Showing posts with label Protection. Show all posts
Showing posts with label Protection. Show all posts

Saturday, 20 April 2013

Be anonymous on Internet !

Being Anonymous


I'll show you how to be annonymous !

All you actions will be 100% <Aprox.>annonymous ( browsing websites, msn, yahoo, IRC, etc... )

<<<>>>What Is needed ?

a. putty ( http://www.chiark.greenend.org.uk/~sgtatham/putty/download.html )

b. Proxifier ( you can download it here : http://www.4shared.com/file/vjvW9V26/PRO...RGOUS.html )

c. Shell account -free or hacked- ( http://www.cjb.net/ )

d. A Brain ........

First ----- register a free shell account ! in... cjb.net

Download and install the Proxifier !

First... need to do is SSH Tunneling....
1.Download putty install and start.

<http://www.chiark.greenend.org.uk/~sgtatham/putty/download.html>

2. Now input your host name :
Here,

Hostname: shell.cjb.net
--------------------------------------------------------
now,

Go to -->"SSH",

then select ----> "tunnels", <here put ---> sorce port : 2121>

then tick the ----> "dynamic" radio button,..(though you can put any source port number on the box as per your requirement ) and

click ----->"add" Now go to ----->"Session" and then put a session name at "Saved Session" -- then click-->"Save"

Done ...3. Now open (Double click on the saved session)The Putty login screen will appear....Then -------------------------

Login: username (the username of shell.cjb.net that you have registered earlier)Password: Put the password (you have given when it is registered or follow ur email)

now[ENTER]

SSH TUNNELING IS DONE ____________________________________________________________________4.CONFIGURIN ​G PROXIFIERNOW open ---------> Proxifiergo to -----> Options -----> Proxy Settings [ Here 'Remove' the existing one...Then click "ADD" ] [ Proxy server (Pop up) : server: 127.0.0.1 Port: 2121 Protocol: SOCKS version5]

PRESS OK-----> OK

___________________________________________________________

5. CHECK YOUR IP ADDRESS(http://www.whois.is)___________________________________________________________6. Restart Your MSN, SKY PEE etc.... all will run through it..

6. Now browse with (Tor)
And

7. Vertually chenge your mac address with TMAC.

Thats all It is Done Now U are approx 100% Anonymous over the internet.
If U Like I Plz Say Thanx and if possible then (+rep) Plz.



This tutorial has been written By Ra Du and is NOT for public distribution.All information in this tutorial is for educational purposes only. Any illegal activity relating to this tutorial is not my responsibility, although I would like to say I don't care how you use it, I do. So please do not use this for Black-hat activities. One day when you grow up you might realise that you have been a skid, by using mass-deface techniques and SQLi for your entire life. Do not just hack a site because it is there. I have a few sites of my own and its annoying, unproductive, and pointless.

Friday, 12 April 2013

Advanced Proxying 2.0

Advanced Proxying 2.0

Disclaimer : This post is for educational purposes of learning network security.
I am not responsible what you do with this information.

Updated: How to use your slaves connection to browse the internet

After extensive research and testing, I have found a much better and more stable way to pull off browsing the internet through your slave's machine. Ncat is not a part of this guide as it is not very stable for creating a proxy server.

Remember. This is an exercise in the art of subtlety. We want to be able to use the Slave as a transparent proxy WITHOUT tipping them off!

What you will need:

An SSH server running on your local machine - I have found that BitVise SSH server does not have control flow errors in tunneling like the other options http://www.bitvise.com/
Port 22 forwarded on your router to the machine running BitVise SSH server.
Firefox with FoxyProxy STANDARD Add-On installed
Plink executable - command line putty. I'm not linking it. May the google-fu be strong with you...
*gproxy and config file - an autoit script for a stealth proxy server
Slaves - duh

I did not create gproxy, I only tweaked the code to my liking. Reinventing the wheel is not high on my list

I'm not going to go over portforwarding with you. If you setup port forwarding for a RAT you should be able to setup a simple forward for port 22.

Installing Bitvise SSH Server.

When you go to install this ssh server, do not forget to choose PERSONAL EDITION! If you don't, your install will only be active for 30 days.

As soon as the installation is done, you'll be presented With this:

[Image: KIBAktZ.jpg]

Click on open easy settings and you will get this screen, make sure it matches what I have below:

[Image: suD47ih.jpg]

Click on tab 3 and then add a virtual account. Click on the blue link to set password:

[Image: pwh3AET.jpg]


[Image: 8leQgEc.jpg]

Save changes, then click on start server on the main Bitvise control panel.

