Blog Archives

#Anonymous #DDoS #Tools I

Cutting Tools

Image via Wikipedia

A denial-of-service attack (DoS attack) or distributed denial-of-service attack (DDoS attack) is an attempt to make a computer resource unavailable to its intended users. Although the means to carry out, motives for, and targets of a DoS attack may vary, it generally consists of the concerted efforts of a person or people to prevent an Internet site or service from functioning efficiently or at all, temporarily or indefinitely.

Do *not* forget to protect yourself first, and to do proper reconnaissance.

Tools for cutting the Meat

#Anonymous #Anonimity #Tools I

Digging Tools

Image via Wikipedia

You might as well start by looking in the data of your machine. Did you fill in your real name and address anywhere? Remove it. And don’t keep any of your passwords on your machine. A piece of paper will do.

KeePassX is very useful if you make more identities, keeping the database on a USB stick that you take out of your machine when you walk away from it, and keep that stick in a location only known to you.

That’s for starters. Now for some stealth modes.

#I2P does not trust parties

Screenshot of I2P router console web UI

Image via Wikipedia

I2P is an anonymising network, offering a simple layer that identity-sensitive applications can use to securely communicate. All data is wrapped with several layers of encryption, and the network is both distributed and dynamic, with no trusted parties.

I2P is still a work in progress and it should not be relied upon for “guaranteed” anonymity at this time. It is not immune to attacks from those with unlimited resources, and may never be, due to the inherent limitations of low-latency mix networks.
Still, it provides an excellent mindset fitting predatorial universes

Hunting proxies

charon ~ seated

Image by striatic via Flickr

On request for a Microsoft XP user ~ no access to Linux tools

Searching proxies by using these tools, you may be perceived as hacker and treated as such by authorities. On tools for leeching proxy server lists