{"id":3237,"date":"2011-07-06T03:12:45","date_gmt":"2011-07-05T20:12:45","guid":{"rendered":"http:\/\/deepquest.code511.com\/blog\/?p=3237"},"modified":"2011-07-06T03:15:06","modified_gmt":"2011-07-05T20:15:06","slug":"ultimate-privacy-guide-for-newbies","status":"publish","type":"post","link":"https:\/\/deepquest.code511.com\/blog\/2011\/07\/ultimate-privacy-guide-for-newbies\/","title":{"rendered":"Ultimate Privacy Guide for newbies"},"content":{"rendered":"<p>This guide will provide you basic security and anonymity while being connected on the internet. Remember this guide will not make you safe but safer when you are online. Keep in mind that the best defense is the best offense.<\/p>\n<p><!--more--><br \/>\n&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;<br \/>\n<strong>The\u00a0 Super Secret Security Handbook<\/strong> \ud83d\ude42<br \/>\n&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;<br \/>\n<tt><br \/>\n<\/tt><br \/>\n<strong>Master Table of Contents<\/strong><br \/>\n1) Preface<br \/>\n2) Setting up Tor<br \/>\n3) Firefox Recommended Add-Ons<br \/>\n4) Setting up i2p<br \/>\n4.1) Installation<br \/>\n4.2) Firefox Configuration<br \/>\n4.3) IRC Client Configuration<br \/>\n4.4) I2p IRC on Android via irssi connectbot<br \/>\n5) Advanced IRC<br \/>\n5.1) Commands<br \/>\n5.2) Browsing<br \/>\n6) Advanced Defense Techniques<br \/>\n7) Portable Solutions<br \/>\n8) ADVANCED GUIDE TO HACKING AND SECURITY VULNERABILITY<\/p>\n<p>&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;<br \/>\n<strong><span style=\"text-decoration: underline;\">Section 1: Preface<\/span><\/strong><\/p>\n<p>NOTE: If at any time you need help with any topic found in this guide, feel free to join us at <a href=\"http:\/\/goo.gl\/8zxwO\"><span style=\"text-decoration: underline;\">http:\/\/goo.gl\/8zxwO<\/span><\/a> and you&#8217;ll be able to find someone to help you figure it out. It should  be noted that this guide contains information that may be difficult to  understand without an extensive technical and functional knowledge of  information systems. While this guide does attempt to put it simply and  in laymans terms, you the user are ultimatly responsible for the  security of your own systems.<em><\/em><\/p>\n<p><strong><span style=\"text-decoration: underline;\">Section 2: Setting up Tor<\/span><\/strong><\/p>\n<p><strong>Preface:<\/strong> Due to abuse in the past, users trying to  connect to the AnonOps IRC servers using Tor will not be able to  connect. This is nothing personal, there have just been problems with  abuse of the program in the past on the IRC server. Therefore, we do not  recommend using this for IRC connection, but merely as an easy to use  tool for browsing the internet anonymously. Keep it in, for most users  it&#8217;s a relatively slow connection.<\/p>\n<p><strong>Windows:<\/strong><br \/>\nGo download Tor here: <a href=\"https:\/\/www.torproject.org\/dist\/torbrowser\/tor-browser-1.3.18_en-US.exe\">https:\/\/www.torproject.org\/dist\/torbrowser\/tor-browser-1.3.18_en-US.exe<\/a><\/p>\n<p>After downloading Tor:<br \/>\n1) Run the .exe<br \/>\n2) Extract to your PC.<br \/>\n3) You will now have extracted TOR into the selected folder. You should  have a button called &#8220;Start Tor&#8221; with an onion on it, click this to  start (if you want you can make a shortcut by right-clicking create  shortcut and drag it to your desktop, make sure the original stays in  the same folder though).<br \/>\n4) You are good to go, if your ISP blocks connections to TOR and you  need help setting up a bridge feel free to ask about it in the  #OpNewblood channel, which again you can access through your web browser  at this link: <a href=\"http:\/\/goo.gl\/8zxwO\"><span style=\"text-decoration: underline;\">http:\/\/goo.gl\/8zxwO<\/span><\/a><\/p>\n<p><strong>Linux:<\/strong><br \/>\n1) Download Tor here: <a href=\"https:\/\/www.torproject.org\/dist\/torbrowser\/linux\/tor-browser-gnu-linux-i686-1.1.4-dev-en-US.tar.gz\">https:\/\/www.torproject.org\/dist\/torbrowser\/linux\/tor-browser-gnu-linux-i686-1.1.4-dev-en-US.tar.gz<\/a><br \/>\n2) Extract to destination of your choice<br \/>\n3) You should now be able to just click your start tor button to start.<br \/>\n4) For additional ease of use, try Tor Button for Firefox.<br \/>\n5) Once again for help with making a bridge if your ISP blocks Tor  please ask for help in #OpNewblood via your web browser here: <a href=\"http:\/\/goo.gl\/8zxwO\"><span style=\"text-decoration: underline;\">http:\/\/goo.gl\/8zxwO<\/span><\/a><\/p>\n<p><strong>Mac OS X:<\/strong><br \/>\n1) Download Tor here: <a href=\"https:\/\/www.torproject.org\/dist\/vidalia-bundles\/vidalia-bundle-0.2.1.30-0.2.10-i386.dmg\"><span style=\"text-decoration: underline;\">https:\/\/www.torproject.org\/dist\/vidalia-bundles\/vidalia-bundle-0.2.1.30-0.2.10-i386.dmg<\/span><\/a><br \/>\n2) Mount the .dmg file and find it on your desktop<br \/>\n3) Move Vidalia to your applications folder<br \/>\n4) Download the Tor button for Firefox here: <a href=\"https:\/\/www.torproject.org\/torbutton\/index.html.en\">https:\/\/www.torproject.org\/torbutton\/index.html.en<\/a><br \/>\n5) Once you have both installed, run Vidalia and make sure it says  &#8220;Connected to the Tor Network!&#8221; and then go to your Firefox browser and  right click on the indicator in the bottom right and click &#8220;Toggle Tor  Status&#8221;<br \/>\n6) Read more on operating Tor here: <a href=\"https:\/\/www.torproject.org\/docs\/tor-doc-osx.html.en\">https:\/\/www.torproject.org\/docs\/tor-doc-osx.html.en<\/a><br \/>\n7) Once again for help with making a bridge if your ISP blocks Tor  please ask in the #Opewblood channel via your web browser here: <a href=\"http:\/\/goo.gl\/8zxwO\"><span style=\"text-decoration: underline;\">http:\/\/goo.gl\/8zxwO<\/span><\/a><\/p>\n<p><strong>A NOTE FOR ALL OS&#8217;s:<\/strong><br \/>\n<span style=\"text-decoration: underline;\">1)<\/span> To check anytime if TOR is working, you can go here: <a href=\"https:\/\/check.torproject.org\/\">https:\/\/check.torproject.org\/<\/a> and it will tell you if your TOR is working.