PDA

View Full Version : [In depth Guide] How to be TRULY anonymous on the internet



raithi
06-12-2015, 05:01 PM
Ok folks, you're going to have to bear with me on this one. A very sizable in depth guide to true computer anonymity. I mean you will be a fucking ghost on the internet.
This guide allows you to push ALL traffic through tor anatomizing routing proxy, so even things that you don't specify in settings will be pushed through, I mean WHOLE SYSTEM anonymization, even things that don't normally allow to be set to a proxy.

*Also, a setup like this is quite powerful and can be used in many different ways, I am not condoning and endorsing anyone to go out and do illegal activities. I am not liable for any nefarious shit you do with this information.

Now before we really get into it, there are two paths of though when it comes to security and anonymity on the internet. Those would be security hardening and amnesiac.

Amnesiac
Involves loading only into virtual ram via live cd or usb and wipes ram thoroughly on shut down, writing nothing to the hard drive so there

Hardening
Focuses on securely protecting against threats that break or bypass known anonymity methods.
Security hardening is my preferred method, although they have been able to put a persistence drive into a live usb distro. If this is something you would be more interested in, I suggest you check out Tails [Only registered and activated users can see links]

Finally time to get started, we will of course need a few things.

[Only registered and activated users can see links]
Oracle Virtualbox
[Only registered and activated users can see links]
Virtualbox allows you to run virtual computer desktops emulating another computer. Perhaps you've seen my guide on getting clraik programs to run on mac (or linux for that matter) using this method. Regardless a very powerful application.

[Only registered and activated users can see links]
Whonix gateway .ova
[Only registered and activated users can see links] (make sure you get the gateway and not the workstation)
Whonix works by pushing everything through the tor (the onion router) network. If you are not hip to tor, you need to be, it's the bees knees. It allows for true stream isolation giving every application it's own socks port, so even malicious scripts and malware cannot tunnel information from other applications and unmask you.
[Only registered and activated users can see links]



[Only registered and activated users can see links]
Kali linux distro
[Only registered and activated users can see links] (get the full size image not the mini. I know it's a 3gb OS, but you will thank me later)
Kali linux is a penetration testing distro of linux, alot of tools all packed into a nice debian based kernel. We will be using kali linux because if you are reading this guide, and really going this far to protect your identity, lets face it, you're probably doing some sketchy shit and when you get down to brass tacks, kali has the biggest community and is the most up to date distro for pen testing. (Alternatively you can do this with any OS, if you MUST go with Windows, I suggest 8.1 enterprise with console2 so you can still run the linux commands.)

So, you have Virtual box installed where do we go from here?

1 Click file on Oracle Virtualbox and chose Import Appliance
[Only registered and activated users can see links]


2 Choose the whonix gateway .ova file from the destination that you downloaded it to and click next.
3 Import your gateway and let it do it's thing.
[Only registered and activated users can see links]


4 Start your whonix gateway let it bootstrap and auto-update.
5 Click New
[Only registered and activated users can see links]


6 Enter the desired name, change Type to Linux, and Version to Debian (Debian 64 if using the 64bit iso)
[Only registered and activated users can see links]


7 Choose the amount of RAM, make it at least 1512 Mb
[Only registered and activated users can see links]


8 Click create, select VDI, click next, and next again
9 Change the drive size to 25 Gb and click create
[Only registered and activated users can see links]


10 Select system and turn on Hardware clock in UTC time.
[Only registered and activated users can see links]


11 Open the processor tap (still under System) and enable PAE/NX
[Only registered and activated users can see links]


12 Select network
[Only registered and activated users can see links]


13 Change NAT to Internal network (very important step)
[Only registered and activated users can see links]


14 Select Whonix and click OK
[Only registered and activated users can see links]


15 Select Storage
[Only registered and activated users can see links]


16 Click Empty then the Dvd symbol and select your Kali iso that you downloaded earlier
[Only registered and activated users can see links]


17 Now it's time to start your Kali Linux install!
[Only registered and activated users can see links]


18 Take a break! It's been a while getting this far, but we are starting to see the light at the end of the tunnel.
19 Graphical install
[Only registered and activated users can see links]


