plz give me a good suggestion about it.thank you
- Hot
- Active
-
Forum Thread: How to Hack Wireless Password Through MAC Address and IP Address 25 Replies
2 days ago -
Forum Thread: Complete Guide to Creating and Hosting a Phishing Page for Beginners 50 Replies
6 days ago -
Forum Thread: HELP I Created an Apk for Hacking My Phone Using Kali Linux in Virtual Box How Can I Install That Apk on My Phone 18 Replies
2 wks ago -
Forum Thread: Mitm attack problem 2 Replies
3 wks ago -
Forum Thread: Hack and Track People's Device Constantly Using TRAPE 32 Replies
1 mo ago -
Metasploit Error: Handler Failed to Bind 40 Replies
1 mo ago -
Forum Thread: How to Know if You Are a Script Kiddie? 9 Replies
1 mo ago -
Forum Thread: How to Identify and Crack Hashes 8 Replies
1 mo ago -
Forum Thread: How to Hack School Website 8 Replies
1 mo ago -
Forum Thread: Whenever I Try "Airmon-Ng Start wlan0" There's an Error? 16 Replies
1 mo ago -
Forum Thread: How to Fix 'Failed to Detect and Mount CD-ROM' Problem When Installing Kali Linux 14 Replies
1 mo ago -
Forum Thread: Awesome Keylogging Script - BeeLogger 30 Replies
2 mo ago -
Forum Thread: How to Hack Android Phone Using Same Wifi 27 Replies
2 mo ago -
Forum Thread: Create and Use Android/Meterpreter/reverse_tcp APK with Msfvenom? 121 Replies
2 mo ago -
How to: Minecraft DoS'Ing with Python. 1 Replies
3 mo ago -
Forum Thread: Tools for Beginner Hacker 3 Replies
3 mo ago -
Forum Thread: How to Embed an Android Payload in an Image? 9 Replies
4 mo ago -
Forum Thread: Metasploit reverse_tcp Handler Problem 46 Replies
4 mo ago -
Forum Thread: HACK ANDROID with KALI USING PORT FORWARDING(portmap.io) 11 Replies
4 mo ago -
Forum Thread: Fix Initramfs Problem 5 Replies
4 mo ago
-
How to Hack Wi-Fi: Cracking WPA2 Passwords Using the New PMKID Hashcat Attack
-
How To: Dox Anyone
-
How To: Hack Android Using Kali (Remotely)
-
Hack Like a Pro: How to Crack Online Web Form Passwords with THC-Hydra & Burp Suite
-
How To: Find Identifying Information from a Phone Number Using OSINT Tools
-
How To: Scan for Vulnerabilities on Any Website Using Nikto
-
How to Hack Wi-Fi: Stealing Wi-Fi Passwords with an Evil Twin Attack
-
How to Hack Wi-Fi: Get Anyone's Wi-Fi Password Without Cracking Using Wifiphisher
-
How to Hack Wi-Fi: Cracking WPA2-PSK Passwords with Cowpatty
-
How To: Use Google to Hack(Googledorks)
-
BT Recon: How to Snoop on Bluetooth Devices Using Kali Linux
-
How To: Top 10 Things to Do After Installing Kali Linux
-
How To: Find Vulnerable Webcams Across the Globe Using Shodan
-
How To: Automate Wi-Fi Hacking with Wifite2
-
How To: Crack Shadow Hashes After Getting Root on a Linux System
-
How To: The Hacks Behind Cracking, Part 1: How to Bypass Software Registration
-
How To: Exploit EternalBlue on Windows Server with Metasploit
-
How To: Brute-Force FTP Credentials & Get Server Access
-
How To: Use SQL Injection to Run OS Commands & Get a Shell
-
How To: Use Kismet to Watch Wi-Fi User Activity Through Walls
8 Responses
I am sorry I mean
Hello Guys I Am Just a Begineer in Hacking,Vpn,Proxies and Many Others but I Am Confused That Does Website Proxies Hide our ip while hacking or do we need proxy softwares for hiding our ip address.thank you.
there's no 100% anonymity. if you do serious damage to others' property, the authorities can get you...unless you're good at covering your traces by using high-anonymous proxies. Tor with proxychains is excellent. Besides, you need to change your DNS settings to a dns server that doesn't log your connections.
Thank you hxrrofo for your quick reply but I want to ask that does tor browser or proxychains help me hiding ip address and I am trying to hide ip in my windows 8.1,any help will be benifited.
So.. your goal is anonimity, and still you are using microsoft products. Forget it. You can learn the theory and still use windows, but when you want to deploy those techniques and be really (well... let's say 92%) anonymous, you want to use linux. Proxys on free websites are likely university, libraries, hackers, or honeypots. Either way, they are monitored at best, or aiming to intercept / steal your traffic on worst.
Tor is the same, exit nodes can see and modify your traffic, inject malicious scripts, steal credentials, etc... VPNs might get you into a big botnet and control your traffic as well.
Besides, there are ton of guides on being anonymous, specific for different protocols (like email, irc, http, etc...). You should dig more and then post more specific questions, because really, this subject is just too vast to be cleared in a single post. Also, you should consider how many other informations are leaked in your connection, like HXR pointed out about DNS. But there are more to consider (javascript / java / flash / websockets / STUN / autoupdates running in your system / spywares / antivirus / other devices in your LAN ... ) that can spoil your real identity.
Keep safe.
Tor + proxychains + a dns that doesn't log your traces ===> 99% anonymous :) I'm on kali linux, so no idea how to do that on windows
hey triphat yes you are right that my goal is anonimity. I use kali linux for hacking but my friend had asked me yesterday about proxies and other.and I could not describe him so I wrote this in null byte.thank you for you're help.
Is There Any one who can teach me Hacking World Thaughts and I wanna beginn My Journey In Hacking world.....
Hey farhan shahid even thou i am begineer in hacking I can give you some help.
1st:learn the basic of computing.
2st:hang around null byte because there are many pro white hat hackers who can help you in you're any difficulties.
3nd:learn programming language because it is the most important part of hacking.
4th:join cybrary which is absolutely free and very good site for learning hacking and other.
5rd:Google is you're friend ask it.
6th:read book from:http://www.techhacks.org/best-hacking-ebooks
http://it-ebooks.info/tag/hacking
5th:Play in linux, kali linux
6th:keep learning.thank you.
Share Your Thoughts