<br \/>\n2) Highly reccomended is the TOR button for firefox: <a href=\"https:\/\/addons.mozilla.org\/en-us\/firefox\/addon\/torbutton\/\">https:\/\/addons.mozilla.org\/en-us\/firefox\/addon\/torbutton\/<\/a> which will allow you to turn tor on\/off as well see if it&#8217;s disabled in your browser.<\/p>\n<p><strong>Anonymous Browsing Using Tor Button for Firefox<\/strong><br \/>\nStart by install Tor on your computer and configuring it to your liking.  Then, download the Tor Button add-on for Firefox, and use the options  to configure the add-on the way you want it. Then, press the &#8220;Tor  Button&#8221; and go to a test website to ensure you&#8217;ve done it correctly. If  the website returns properly anonymous results, then you&#8217;ve correctly  set up Firefox for anonymous browsing through Tor.  Also worth doing:  hit Tools&gt;Start Private Browsing whenever you are browsing with Tor.   It stops logging your web history, caching files, passwords, cookies,  and download history, so you don&#8217;t have to clear the history everytime  you&#8217;re finished. <em><\/em><\/p>\n<p><strong>Troubleshooting: refer to <a href=\"http:\/\/pastehtml.com\/view\/www.torproject.org\">www.torproject.org<\/a><\/strong><\/p>\n<p><strong><span style=\"text-decoration: underline;\">Section 3: Firefox recommended Add-ons<\/span><\/strong><\/p>\n<p><strong>Adblock Plus<\/strong>: This plugin blocks around 90% of internet  services that attempt to track your web activity and then send you  targetted ads. It&#8217;s crucial to use while browsing any aon websites or  sites that have anon news articles, etc. <a href=\"http:\/\/goo.gl\/fPmjm\">http:\/\/goo.gl\/fPmjm<\/a><\/p>\n<p><strong>NoScript<\/strong>: A very useful plugin that will disable  javascript on sites to protect your privacy and stop malicious activity.  Can set rules for individual sites or deny globally. <a href=\"http:\/\/noscript.net\/\">http:\/\/noscript.net\/<\/a><\/p>\n<p><strong>BetterPrivacy<\/strong>: This plugin is a tool to identify and  remove cookies.  It will also act as an &#8220;optout&#8221; from advertisement and  other forms of web tracking.  <a href=\"http:\/\/goo.gl\/TL79Z\">http:\/\/goo.gl\/TL79Z<\/a><\/p>\n<p><strong>FoxyProxy<\/strong>: An Addon to the default way to handle  connecting to proxies, the FoxyProxy addon will allow you to have easier  access to enabling your proxy tunnels, also has advanced features, such  as setting up a list of domains that you will always want to use a  proxy to connect to, and to do so automatically, while still using  another connection for non-listed sites.  <a href=\"http:\/\/goo.gl\/VRiHT\">http:\/\/goo.gl\/VRiHT<\/a><\/p>\n<p><strong>Ghostery<\/strong>:  Another tool to help manage and mitigate  tracking cookies, Ghostery features tools that will alert you when there  are tracking cookies on the websites you visit.  You can also view  information about each tracker that is trying to harvest your browsing  data, and even view the source code of said tracker and see exactly how  the cookie is tracking you. Make sure you get Fanboy list and Easy list  to stay updated (these can be selected during setup or in the options of  the addon itself ) <a href=\"http:\/\/goo.gl\/GoKQ1\">http:\/\/goo.gl\/GoKQ1<\/a><\/p>\n<p><strong>Greasemonkey (GM)<\/strong>: A great addon that allows you to  edit the way websites show information to you, using bits of javascript  code.  This is more of an addon &#8220;engine&#8221; or development platform,  allowing you to write and download scripts to do many different things  using their addon.   <a href=\"http:\/\/goo.gl\/atGk7\">http:\/\/goo.gl\/atGk7<\/a><\/p>\n<p><strong>HTTPS Everywhere<\/strong>: A Firefox extension produced as a  collaboration between The Tor Project and the Electronic Frontier  Foundation.  It encrypts your communications with a number of major  websites. <a href=\"http:\/\/goo.gl\/fsKV\">http:\/\/goo.gl\/fsKV<\/a><em><\/em><\/p>\n<p><strong><br \/>\n<span style=\"text-decoration: underline;\">Section 4: Setting up i2p for IRC+Browsing<br \/>\n<\/span><\/strong><tt>by cred <\/tt><\/p>\n<p><strong>Section 4 table of contents:<\/strong><br \/>\n4.1 Installation<br \/>\na. Windows<br \/>\nb. Linux<br \/>\n4.2 Firefox Configuration<br \/>\n4.3 IRC Client Configuration<br \/>\n4.4 I2p IRC on Android via irssi connectbot<br \/>\n&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8211;<br \/>\n<strong>4.1a) I2p Installation: Windows<\/strong><br \/>\n1) Download:<br \/>\nYou can download the latest version of the i2p software here:<br \/>\n<a href=\"http:\/\/www.i2p2.de\/download\">http:\/\/www.i2p2.de\/download<\/a>.<br \/>\n2) Installing:<br \/>\nIn windows, the installation, as with any other windows software, is relatively<br \/>\nstraightforward. Double click on i2pinstall_(version).exe that you  downloaded from the above website and follow the instructions.<br \/>\n3) Launching the router:<br \/>\nAfter the install has completed, you can access your router console  (control panel for i2p software, in the form of a website) even when  you&#8217;re not actively using the i2p proxy by doubleclicking the &#8220;Start  I2p&#8221; icon or by following <a href=\"http:\/\/127.0.0.1:7657\/\">http:\/\/127.0.0.1:7657<\/a> For those not versed in how the internet works, 127.0.0.1 is an IP  address that always leads to Localhost, or webservices that are running  on your machine.  As long as you are connecting to that address, no  other anonymizing software is needed, since you are only talking to your  own machine.<br \/>\n4) Browsing I2p:<br \/>\nIn order to access .i2p websites, or eepsites, you&#8217;ll have to set up  i2p as a PROXY on your web browser of choice, instructions for this on  Firefox are in section 4.2<\/p>\n<p><strong> 4.1b) I2p Installation: Linux<\/strong><br \/>\n<strong> <\/strong>1) Easy way: Ubuntu.