20 Select your language
21 Select a location (best not to chose your own, sometimes timing protocal can reveal your region, not your ip just your timezone)
22 Select your keymap and proceed
[Only registered and activated users can see links]
[Only registered and activated users can see links]


24 Proceed to configure manually
[Only registered and activated users can see links]


25 The IP address is 192.168.0.20 at port 24
[Only registered and activated users can see links]


26 Gateway IP is 192.168.0.10
[Only registered and activated users can see links]


27 Name server can also be 192.168.0.10
28 Choose your hostname
29 Domain name can be left empty
30 Select your root password
31 Select your timezone (again, chose one that is not yours)
32 Time to make your partitions. I would do guided all files in one partition unless of course you feel you need to setup some hardcore encryption. I won't get into that, I could write an even bigger guide on that.
[Only registered and activated users can see links]


33 This might take a minute...
[Only registered and activated users can see links]


34 Network mirror? Yes, click continue
35 Http proxy, continue
36 Install Grub bootloader, continue
37 Installation complete!! System will reboot and you are ready to rock and roll

*Final notes
You need to have your gateway running at all times when you are on your kali box
You can still setup your vpn on this setup, your vpn will be your first hop so it will look like you > vpn > tor
You can also setup proxy chains as well (I recommend it) to have this setup you > vpn >dynamic proxy chain > tor
tor will change your ip every couple of minutes, so if you're not using cookies, when your ip changes you will have to re authenticate your login
If you have a problem with that... well I suppose you could setup privoxy or polipo to run through a different proxy so your last hop IP would stay the same

j03
06-12-2015, 05:09 PM
Great contribution here! The only thing I can mention is the pictures are a bit small. If I were you I would host them on some image site and post the pics via image tag

[ img ] url [ / img ] <-- no spaces

raithi
06-12-2015, 05:19 PM
yeah, Ill edit that up, didn't realize it would shrink them down so much.

raithi
06-12-2015, 08:00 PM
Ok, there we go, all edited up with images you can see. And conveniently bumped :P

---------- Post added at 09:00 PM ---------- Previous post was at 08:53 PM ----------

It is also worth mentioning that there are some scary fucking places on the internet... and they all end in .tor
Access to the tor network also means that you can access tor services that are hidden to the rest of the world. A.K.A deep web. this is where the silk road resides (the real deal internet black maraket... you can buy fucking people on there) the real omerta carders, and all the scary shit that you can imagine. If you are accessing tor services you have been warned!

|2eap
06-12-2015, 08:38 PM
Ok, there we go, all edited up with images you can see. And conveniently bumped :P

---------- Post added at 09:00 PM ---------- Previous post was at 08:53 PM ----------

It is also worth mentioning that there are some scary fucking places on the internet... and they all end in .tor
Access to the tor network also means that you can access tor services that are hidden to the rest of the world. A.K.A deep web. this is where the silk road resides (the real deal internet black maraket... you can buy fucking people on there) the real omerta carders, and all the scary shit that you can imagine. If you are accessing tor services you have been warned!

yea lol, not anymore though, they finally sentenced the guy in charge. I dont trust it anymore since hes gone. Dread dead pirate or w/e his alias was.


Great guide though man! You should post a guide about Getting and setting up a Private VM to host your bots you wanna run 24/7. (I could use a guide like that)


Good stuff, repping cuz u seem to know ur shit. Thanks!

raithi
06-12-2015, 09:27 PM
You mean host remotely and just port in? That's not a bad idea, I have an old dl385 blade server that I could setup and rent out to subscribers on a monthly basis or something as a service...

|2eap
06-12-2015, 09:34 PM
You mean host remotely and just port in? That's not a bad idea, I have an old dl385 blade server that I could setup and rent out to subscribers on a monthly basis or something as a service...

That, or how to diy

raithi
06-12-2015, 09:37 PM
There's a guide posted by me, and another updated with pictures and a bit easier to read by accelerator, on a simple version of this setting up with windows xp that should suite just that purpose.

** Under the neopets guides section

Accelerator
06-13-2015, 12:01 AM
Grats on this guide!
Would +rep. you again, but I need to spread it ( ͡� ͜ʖ ͡�) (?)

Mechabolt
10-23-2015, 05:15 AM
Wow thanks! :D