Setting them up to proxy


As stated before, gproxy.exe is just an autoit script that I found that does the job we need and config.ini is just the port settings. The contents of config.ini should be:
Code:
[SYSTEM]
PROXYPORT=8080
PROXYIP=127.0.0.1
PROXYPORTSSL=8181

I am not going to link the executable here, im simply going to give you the autoit script. Go get auto it and compile it yourself you lazy bastards!:

Anyway after compiling gproxy, upload gproxy.exe, config.ini, and plink.exe to the slaves machine. The best spot I have found is C:\Users\[nameofslave]\appdata\.

Starting the proxy process and tunnelling

Open up the remote shell and navigate to the directory where you uploaded the three files. Simply type gproxy.exe to start the process. The code was tweaked to run hidden and no tray icon.

Now close the shell, and open another shell. This time, you're going to navigate to the same directory, but your're going to run the following command:

Code:
plink.exe -R 8080:127.0.0.1:8080 -R 8181:127.0.0.1:8181 ipaddress -l loginname -pw password

It's going to ask you if u want to cache the server, yadda yadda..type N for no. Because you don't want to leave a footprint on the slave's machine. At this point you should be left with a shell to your ssh server, from the remote shell..(I know, it's confusing...shell in a shell..SHELLCEPTION!)

Setting up Foxy Proxy Settings.

Not going to lie. I may lose some of you on this. It's ok. If you get dizzy, you may want to sit down for a minute before you hurt yourself...

This is what it should look like without anything in it:

[Image: QObaXJa.jpg]

Click on add proxy and follow the settings for the three tabs accordingly:

[Image: 2ilDyMT.jpg]


[Image: Yf3cZXe.jpg]


[Image: F8NN4CR.jpg]


[Image: cb7yamp.jpg]


[Image: rQD8cc7.jpg]


[Image: TJguCBh.jpg]


[Image: F8NN4CR.jpg]


[Image: DXppGbB.jpg]

(url patterns are HTTP://* and HTTPS://*

This should be the finished product:

[Image: xjTu3OO.jpg]

Important to note is that when you're using them as a proxy, select mode to "Use proxies based on their pre-defined patterns and priorities"

Browse out to google and type "what's my ip address". It should be the slave's external WAN address now...

Dafuq did I just do???

Let me break it down. You're making an ssh connection back to your ssh server from the slave. SSH is very useful for tunneling traffic mostly because you don't need to keep adding port
forwarding rules to your router and the traffic is encrypted.

With the plink command, essentially you're making 2 tunnels. One for HTTP traffic and one for HTTPS traffic. Essentially you're opening two tunnels with the dual -R flag. Your computer is now listening on both 8080 and 8181 and forwarding anything that is sent to it to the slaves machine on those same ports.

Gproxy.exe on the remote machine is then intercepting that traffic, and forwarding it out to the host, then sending data back to the "local" machine you are on.

Foxy proxy is matching url patterns to send traffic to the right tunnel. HTTP to 8080 and HTTPS to 8181.

Quick summary logic.

1. Install ssh server on your local machine

2. Port forward port 22 on your router to the ssh server computer

3. Upload gproxy.exe, config.ini and plink.exe to slave in a discreet place

4. start gproxy.exe on slaves machine

5. close remote shell window and reopen, run plink.exe -R 8080:127.0.0.1:8080 -R
8181:127.0.0.1:8181 ipaddress -l loginname -pw password

6. setup your local browser to proxy HTTP to 127.0.0.1 port 8080 and HTTPS to 127.0.0.1 port 8181


Fun things to do once this is setup:
Try to access slaves router and use default credentials
Point their DNS somewhere fun!
Sign up for an email account using that ip address.

BEFORE YOU ASK. NO you cannot use this to log into JAGEX'd RS accounts. That is outside the scope of this tutorial as the Java program that runs RS does not go through the proxy when you load it.

That does not mean it can't be done, it means that there is more to it than that.

What's to come:

Working on a guide to do this then setup a vpn connection so you are totally on their network to defeat Jagex.


Code for autoit gproxy

inb4wheredoifindgproxy!

VPN's & Proxies

VPN Downloads & Proxy Servers
What is a VPN?
VPN stands for virtual private network. A VPN keeps your wireless communications safe by creating a secure "tunnel," though which your encrypted data travels. These tunnels cannot be entered by data that is not properly encrypted. Not only is data encrypted when you use a VPN, but the originating and receiving network addresses are also encrypted. This adds an extra layer of security.