<\/p>\n<ul>\n<li>Open a Terminal and enter:<\/li>\n<\/ul>\n<p><code>sudo apt-get install sun-java6-jdk <\/code><\/p>\n<ul>\n<li>Get the latest install package (yes, the .exe file, don&#8217;t ask, it&#8217;s java.) from <a href=\"http:\/\/www.i2p2.de\/download\">http:\/\/www.i2p2.de\/download<\/a>. In the terminal window, navigate to the folder where you downloaded the .exe file and enter:<code>java -jar i2pinstall-*.exe<\/code><\/li>\n<\/ul>\n<ul>\n<li>Follow the prompts<\/li>\n<\/ul>\n<p>2)  Other distributions:<br \/>\nGoogle instructions for  installing the java JRE software on your distribution, typically it&#8217;s  not much more difficult than with Ubuntu, but different distros have  their own package management systems, and the commands might be slightly  different.<br \/>\nOnce Java is installed, it&#8217;s the same command as Ubuntu:<\/p>\n<p><code>java -jar i2pinstall-*.exe <\/code><\/p>\n<p><strong> 4.2) Firefox Configuration<\/strong><br \/>\n1) Verify it&#8217;s running:<br \/>\nOnce the i2p client is installed, you can verify it&#8217;s running an http:\/\/ tunnel by<br \/>\ngoing to <a href=\"http:\/\/127.0.0.1:7657\/i2ptunnel\/\">http:\/\/127.0.0.1:7657\/i2ptunnel\/<\/a> Under the &#8220;I2p Client Tunnels&#8221; section, the first entry should be &#8220;I2p  HTTP Proxy&#8221;. On the right, under the &#8220;Status&#8221; column, there are three  little stars, one red, one yellow, and one green. If red is lit up, hit  the &#8220;start&#8221; button to the right of it, If it&#8217;s yellow, you don&#8217;t have  enough peer connectionsyet, and you should let it establish a presence  on the network.  Leave it alone and grab a sandwich, it should be ok in  an hour or two.<br \/>\n2) Set up localhost as a proxy<br \/>\nGoto Edit&gt;Preferences<br \/>\nGoto the Advanced section<br \/>\nUnder Connections click the Settings button<br \/>\nSelect &#8220;Manual Proxy Configuration&#8221;<br \/>\nEnter the following:<\/p>\n<ul>\n<li>HTTP Proxy: 127.0.0.1 Port: 8118<\/li>\n<li>SSL Proxy: 127.0.0.1 Port: 8118<\/li>\n<li>SOCKS Host: 127.0.0.1 Port: 9050<\/li>\n<li>SOCKS V5 checked<\/li>\n<li>No Proxy for: 127.0.0.1<\/li>\n<\/ul>\n<p><strong> 4.3) Various IRC Client configuration<\/strong><br \/>\nIRC Clients need no special setup or proxies.  Just visit your<br \/>\n<a href=\"http:\/\/127.0.0.1:7657\/i2ptunnel\/\">http:\/\/127.0.0.1:7657\/i2ptunnel\/<\/a> and make sure IRC Proxy is running.  If it is, justconnect to 127.0.0.1  on port 6668 like it&#8217;s a normal IRC server.  Your client will sendall  data to the proxy that&#8217;s running on your machine on port 6668, which  will then send it, via I2p, anonymously and securely to the i2p IRC  servers.  You may enter additional .i2p irc servers by clicking on <em>IRC Proxy<\/em> on the Tunnel manager page and pasting the addresses in the &#8220;Tunnel  Destination&#8221; field (comma seperated).Take a look at this list of clients  and choose the one that sounds right for you:<br \/>\nWindows: <a href=\"http:\/\/www.ircreviews.org\/clients\/platforms-windows.html\">http:\/\/www.ircreviews.org\/clients\/platforms-windows.html<\/a><br \/>\nLinux: <a href=\"http:\/\/www.ircreviews.org\/clients\/platforms-unix-x.html\">http:\/\/www.ircreviews.org\/clients\/platforms-unix-x.html<\/a><\/p>\n<p><em>(This author is a proud owner of a Ubuntu box, chatting on Xchat)<\/em><\/p>\n<p><strong>4.4)  Fun shit<\/strong><br \/>\n1)  If you have a Linux machine, you can connect to the i2p irc  servers through your home computer from your Android phone from anywhere  in the world.<\/p>\n<ul>\n<li> What you need:<\/li>\n<li> Ubuntu Linux: <a href=\"http:\/\/www.ubuntu.com\/\">http:\/\/www.ubuntu.com<\/a><\/li>\n<li> irssi connectbot for Android<\/li>\n<\/ul>\n<p><a href=\"https:\/\/market.android.com\/details?id=org.woltage.irssiconnectbot\">https:\/\/market.android.com\/details?id=org.woltage.irssiconnectbot<\/a><\/p>\n<ul>\n<li> openssh for Ubuntu: sudo apt-get install openssh-server<\/li>\n<li> irssi for Ubuntu: sudo apt-get install irssi<\/li>\n<\/ul>\n<p>2) open irssi connectbot on your android and enter [your linux username]@yourip:port<br \/>\nNow, since most people are behind a firewall, or a router, or something, there&#8217;s<br \/>\nprobably some port forwarding you&#8217;re going to have to do,  but for now, just connect  to your own wireless router with your  android&#8217;s wifi.  It&#8217;s safer anyway.<\/p>\n<p>3) First thing you want to do is login with your password (that&#8217;s why  it&#8217;s better to do it locally before doing it over the web&#8230;  Make sure  you&#8217;ve got encryption on your wifi, by the way)<\/p>\n<p>4)  Once you have a command prompt on your android, hit the back button  to get back to the host list, then the menu button, and tap &#8220;Manage  Pubkeys&#8221;  Hit the menu again, and select &#8220;generate&#8221;.  Name your key,  make it RSA and give it at least a 1024 bit hash, (I go to 2048, you  can&#8217;t be too careful)  No password, and hit &#8220;Generate&#8221;<\/p>\n<p>5)  Now it will have you fuck around with your touchpad to generate  randomness, and create your pubkey.  Once you&#8217;re back on the pubkey list  with your new pubkey, longpress on it and select &#8220;Copy Public Key&#8221;<\/p>\n<p>6) Now hit the back button and click your host connection in  the host list, which will bring you back to your command prompt.  Enter  cat &#8220;(hit menu and select paste to paste your pubkey into these quotes)&#8221;  &gt;&gt; .ssh\/authorised.keys<\/p>\n<p>7) Now enter exit which  will take you back to your server list, and disconnect you.  Tap your  server to connect again, and this time, it should not ask you for a<br \/>\npassword.  This means you are connected using a shared 1024 bit (at least)<br \/>\npubkey, which ain&#8217;t bad.<\/p>\n<p>8) To connect from outside your home network, you need a few more things:<\/p>\n<ul>\n<li>Your external IP address: <a href=\"http:\/\/www.whatismyip.com\/\">http:\/\/www.whatismyip.com<\/a><\/li>\n<li>Port  forwarding to port 22 on your machine (if you have a router and  multiple machines on your home network as most do)  See step 9<\/li>\n<\/ul>\n<p>9) Most routers are set up with a web interface for changing settings.   If you have<br \/>\nwireless security enabled, then you or whoever set up your home network  for you, have already accessed the web interface, and should have set up  a password. You&#8217;ll need to log into that web interface, go to the  section on port forwarding, and forward an available external port (22  will do) to port 22 on your machine&#8217;s local IP address (usually  192.168.1.101 or something) for BOTH tcp and udp.  