Advertisements:

Thread Rating:
  • 1 Vote(s) - 3 Average
  • 1
  • 2
  • 3
  • 4
  • 5
How to stay anonymous while wifi hacking
#1
Hey guys, I just want to give you some tips that I use for staying anonymous while hacking wifi. This is going to be geared towards backtrack, kali, and other linux distributions, as it's easier to change your MAC address and stay secure with these, and I do not hack with windows. The easiest way for people to find out what machine is attacking the network is by detecting the MAC address. If you use a random MAC address each time you attack you will be much harder to catch.

Method 1: hw ether

This will allow you to see what your MAC address is:

Code:

Code:
ifconfig wlan0 | grep HWaddr

Now bring down your interface:

Code:

Code:
ifconfig wlan0 down

Next change your MAC address to whatever you want:

Code:

Code:
ifconfig wlan0 hw ether 00:00:00:00:00:01

Now bring your interface back up:

Code:

Code:
ifconfig wlan0 up

now check your MAC address again:

Code:

Code:
ifconfig wlan0 | grep HWaddr


Method 2: Macchanger

first take down your interface:

Code:

Code:
ifconfig wlan0 down

Next change your MAC to a random one

Code:

Code:
macchanger --random wlan0

Now bring your interface back up

Code:

Code:
ifconfig wlan0 up


Either of these methods will ensure that your MAC address is unknown. Now for a few tips:

Backtrack 5 has a stealth mode that doesn't automatically connect it to preferred networks. Boot up in stealth mode when planning to attack a wifi network. Even if your preferred network isn't around, other operating systems will still send out probe requests that could show people where you have been.
Live boot operating systems do not keep records of preferred networks, and do not save log files. Keep backtrack and kali linux in mind for this as they already have most tools that you would need on them. Also if your machine gets compromised there wont be any data to find on a live boot filesystem.
Never connect to any social networking or personal websites on a hacked wifi. You don't want anything that could give away your personal information going through a hacked wifi UNLESS you know for a fact that there is no network analyzer or traffic sniffer running.
Don't fall for honeypots! Honeypots are fake access points that are used to trick people into connecting to them, generally deploying phishing attacks, sniffing in on your traffic, or trying to exploit your machine, or all of the above and more. Honeypots can be used by attackers OR as means of catching or scaring an attacker. If something seems out of the ordinary, it probably is.
Don't be suspicious when hacking in public. Actually try to avoid hacking in public but if it isn't avoidable, avoid using big antennas and anything that looks out of the ordinary. Somebody who is surfing the internet on a laptop or a phone in a coffee shop looks normal. Somebody sitting in their vehicle in a parking lot with a large antenna attached to their laptop doesn't look so normal.
Avoid shoulder surfing. Shoulder surfing is when someone tries to see your screen without you knowing. Avoid this by not leaving your laptop unattended (obviously) and by sitting with your back to the wall. The general public these days associates all command line with hacking, so if somebody sees what you are doing even without understanding it they are much more likely to report what you are doing than if they don't see your screen.
Take note of any security cameras. Generally they are pretty easy to notice if you are looking for them (a lot of places point them out). Try to avoid sitting right in the line of sight of a camera, and if that isn't avoidable just try to not look suspicious. People (especially store owners/security personnel) are 100% more likely to stare at a suspicious looking person if they can watch them from a camera. Make sure that no cameras can see your screen to avoid someone catching your activity on playback.
Act cool. If nobody can see your screen and you look like a normal person, nobody will catch you unless you're acting out of the ordinary. Be cool, blend in, keep your cool, and don't draw any unwanted attention.
Don't forget to clear yourself out of the router's logs when finished. Most routers and access points keep logs what devices have been on the network. As an extra precaution you can clear your information from these logs. This isn't an absolute must if you're faking your MAC address, but it is useful.
Always know what you're doing before you perform an attack. You never want to be learning or trying something new when actually attacking. Before you carry out an attack you should know that it will work and know step by step exactly what you're doing to maximize results. There are many ways to practice, utilizing them is wise.

Feel Free to ask any question ...
Reply
 


Possibly Related Threads...
Thread Author Replies Views Last Post
Shield How to stay more anonymous on the internet EverLastingGone 21 2,661 01-18-2018, 05:07 AM
Last Post: screamcore
  How to stay 100% Anomymous on the Darknet SidarDersim 13 1,408 01-15-2018, 04:35 AM
Last Post: bigdata
Lightbulb Hacking&Security conferences presentations chipicao 2 267 12-11-2017, 08:54 PM
Last Post: akalafam
  Staying Anonymous online Tools/TUT AresTheGod 2 203 11-27-2017, 07:14 AM
Last Post: moonsec
  Complete Ethical Hacking Course Beginner to Advanced Kimera12 2 447 11-10-2017, 05:53 PM
Last Post: 8manrokz



Users browsing this thread: 1 Guest(s)