How do hackers hide themselves?

When you deliver a payload to someone's computer, you need to have the remote host send you back a signal back to your host. How do the bad guys normally mask their IP and have all that traffic forwarded back to their machine?

Attached: meterpreterexploit.jpg (994x632, 202K)

Other urls found in this thread:

discord.gg/88XdWTE
hack.chat
twitter.com/SFWRedditImages

They use gentoo

if you did that youd never have time to hack

Balaclava, hoodie and fingerless gloves.
Also don't forget to do it at night and with the lights off.

Not necessarily for exploits using UDP, where one could modify the source address of a packet - say for example, in DNS cache poisoning attacks. For TCP though, perhaps some kind of proxy/router?

Does gaining weight help?

mmm.. they lunching it from vps?
also u have macchanger function but i think its useless against reverse tcp

They come here and say they use Arch or Kali. Beware of them. They are indeed professionals.

ricing provides an extra layer of protection since no one will believe you can do 3 digit iq things

any context?

>When you deliver a payload to someone's computer, you need to have the remote host send you back a signal back to your host.
Easy. Use UDP.

Nice try, FBI

>lunch through vpn
Surely some of the taste gets lost along the way.

He said vps

>vpn != vps
vpn is not going to help too much in that case..
first of all you need to cover your isp by cracking other networks..
second use a cheap and shitty computer buy it in cash, and hire anonymous vps to lunch your attack.. i think its safe enough

>make fun of misspelling
>fuck something up yourself in the process
>mfw

Attached: 1520177457794.jpg (600x650, 203K)

They don't hide, the just arrive at the office like all government employees do. The nsa wants your nudes.

Hack into some normie's wifi and operate from there.

>misspelling

Attached: pajeet.jpg (474x404, 27K)

If you register your domain with Cloudflare, will it hide your IP and you can just use the domain name for the localhost?

>register your domain with Cloudflare
if your register they get your isp, i post you a valid answer a couple comments above already..
get your shit and learn it yourself..

VPS and "command and control" servers

discord.gg/88XdWTE

-134

Also don't shit where you eat

network address translation

hack.chat

VPS it is then.

delete the logs

you fuckboys missed the joke

>mfw it's taken me years, nearly a decade to get good at networking, and now I can set up a vpn tunnel on a big network with no leakage like a champ, but these hacker faggots have to string together 7 proxies
i'd give up on the 2nd or 3rd machine

Attached: 1349826774468.gif (179x135, 961K)

joke?

underrated post

I do not think you can comprehend the size of my penis good sir

Attached: LOL-I-TROLL-YOU.jpg (361x600, 60K)

Proxychains with Tor

>not using a starbucks wifi on a laptop you bought with cash

>you need to have the remote host send you back a signal back to your host

not necessarily

I traced a guy, that was trying to brute force my ssh, so a Dentist website on the other side of the country. He had popped that box and was using it to launch attacks on other boxes.

Attached: 1555878538305.jpg (597x685, 36K)

It's sad eternalblue is completely patched apart from airgapped networks

thats why you block 22..
Or change it to 4578

in practice you can forge any fields in network packets. also keep in mind you cannot magically get logs for any server you want. if i get stolen credentials to some server out there in the network I can use it and wipe the logs from it. from that point you would have to rely on logs from other network nodes to piece together who i was and what i was doing. easier said than done.

I've never really had a problem using a vpn or tor with reverse shells or meterpreter sessions. You just need to make sure your LHOST is that of your internet facing IP. Same with a proxy chain. Should work fine

Running through TOR, VPNs, or other compromised systems. Done properly TOR is probably the best option, though that depends on what the target is behind. Once a compromise is established obfuscating the connection as HTTPS is a good method of keeping it hidden, but again; that depends what the target is sitting behind.

Also; compromised or free/open WIFI.

it's really not easy to prevent leakage unless you have good software controlling the gateway. especially because ipv6 exists and no one ever remembers to handle or block it. it's really frustrating writing firewall rules when all you have to work with are 50 character wide garbage strings that make me want to step into traffic every time I look at them. ipv6 will not get any respect until they come up with a less insane way to display the addresses so humans can actually read them.

>until they come up with a less insane way to display the addresses so humans can actually read them.
Basically impossible.

man I don't care if someone plops an emoji interface on top of them, anything is better than the truth.

honestly unicode symbols is probably the best idea. just something that makes it possible to see what the addresses mean at a glance.

Security through obscurity is still not security.

If it cuts the number of bots mindlessly hammering your system with bruteforce attacks in half it's at least a good way to save on CPU cycles.

That sounds terrifying. Please tell me there's a POC.

yes, but you'd have to also do everything from a command line with a green-on-black theme

I think it could be done pretty easily, especially in regards to quickly distinguishing private and remote addresses and subnet hierarchy. the only problem with ipv6 is humans can't read it, but I could never be arsed to learn how it works to make something up. feel free to patent the idea user. if you can make normies able to read it it's a million dollar idea.

Depending on the method of attack there are plenty of ways.

>Over a WAN
TOR, VPN, VPS, Public Networks, other hacked servers or even a combination of them.

>Over a LAN
spoof your MAC and forge requests.

>Covering tracks
delete logs, hide backdoors accounts, self destructive malware. A ski mask and a gun (A big ass knife works too). bonus points if you can threaten the targets family or SO with names pictures and addresses. Then get pictures of their keys so you can enter their property as you please to strike serious fear into them.

>If you're in the government
blame Russia, China or NK.

Attached: lainheadroom.png (1920x1080, 977K)

Why are there so many retards on Jow Forums?

Tor offshore box (usually shared because muh plausible deniability) target
Tor offshore box (usually shared because muh plausible deniability) compromised host target

For the extra paranoid:

Compromised AP (spoofed MAC) Tor offshore box (usually shared because muh plausible deniability) target

Compromised AP (spoofed MAC) Tor offshore box (usually shared because muh plausible deniability) compromised host target

Some people get a GSM modem that can be interfaced via USB & plop in an "anonymously" acquired prepaid SIM instead of using someone else's wireless AP or their own network.

When storing data from compromised hosts locally make sure your disks are encrypted and have some way to quickly zero RAM in case you get raided.

Typically you'll be performing an attack from someone else's machine. Usually some compromised-ass IoT device.

Just IP Block anything east of Poland, and west of Japan. Install Fail2Ban for any stragglers, what's the issue?

That's what I thought most hackers did. I would only use my own computer if I was forced to by time or whatever.
Most "hacks" and "leaks" are basically just people within the organisation of interest leaking the info. It's that simple.

I would go further and use IPs in places with little jurisdiction over the organisation in issue. They less some organisation can enforce anything over that jurisdiction, the safer you should be. You do need to know a fair amount of law to know your jurisdictional proxies.

Just use whitelists...

Don't forget your programming socks phamalama

Attached: 4.jpg (1067x1600, 349K)

nice photo

thanks it's of me

Are you a pair of long rainbow socks?

Attached: 1546823763727.jpg (665x574, 39K)