This is as clear as I  can make it without router specific instructions. (Talk to your router  provider or local geek for help in this regard)<\/p>\n<p>10) Now all you need to do is connect through irssi connectbot to (your<br \/>\nusername)@(your external IP address):(port you set up to forward to ssh on your<br \/>\nmachine)<\/p>\n<p>11) Once you&#8217;re connected to a ssh server on your home computer (which by now<br \/>\nshould be running i2p) you may launch irssi, a command line irc client, and connect to the i2p servers with irssi using:<\/p>\n<p><code>\/connect 127.0.0.1 6668<\/code><\/p>\n<p>Questions? Comments? Concerns? Join into #OpNewblood via your web browser here: <a href=\"http:\/\/goo.gl\/8zxwO\"><span style=\"text-decoration: underline;\">http:\/\/goo.gl\/8zxwO<\/span><\/a> or you can contact cred via i2pmail cred@mail.i2p or from the insecure web (securely) at <a href=\"http:\/\/privacybox.de\/cred.msg\">http:\/\/privacybox.de\/cred.msg<\/a> (include return contact info, since it doesn&#8217;t store or transmit any identifying information) <em><\/em><\/p>\n<p><strong><span style=\"text-decoration: underline;\">Section 5: Advanced IRC Commands<\/span><\/strong><\/p>\n<p><strong>5.1) Commands<\/strong><\/p>\n<p><strong>1) \/join<\/strong><br \/>\nSelf explanatory, this is used to join a channel, to join #opnewblood , you would type <em>\/join #opnewblod<\/em><br \/>\n<strong>2) \/me<\/strong><br \/>\nNot really as necessary, but used sometimes. for instance if you wanted to wave at someone, you would type <em>\/me waves <\/em>it would appear as &#8220;anon waves&#8221;<br \/>\n<strong>3) \/msg<\/strong><br \/>\nif  you want to have a conversation with a specific person outside of the  channel the best thing to do is message them, just type <em>\/msg username message here. <\/em>just make sure to use a space between their name and the message.<br \/>\n<strong>4) \/query<\/strong><br \/>\nSame thing as msg, except this will open up a new window for you to have a conversation with this person.<br \/>\n<strong>5) \/nick<\/strong><br \/>\nThis command will change your nickname for instance if you wanted to be called gigapuddi you&#8217;d type <em>\/nick gigapuddi. <\/em>Remember  though if you do this you won&#8217;t be registered unless you re-register  with nickserv (see the walkthrough to anon if you dont know what  nickserv is, or want help with it)<br \/>\n<strong>6) \/quit<\/strong><br \/>\nThis will let you quit.<br \/>\n<strong>7) \/ignore<\/strong><br \/>\nTrolls are plenty, and it&#8217;s best not to feed them, and just ignore them. To ignore someone type <em>\/ignore username<\/em><br \/>\n<strong>8) \/whois<\/strong><br \/>\nThis  will display information about the person you selected, such as their  vhost, what channels they&#8217;re in ect. to find a whois just type <em>\/whois username<\/em><br \/>\n<strong>9) \/away<\/strong><br \/>\nTo mark yourself away, you can use this, if you were persay making a sandwich, you could do <em>\/away making sammiches <\/em>and people will know you&#8217;re making sandwiches.<br \/>\n<strong>10) \/ping<\/strong><br \/>\nThis  is to see the latency to the server, if you&#8217;re lagging this might give  you more information, to ping a server just type \/ping ipadresshere<br \/>\n<strong>11) \/notify on\/off<\/strong><br \/>\nThis  will change if you get a notification (a beep sound) whenever someone  types your name. to turn off \/notify off to turn on do <em>\/notify on<\/em><br \/>\n<strong>12) \/topic<\/strong><br \/>\nIf you want to see a topic in a certain channel just type \/topic and it will read it out to you.<br \/>\n<strong>13) \/list<\/strong><br \/>\nLists the channels that are available to you.<\/p>\n<p><strong>5.2) Browsing IRC<\/strong><\/p>\n<p><strong>NickServ<\/strong><br \/>\nWhen you arrive on the IRC for the first time, you will be using  an unregistered nickname. If you plan on becoming a regular user, it is  vital to register your nick. This is important for several reasons:<\/p>\n<ul>\n<li>It ensures that nobody can impersonate you.<\/li>\n<li>It grants you various abilities which non registered users do not have<\/li>\n<li>(Most importantly) It allows you to use a vhost &#8211; this hides your location and ISP information from other users.<\/li>\n<\/ul>\n<p>To register your nickname, refer to the IRC guide for your operating system on the original #OpNewblood page.<\/p>\n<p>When you connect to the server, type \/msg nickserv IDENTIFY password<br \/>\nThis  will tell nickserv that you are the real owner of your nickname. If you  do not do this, you will not have access to registered-only chans or  your vhost. For safety reasons, it is recommended that you type the  command in your status window so, in the event of an error on your part,  you do not post your password to an entire channel.<\/p>\n<p><strong>Groups<\/strong><br \/>\nIf you plan to use more than one nickname, you  can group them together. This has several uses, the main ones being to  tell people where you are connecting from, or that you are away.<\/p>\n<p>For  example: a user called &#8220;JohnDoe&#8221; might be going out for a while but  leaving his laptop on, in which case he could change his nick to  JohnDoe|Away or JohnDoe|AFK to let other users know he was away. This is  important so as, for example, people will know why you are not replying  to messages. He might also use the nick JohnDoe|Mobile to let people  know he is on a mobile client, and therefore cannot use certain  functions such as possibly recieving PMs or visiting links people might  send him.<\/p>\n<p>To change your nick, type \/nick newnick. However, when  you do this, you will lose any access levels, vhost, and other settings  associated with your nick.<\/p>\n<p>To avoid this, when you choose your  new nickname, switch to it using \/nick, then type \/msg nickserv GROUP  nick password &#8211; where nick and password are your MAIN nick and its  password. This ensures that these nicks will share passwords and  settings.