Sunday, February 21, 2016

Anonymizing your attacks with Tor and Proxychains Are you using some anomyzer?

think you could split your network and lets say half that packet goes through china and the other half goes through Finland and then come together again as the same packet.
What you could do is have the network traffic go from US to China to Finland to destination. The traffic itself would be encrypted and would only become unencrypted once it reaches the destination.
Maybe not even split the packet, just split groups of packets.


If you use a proxy that is not on port 80 or 443, it may work



http://www.behindthefirewalls.com/2013/06/anonymizing-your-attacks-with-tor-and.html

roxychains ng (new generation) - a preloader which hooks calls to sockets in dynamically linked programs and redirects it through one or more socks/http proxies. continuation of the unmaintained proxychains project

https://github.com/rofl0r/proxychains-ng

No comments: