off-campus server, admins will always be able to look at how much traffic you've sent/recieved; if not what you're doing; so if your school emposes bandwidth caps you're SOL.

Link to comment
Share on other sites

here is what i would do if i were you i would hacked the admin password of one of the computers that you got at school, once you crack the password (it will probablye be the same admin password for all other computers) try to use remote desktop to another computer in another room and hack or do whatever you wanna do from that computer, in case they try to trtace you they will get the other computer and not the once you are using (unless they check the connections made to that computer which would take more time for them) if they dont have port 3389 on those computers open, then you should scan the net and try to find the employee's computers they will usually have port 3389 open and try some of them to se if the password you ckracked is the same they use for those computers if ypou are lucky you might get a chance to do stuff in those computers.

or just get a laptop and take it to school, connected to the network and hack from there, if they got mac address filters then spoof on a mac address of a computer , arp poisoning might help you but if they are really careful with the network as you say, they will probably find out pretty quick that somebody is poisoning the net

one way to do that might be by using the arp -a command, if somebody is poisoning the net they will get the mac address of all the computers in the subnet, unless they are doing that from the main server

Link to comment
Share on other sites

Or how about not hacking your school and actually get some work done...

Link to comment
Share on other sites

I am familiar with tor, so i might try that out there. I am not too worried about tracing back to the room too much, because the campus has wireless in all the buildings, just not the dorms, its wired there, so if staying anonymous on wireless would be much easier i could easily just go to another building, or i will probably be able to pick up the signal with a good wireless card. im just trying to be careful here, so im double checking my facts, but on wireless the onlyway to trace a computer would be the MAC address correct? even if they get the MAC, there is no way to identify the computer, so MAC spoofing should take care of it as far as wireless goes. Is there anyway that they could find out the real MAC though, and get past the spoofed?

Link to comment
Share on other sites

buy a cheap router and put that inbetween you and the network.... make sure you turn dhcp off.

you should be able to easily change the mac address on it and you can use nat to confuse the network

what i was told during orientation about wireless routers is that they periodically scan the network, and if the find a router, then then ban the router and all the clients on it by the mac address. that is the only technical thing they discussed

Link to comment
Share on other sites

what i was told during orientation about wireless routers is that they periodically scan the network, and if the find a router, then then ban the router and all the clients on it by the mac address. that is the only technical thing they discussed

Turn the wireless off. Also, have the NAT router clone your computers MAC address. It will be impossible for them to tell there is a router there (short of packet analysis of course).

Link to comment
Share on other sites

Can't say for any other campus/school network, but I can say this for ours... erhm.. as the Sysadmin... I don't care about your mac address, you get a IP address on the DHCP server tied to your mac address, I can see your hostname and your login for your IP address, I can pretty much track you down to a AP or a wired network point...

Oh, and as far as TOR goes, we block that using the Netintact Packetlogic box (as well as all P2P).

Now if I was using a NAC... you wouldn't get onto the network without the latest updates or a anti-virus scanner installed.

Nuf said? ;)

Link to comment
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

  • Recently Browsing   0 members

    • No registered users viewing this page.
×
×
  • Create New...