<\/p>\n<p><strong>Ghosts<\/strong><br \/>\nLet&#8217;s face it, sometimes shit happens.  Sometimes your internet connection will randomly decide to die on you.  Sometimes your laptop&#8217;s battery might run out, sometimes your IRC client  will crash, sometimes you might accidentally close a window. There are  many reasons one might suddenly find themselves accidentally  disconnected from the IRC.<\/p>\n<p>The problem is that unless someone signs off in &#8220;an orderly  fashion&#8221;, the server will not actually realize they are gone. Think of  it like somebody who puts down a phone and walks away, but without  hanging up the call. Or like when your computer crashes without shutting  down the correct way. In these circumstances, the IRC server does not  realize you&#8217;re gone, and assumes your nick is still connected. This  situation remains until the next time the IRC pings your nick and gets  no response (&#8216;ping timeout&#8217;). This can take a while though, and very  often the person who has disconnected, will manage to get themselves  back online <em>before<\/em> the server has time to realize they ever left  in the first place. When this happens, the user&#8217;s nick is already in  use, so the server will assign them a new one (usually just by adding a `  or _ to the end, so if JohnDoe tries to connect when there is already a  JohnDoe connected, they will be signed on as JohnDoe_ or JohnDoe`.<\/p>\n<p>The  problem with this, of course, is that just like an un-identified nick,  these nicks have no modes, no vhosts, no access levels &#8211; because the  &#8220;ghost&#8221; of the nick is still occupying them.<\/p>\n<p>To force the dead  session to disconnect and replace its nick with yours, type \/msg  nickserv GHOST password, where password is the pass to the original  nick. This would, in this example, disconnect JohnDoe and change  JohnDoe_ to JohnDoe automatically, identifying and setting up the nick  as normal. When this happens, you will probably see something like this  in the channel:<\/p>\n<p>JohnDoe left the chat room (GHOST command used by JohnDoe_)<\/p>\n<p>JohnDoe_ is now known as JohnDoe<\/p>\n<p>It  is very important to do this as quickly as possible when re-connecting,  as you will be locked out of your vhost until you have done this.<\/p>\n<p><strong>Vhosts<\/strong><br \/>\nObviously one of the main priorities of any Anonymous is to be, well&#8230; <em>Anonymous<\/em>.<\/p>\n<p>When you connect to our IRC server, the server will  automatically mask your IP address (your computer&#8217;s &#8220;phone number&#8221;).  This is the most important layer of anonymity, but unfortunately there  is a catch. Most of the time, it will NOT automatically hide your ISP  (Internet Service Provider)&#8217;s name. So for example the fact that your IP  is from a certain town might be hidden, the fact that you are a comcast  customer may not be.<\/p>\n<p>To rectify this, we have a vHostServ. It  gives you a fake host name, which masks the true ISP you are connecting  through. It can be anything you want &#8211; for instance, if anyone ever  tries to check where I am connecting from, they will see  &#8220;fuck.off.you.bollocks&#8221; instead. \ud83d\ude00<\/p>\n<p>To get a vHost, you must be  registered and identified. This is why it is CRUCIAL that you identify  ASAP when you connect, as your vHost will not be activated until you  have done so.<\/p>\n<p>How to get a vHost :<br \/>\n1. Type \/join #vhost in your IRC.<br \/>\n2. Once inside the vHost channel, type !vhost (insert.clever.name.here).<br \/>\nNOTE  : You can, indeed, use whatever you want as a vhost &#8211; provided it is a  valid one, i.e. no spaces, and must contain at least one dot. The most  common way to do this therefore is.to.use.dots.as.spaces.in.your.vHost.<\/p>\n<p>When  you have done this, vHostServ will automatically kick and ban you from  the #vhost channel. This is normal and expected, and simply means the  vHost as worked. You will be banned from the channel (#vhost) for a  certain amount of time, after which you will be able to change your  vHost if you like. Now that you have a vhost, you are fully set up to  use the IRC, any other settings you may set on your nick are purely  optional.<\/p>\n<p>*Note: If you join a #chan before you vHost, your new  anonymized information will not automatically update in the channel. Be  sure to exit and rejoin any channels you are connected to after you  vHost, or your real connection information will still be viewable.<\/p>\n<p>**NOTE:  If you use Xchat along with auto-join channels, you can tell xchat to  wait longer before joining channels on server connect using the \/set  irc_join_delay X command, where X is the number of seconds xchat will  wait before joining channels.  Setting this to something like 10 seconds  helps if you&#8217;re using automatic channels<\/p>\n<p><strong>Invite-only channels (mode +i)<\/strong><br \/>\nSome channels, for  various reasons, are invite-only. Commonly this is because the channel  has a very specific purpose and only users who have a specific job in  the channel can access it &#8211; for example, there are private channels for  operators and hackers. Sometimes, a channel will also be set to +i if it  is being invaded or flooded by bots or trolls.<\/p>\n<p>If a channel is +i, you will not be able to join it using \/join.  You will simply get an error message telling you that the channel is  invite only. However, if you are an operator yourself, or are on the  invite exception list, you can force the server to let you in.<\/p>\n<p>To do this, you send a message to another bot called ChanServ, which is  not covered in this guide as in general only more advanced users will  ever need to use it. However, to request an invite, type \/msg chanserv  INVITE #channel, where #channel is the channel you are trying to connect  to. It is important to include the # at the start of the channel name,  or ChanServ won&#8217;t recognize it.<\/p>\n<p>If you are on the list, you will then gert a message asking you if  you would like to join the channel. Otherwise, chanserv will tell you  that you do not have permission.