What is a proxy?
Proxy sites enable you to bypass your own Internet provider and browse through the proxy web site. All that you have to do is type the web site address you would like to visit in the form they provide, and start browsing. Once you keep browsing using that form, you are protected and your real IP address is not being logged.

VPN downloads!

1) UltraVPN
UltraVPN is a free VPN that hides your connection from unwanted ears and allows you to use blocked application. Traffic is quota is unlimited. Bandwidth is up to 500Ko/s depending on network conditions.



Click here to download UltraVPN!
Click here to use UltraVPN with Linux!

2) Loki VPN
Loki Network allows you to surf the Internet anonymously and hides your real location (IP address). Everything you do through the Loki Network is done from the name of the Loki Network server and from its IP address. Connection between your computer and Loki Network is secured with SSL.

However, to protect your anonymity you still have to be careful about any data you fill in Web forms and network applications you use locally (any locally running application still have the complete access to your real IP address).

Click here to download Loki VPN!

3) Tor
An anonymous Internet communication system, Tor is a toolset for a wide range of organizations and people that want to improve their safety and security on the Internet. Using Tor can help you anonymize Web browsing and publishing, instant messaging, IRC, and SSH. Tor also provides a platform on which software developers can build new applications with built-in anonymity, safety, and privacy features.

Click here to download Tor!

4) Cyberghost VPN
The Internet has long since become an interactive means of communication. Everyone writes e-mails, and many are making use of online storage sites, blogging, or sharing their views on Web forums. Fortunately, CyberGhost VPN gives users a way to surf anonymously and keep their private information from the eyes of others. CyberGhost VPN provides you with anonymous IP address and encrypts transmissions between you and the Web.



Click here to download CyberGhost VPN!

5) JAP
JAP Anon Proxy provides the functionality to surf the web without being observed. This means that neither the requested server nor any observer on the Internet can know which user has viewed which web page - in short, anonymity.



Click here to download JAP!

6) FreeProxy
FreeProxy enables many users to share an Internet connection. The basic features include proxying HTTP, SMTP, POP, FTP Proxy, TCP Tunneling, and SOCKS 4/4a/5. The application works well with a wide range of clients including browsers, ICQ, and MSN messenger and comprehensive help illustrates the setup of these clients. In addition, FreeProxy includes authentication to both an internal user database or to a windows domain, extensive reporting, comprehensive control of resource permissions, URL filtering, IP address filtering, local port binding, demand dialing, calendar control, proxy chaining, and includes a functional Web server, plus numerous other features.



Click here to download FreeProxy!

7) AnalogX Proxy
AnalogX Proxy supports FTP (file transfer), HTTP (web), HTTPS (secure web), NNTP (newsgroups), POP3 (recieve mail), SMTP (send mail) and Socks4/4a and partial Socks5 (no UDP) protocols! It works great with Internet Explorer, Netscape, Instant Messenger.



Click here to download AnalogX Proxy!

8) Hotspot Shield
Hotspot Shield is a freeware which ensures anonymous and censor-free internet usage. With Hotspot Shield you can even access blocked websites. For example: Skype is blocked in certain parts of the world. With Hotspot Shield, anyone can access Skype (and any other site they choose). The free software ensures censor-free internet usage by encrypting all communications to and from your computer to protect you from online spying. While advertising supported, HotSpot Shield is is not an invasive adware or pervasive spyware application.



Click here to download Hotspot Shield!

9) TheGreenBow VPN Client
TheGreenBow VPN Client is a standard-based IPSec VPN Client, compliant with most of the popular VPN gateways allowing fast integration in existing networks. Highly efficient and extremely easy to configure, it provides the remote users an IPSec VPN Client to securely connect to the corporate network. It also allows peer-to-peer VPN with full IPSec standards, full IKE NAT Traversal, IP address emulation, strong encryption (X509, AES, MD5, DES, DH group 1 to 5), Strong authentication (Certificates, X-Auth, Pre-shared key, USB token), redundant gateway and DPD detection, high performances, no system overhead, DNS and WINS resolutions supported, operates as a Service, allowing the use on unattended Servers, accepts incoming IPsec Tunnels, optional 'IPsec only' traffic filtering. Wireless connectivity (GPRS, WiFi, Bluetooth).