<\/p>\n<p>If you are NOT on the invite or  operator list for a channel, but you feel you should be allowed in to it  anyway, you can type \/knock message, where message is your message to  the channel admins. So for instance, if there was a channel called  #brits only for British people, and you didn&#8217;t have access, you could  type \/knock #brits Hey, I&#8217;m British, let me in!<\/p>\n<p>This will send a  message to the channel admins, and cause your message to appear in the  channel. The admins will then (if they decide to let you in), send you  an invite just like chanserv does. You will receive the same message you  would receive from chanserv asking you if you would like to join the  channel.<\/p>\n<p>NOTE: Knocking on a channel 10 times in a row is not  going to amuse anyone. In all likelihood, it will actually make it  almost certain that you will NOT be invited into the channel. If you  receive no invite it either means the admins are not active at that  time, or have decided for whatever reason not to invite you. If it does  happen, you could maybe try again later, but don&#8217;t knock 10 times in one  minute, this is more likely to get you banned.<\/p>\n<p>If no one replies to your knock, another option you have is to type \/msg  chanserv INFO #channel, where #channel is the name of the channel  (again, include the # or chanserv will ignore your message). This will  tell you what the channel is for, and who created it. You could then  message the room founder and ask for access, but this is generally not  recommended unless it is extremely urgent. <em><\/em><\/p>\n<p><strong>Section 6: Advanced Defense Techniques<\/strong><\/p>\n<p><strong><span style=\"text-decoration: underline;\">USING Virtual Machines<\/span><\/strong><br \/>\nIt is strongly recommend you consider making a Virtual Machine (VM) to  seperate your personal OS instance with you anon activity OS instance.  This ensures that personal data does not leak while viewing anon related  social media on such sites as Twitter or Facebook.<\/p>\n<p>It has  several other advantages such as allowing you to quickly delete all anon  activity off your computer by simply deleting the VM itself.<\/p>\n<p><strong>Virtual Machine Software<\/strong><br \/>\nVirtualBox &#8211; x86 and x64<br \/>\nVMWare Workstation 7 &#8211; x86 and x64<br \/>\nWindows Virtual PC &#8211; x86<br \/>\netc. (do a google search for &#8220;virtual machine)<\/p>\n<p><strong><span style=\"text-decoration: underline;\">DISK ENCRYPTION<\/span><\/strong><br \/>\nDisk encryption is another way to  protect yourself. Disk encryption software will make it pretty much  impossible for any one but yourself to access the data on any physical  disk.<\/p>\n<p><strong>Disk Encryption Software<\/strong><br \/>\nTrueCrypt &#8211; <a href=\"http:\/\/www.truecrypt.org\/\">http:\/\/www.truecrypt.org\/<\/a><br \/>\nBitlocker &#8211; (Win 7 Ultimate only)<\/p>\n<p><strong>File and Email encryption and validation <\/strong><tt>(added by cred)<\/tt><br \/>\nUsing the openPGP standard, the following software creates a &#8220;Keyring&#8221;  for you, bound to your name and email address (neither of which needs to  be real, I have two, one for my real life identity and another as cred)   The private key is a password protected key you keep on any system on  which you will be DECRYPTING information; your home computer, and if  you&#8217;re brave, your Android phone.  The public key is used to ENCRYPT  information or files, and is available to anyone.  So if you wanted to  encrypt information to send to me, you&#8217;d have to search from my public  key, (cred@mail.i2p will find it for you) encrypt the data with it, and  send it to me.  The only thing that can now recover that data is my  private key and password.  PGP is the industry standard for high level  encrypted email.<\/p>\n<p>PGP (Windows) <a href=\"http:\/\/gpg4win.org\/download.html\">http:\/\/gpg4win.org\/download.html<\/a><br \/>\nPGP (Linux) <a href=\"http:\/\/www.gnupg.org\/\">http:\/\/www.gnupg.org\/<\/a><br \/>\nAPG (Android) <a href=\"https:\/\/market.android.com\/details?id=org.thialfihar.android.apg\">https:\/\/market.android.com\/details?id=org.thialfihar.android.apg<\/a><\/p>\n<p><strong><span style=\"text-decoration: underline;\">PROXY LISTS<\/span><\/strong><br \/>\n&#8211; <a href=\"http:\/\/www.freeproxies.org\/\">http:\/\/www.freeproxies.org<\/a><br \/>\n&#8211; <a href=\"http:\/\/www.socks24.org\/\">http:\/\/www.socks24.org<\/a><br \/>\n&#8211;  <a href=\"http:\/\/www.samair.ru\/proxy\">http:\/\/www.samair.ru\/proxy<\/a><\/p>\n<p><strong><span style=\"text-decoration: underline;\">LINUX TOR VM&#8217;s<\/span><\/strong><br \/>\nIt&#8217;s possible to use Tor as a VPN using some prepackaged linux VM&#8217;s.  Once these VM&#8217;s are started it&#8217;s possible to create a VPN connection to  the Tor VM. These VM include additional privacy goodies such as Squid  and Privoxy. <em><\/em><\/p>\n<p><strong>Linux Tor Software<\/strong><br \/>\nJanusVM &#8211; <a href=\"http:\/\/janusvm.com\/\">http:\/\/janusvm.com\/<\/a><br \/>\nTAILS &#8211; <a href=\"https:\/\/amnesia.boum.org\/\">https:\/\/amnesia.boum.org\/<\/a><\/p>\n<p><strong><br \/>\n<span style=\"text-decoration: underline;\">Section 7: Portable Solutions<\/span><\/strong><\/p>\n<p>Portable refers to self-contained OS and software packages that can be  run from CD, DVD or USB device. This allows you to carry your anon OS  instance in your pocket, plug it into or insert into another computer  and be ready to access anon resources in a secure way.<\/p>\n<p><strong>The Amnesic Incognito Live System: <\/strong><a href=\"https:\/\/amnesia.boum.org\/download\/index.en.html\">https:\/\/amnesia.boum.org\/download\/index.en.html<\/a><br \/>\nA bootable, live, Linux distribution focusing on security and privacy, Basically this entire document in a single download.<\/p>\n<p><strong>Gnacktrack:<\/strong> <a href=\"http:\/\/www.gnacktrack.co.uk\/\">http:\/\/www.gnacktrack.co.uk\/<\/a><br \/>\nFor  the hacker anons among us, a live linux distribution with all the tools  a good hacker needs to control the fate of the world from a laptop at a  Starbucks.<\/p>\n<p><strong>BackTrack:<\/strong> <a href=\"http:\/\/www.backtrack-linux.org\/\">http:\/\/www.backtrack-linux.org\/<\/a><br \/>\nGnacktrack, only for people who prefer the K desktop environment over GNOME.<\/p>\n<p><strong>Ubuntu Privacy Remix: <\/strong> <a href=\"https:\/\/www.privacy-cd.org\/\">https:\/\/www.privacy-cd.org\/<\/a><br \/>\nIntended solely for Live Booting, no installation on the local system is required, and none of the data on it is touched.  <em><\/em><\/p>\n<p><strong><br \/>\n<span style=\"text-decoration: underline;\">Section 8: ADVANCED GUIDE TO HACKING<br \/>\nAND SECURITY VULNERABILITY<\/span><\/strong><br \/>\nby Denizen<\/p>\n<p><strong>Preface:<\/strong> Information in this section can be extremely confusing  for new users, and those without the sufficient technical knowledge to  understand. Always be cautious when tinkering with systems you don&#8217;t  fully understand, as this may lead to undesirable results, detection,  and in extreme cases system failure or legal trouble.<\/p>\n<p>For those interested, an excellent guide to Denial of Service Attacks or DDoS can be found here: <a href=\"http:\/\/insurgen.cc\/index.php?title=DDOS\">http:\/\/insurgen.cc\/index.php?title=DDOS<\/a><\/p>\n<p>&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;-<br \/>\nGuide By: Denizen<br \/>\nAs the ultimate denizen, you must be able to enter  systems at will in various ways. There are many ways to reach a website,  and to add protection for yourself in terms of anonimity and minimized  vulnerability.<br \/>\n&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;-<\/p>\n<p><strong>Table of Contents<\/strong><br \/>\n1. SSH Tunnelling Techniques<br \/>\n2. VPN (Virtual Private Network) Sub-netting techniques<br \/>\n3. Anonymous SOCKS4\/SOCKS5 proxy techniques at<br \/>\nOS level (e.g. Network Layer 3)<br \/>\n4. Anonymous SOCKS4\/SOCKS5 proxy techniques at Internet Browser Level (e.g. firefox)<br \/>\n5. Local DNS hosting and Direct to IP internet browsing<br \/>\n6. Windows \/system32\/drivers\/etc\/Hosts File IP DNS Lookup (Associating any ip with any hostname, permanently)<\/p>\n<p>1. USING PUTTY TO SETUP AN SSH TUNNEL<br \/>\n<a href=\"http:\/\/oldsite.precedence.co.uk\/nc\/putty.html\">http:\/\/oldsite.precedence.co.uk\/nc\/putty.html<\/a><\/p>\n<p>Normal  connections to the internet, unless using SSL, are typically  unencrypted transmissions divided into data packets.  Using a  packetsniffer, it is possible to capture most packets, and look at their  payload in plain text. This can include usernames, emails, IM&#8217;s, and  sometimes even passwords and sensitive information. When you set up a  tunnel securely, you are connecting to a secure, encrypted connection to  the machine you are connecting to, helping to prevent the use of  packetsniffers to steal your information.<\/p>\n<p>Not only is this  useful for keeping your local connection to the internet secure, it is  also one of the basic ways you can hide which IP address you are  connecting to the internet from at home.  When using the tunnel for your  transmissions, all of your packets will have that machine&#8217;s IP address  on the source address section instead of your own.  Again, as covered  above, you cannot trust a VPN (SSH) provided at no cost.  It is in your  best interests to use a paid hosting provider.<\/p>\n<p>2.OPENVPN  GNU\/LINUX HOWTO (what if they don&#8217;t have linux) list alternatives for vpn\/ instructions for other os&#8217;s?)<br \/>\nInformation on how to set up a GNU\/Linux system to use open VPN can be found here: <a href=\"http:\/\/openvpn.net\/howto.html\">http:\/\/openvpn.net\/howto.html<\/a> (openvpn only secures you between your server and you, not between your  server and the internet. your server will be the middle man and is  identifieable unless augmented with additional obfuscation techniques)<\/p>\n<p>3. USING SOCKS4\/5 PROXIES WITH FIREFOX<br \/>\nIf you&#8217;re interested in using SOCKS 4\/5 proxies with the Firefox browser, you can find instructions here: <a href=\"http:\/\/uniqueinternetservices.com\/configure-proxy-for-firefox.html\">http:\/\/uniqueinternetservices.com\/configure-proxy-for-firefox.html<\/a><\/p>\n<p>4. CHANGING LOCAL DNS SERVICES<br \/>\nThis  section explains how to change the nameserver that resolves domain  names into IP adresses that is sometimes used as an ideal way to trace  you by your ISP, even if the data you used is encrypted via RSA or a  strong triple des encryption the request to the domain name to an ip  still is carried out by someone, make sure it&#8217;s you, or someone  friendly.<\/p>\n<p>DNS requests in an ideal situation should be encrypted,  if you&#8217;re super paranoid, and some proxies offer this. I can&#8217;t list  which ones off the top of my head, sorry.<\/p>\n<p><a href=\"http:\/\/dnscurve.org\/in-benefits.html\">http:\/\/dnscurve.org\/in-benefits.html<\/a> ?<\/p>\n<p>5. CHANGING WINDOWS HOSTNAMES PERMANENTLY<br \/>\nThis  hackers trick is a good way to associate a permanent IP mirror for your  favourite social networking site like facebook, twitter, etc etc. If  this is something you&#8217;re interested in, more information can be found  here: <a href=\"http:\/\/www.ehow.com\/how_5225562_edit-windows-hosts-file.html\">http:\/\/www.ehow.com\/how_5225562_edit-windows-hosts-file.html<\/a><\/p>\n<p>If you want cannabis.com to goto 4.2.2.1 then you can enter it just like the<\/p>\n<p>localhost  127.0.0.1 entry you&#8217;ll find in your windows setup. This bypasses  nameserver requests to most browsers (check to be sure with a packet  sniffer)<\/p>\n<p>6. MISC PACKET CAPTURE SECTION<br \/>\nAll of these need PCap drivers installed and are included in the downloads of each&#8230;<\/p>\n<p>Understanding packets takes time and practice. To get started install a copy of wireshark (<a href=\"http:\/\/www.wireshark.org\/%29\">http:\/\/www.wireshark.org\/)<\/a>;  or MS Network Monitor 3.4, both are free. If you don&#8217;t see any capture  interfaces listed then you may need to run it as administrator.  To  identify which interface is seeing your traffic click the first  (top-left) icon &#8220;list available interfaces&#8221; and look for the one with  the numbers counting up; it&#8217;s the active one.  