Click here to download TheGreenBow VPN Client!
*Download link untested, please scan any crack/keygen before use

10) ProxyWay
ProxyWay is free proxy tool that provides easy way to scan proxy lists, check proxy, filter and change proxy servers on fly. You can use ProxyWay with browsers and different applications to visit different sites, download movies, files, send messages, etc.
To simlify ProxyWay configuration you can use 'ProxyWay Auto Configuration' option. Using this option you don't need to download proxy lists, check proxies, create services and configure browser settings manually. ProxyWay will do it for you. The only one thing you should do is start surfing.

ProxyWay main features:
● Easy setup - Proxy Way 'Auto Configuration' option automatically updates proxy list, checks proxies, creates services and configures your browser
● Hide Your Real IP
● Proxy Finder
● Proxy Checker
● Proxy Management System - creates proxy chains and easily changes them on fly
● Supports web proxies

Click here to download ProxyWay!

11) InterWAP
Free SSH and VPN FULL SPEED UNLIMITED tunnel anonymizer. Bypass provider restrictions and surf anonymous. Use any services, games and applications even if your provider blocks the access. The speed is not affected.



Click here to download InterWAP!

12) Free VPN
Free VPN protects your entire web surfing session; securing your connection at both your home Internet network & Public Internet networks (both wired and wireless). Free VPN protects your identity by ensuring that all web transactions (shopping, filling out forms, downloads) are secured through HTTPS. Free VPN also makes you private online making your identity invisible to third party websites and ISP’s. Unless you choose to sign into a certain site, you will be anonymous for your entire web session with FreeVPN. We love the web because of the Freedom that it creates to explore, organize, and communicate. Free VPN enables access to all information online, providing freedom to access all web content freely and securely. Secure your entire web session and ensure your privacy online; your passwords, credit card numbers, and all of your data is secured with Free VPN.



Click here to download Free VPN!

13) Barracuda Proxy
BdProxy - SOCKS, HTTP, and HTTPS Proxy Server. The BdProxy acts as a SOCKS, HTTP, and HTTPS proxy server. The proxy allows you to use your Internet applications anonymously, despite firewalls. The BdProxy is a free and complementary BarracudaDrive product. The BdProxy client connects and establishs a secure tunnel to the HTTPS Tunnel server integrated into the BarracudaDrive Web Server. This product requires the BarracudaDrive server.

Click here to download Barracuda Proxy!

14) ProxyMaster
ProxyMaster is an Internet utility to let you browse the Web anonymously by hiding your IP address.
When you surf the Internet your unique identification number (IP number) can be detected by any Website you visit.
ProxyMaster lets you use another IP number which is provided by a server called anonymous proxy server as a unique.

- Hide your IP number from people.
- Check the availability of multiple anonymous proxy servers with a blazing fast speed.
- Import any list of anonymous proxy servers into Winnow Anonymous Proxy
- Export the list of anonymous proxy servers contained in Winnow Anonymous Proxy to text file
- ProxyMaster automatically deletes dead anonymous proxy servers.


Click here to download ProxyMaster!

Proxy Sites
Use these for quick access to websites your workplace/college/school has blocked.

http://aniscartujo.com/webproxy
http://www.badboysproxy.com
http://www.surfscreened.com
http://www.hagiomusic.info
http://www.greenpips.info
http://urlbrowse.com
http://www.hideipaddress.net
http://www.sneakfilter.com
http://www.browsestealth.com
http://www.sneak1.info
http://proxiesrus.com
http://www.surfindark.com
http://www.navydog.com
http://falsario.com
http://www.proxypit.com
http://www.proxypan.com
http://myspacewebproxy.org/
http://www.allfreehere.info
http://www.takefreely.info
http://autobypass.com
http://www.proxcity.info
http://www.proxyzip.org
http://www.cheekyproxy.com
http://www.eggproxy.com
http://www.theschoolcloak.com
http://www.hidemefast.com
http://browseanywhere.info
http://www.404surf.com
http://www.cloakip.net
http://www.browsedark.com
http://www.dartprox.com
http://www.proxish.com
http://www.surfsneak.com
http://www.surfsneaky.com
http://www.browsehidden.com
http://www.filterhide.com
http://www.browsesneak.com
http://myspaceproxyy.com
http://www.browsesneaky.com
http://www.proxyz.us
http://www.sneakschool.com
http://www.iphide.com
http://www.proogle.info
http://greatproxy.info
http://www.playnsurf.info
http://www.realproxy.info
http://aplusproxy.com
http://www.ecoproxy.com
http://freedom.webtuo.com
http://www.slyuser.com/
http://tenpass.com
http://pawxy.com
http://pawxy.org
http://logu.in

Thank you is appreciated

Keep checking back, it's regularly updated!
Enjoy anonymous surfing!