Start it and watch all  the packets flow. You might see lots of traffic, start closing shit  that&#8217;s downloading or streaming stuff. You&#8217;ll get down to a slower  scroll of ARP and NetBios traffic, the occasional UPNP burst and other  stuff.  If you&#8217;re on a secure VPN or something you&#8217;ll see just about ALL  SSL\/TLS grey colored packets or all UDP blue packets in some cases. Try  another active interface (like a TAP interface) to see the goods. Get  on your home network and play around; see what DHCP handshakes look  like, DNS requests\/responses, navigate a shared folder and see what it  shows you, stuff like that.  If you know how, do an nmap scan and see  how obvious and loud it is and learn techniques to use it in a more  covert manner.<\/p>\n<p><a href=\"http:\/\/www.wireshark.org\/docs\/\">http:\/\/www.wireshark.org\/docs\/<\/a> &lt;- read and watch the videos. There&#8217;s a lot to it but once you catch on it&#8217;s quite simple to grasp.<\/p>\n<p>TCPDump(linux)\/WinDump(windows) &#8211; Command line packet capture for gathering to analyze later.  <a href=\"http:\/\/www.tcpdump.org\/\">http:\/\/www.tcpdump.org\/<\/a> and <a href=\"http:\/\/www.winpcap.org\/windump\/\">http:\/\/www.winpcap.org\/windump\/<\/a><\/p>\n<p>NetworkMiner (<a href=\"http:\/\/networkminer.sourceforge.net\/%29\">http:\/\/networkminer.sourceforge.net\/)<\/a> is an alternative that allows you to sort collected packets however you want (by host for example) for easy digging around.<\/p>\n<p>7. TCP\/IP AND THE WIDER INTERNET<br \/>\n(DNS\/HTTP Port 80\/Logging\/Secure ways to connect to your &#8216;crack&#8217; machine).. PROXY CHAINING, SSH CLI Chaining maybe?<\/p>\n<ul>\n<li>Change DNS Settings in Windows XP<\/li>\n<\/ul>\n<p><a href=\"http:\/\/www.mediacollege.com\/computer\/network\/dns.html\">http:\/\/www.mediacollege.com\/computer\/network\/dns.html<\/a><\/p>\n<p>Network Layers &amp; OSI Model<\/p>\n<p>In  order for a security expert to truly understand a software or hardwares  running on a network or security system, they must be able to relate to  and fully conceive the implications of changes that are made to an  existing setup.<\/p>\n<p>No matter what you do at any level of the network  layer, you will be interacting at other levels also. E.g. The data link  layer (Layer 2 OSI) must make use of the physical layer (Layer 1 OSI),  and so on.<\/p>\n<p>Layer 1 : Physical layer<\/p>\n<p>This is the electrical  and physical specification of the devices. In particular it will refer  to pins, voltages, repeaters, hubs, network adapters, host bus adapters  and SANs (Storage Area NEtworks). Standards such as the RS-232C Com port  standard popularised in the 90&#8217;s uses such physical wires to access  medium.<\/p>\n<p>One such popular medium would be the internet. To which the early modems connected.<\/p>\n<p>Layer 2 : Data Link Layer<\/p>\n<p>The  Data Link Layer provides functional and procedural means to transfer  data between network entities using physical layers (or  cabling\/adapters\/routers\/repeaters) so on and so forth. Originally Layer  2 was intended for point 2 point transfer only. LAN and multi-broadcast  media (multicast et al) were developed independant of the ISO standard  (IEEE 802).<\/p>\n<p>WAN and LAN are services on the data link layer that arrange bits, from physical layer into logical fram sequences.<\/p>\n<p>These  frames contain important information that is relative to your  Transmission Control Protocol, and includes information such as your IP  (Internet Protocol) address.<\/p>\n<p>This address is binded through service levels by the TCP (Transmission Control Protocol) transport layer.<\/p>\n<p>8. Hack in a sack:<\/p>\n<p>The Metasploit Framework<br \/>\nMetasploit is a software suite created for penetration testing, and  is included in both Backtrack and Gnacktrack LiveCDs listed in the  mobile solutions section.  It has a command line interface, a GUI  interface, and a Web interface, creating what is, in a real way, the  world&#8217;s first point-and-click hacking software.  It has a massive,  constantly updated Database of usable exploits, which you can use to  gain access to vulnerable remote systems.  <a href=\"http:\/\/www.metasploit.com\/\">http:\/\/www.metasploit.com\/<\/a><\/p>\n<p><strong><span style=\"text-decoration: underline;\">Sign off<\/span><\/strong><br \/>\nThanks for reading this whole doc, you did right? Please ask questions  in #OpNewblood (Again, you can reach us via your web browser at <a href=\"http:\/\/goo.gl\/8zxwO\"><span style=\"text-decoration: underline;\">http:\/\/goo.gl\/8zxwO<\/span><\/a>)  and refer back to this document and remember to stay safe. Protecting  your anonmity is the most important part of being Anonymous.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>This guide will provide you basic security and anonymity while being connected on the internet. Remember this guide will not make you safe but safer when you are online. Keep&#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_seopress_robots_primary_cat":"","_seopress_titles_title":"","_seopress_titles_desc":"","_seopress_robots_index":"","jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[139],"tags":[],"class_list":["post-3237","post","type-post","status-publish","format-standard","hentry","category-tools"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4bBYZ-Qd","_links":{"self":[{"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/posts\/3237","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/comments?post=3237"}],"version-history":[{"count":3,"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/posts\/3237\/revisions"}],"predecessor-version":[{"id":3239,"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/posts\/3237\/revisions\/3239"}],"wp:attachment":[{"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/media?parent=3237"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/categories?post=3237"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/tags?post=3237"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}