Z
Z
Zloy12012-03-30 18:24:37
Burglary protection
Zloy1, 2012-03-30 18:24:37

Tell me what to read to find out how hackers ensure the anonymity of their actions on the network

... on what they burn, how they are encrypted. I would like to know more about the culture of hacker work.
Fiction reading, something like Cryptonomicon, is also interesting.

Answer the question

In order to leave comments, you need to log in

7 answer(s)
Z
Zloy1, 2012-03-30
@Zloy1

And all the problems from an erroneous understanding of the word "cabinet maker". But in fact, these are just highly qualified carpenters (unless it’s a “rural carpenter”) and they simply understand what is happening inside (and outside) the tree and know how to use this information.
And it’s worth reading about wood processing (real, not YouTube videos), about the architecture of pieces of iron, guidelines for servicing turning equipment and about the arrangement of the furniture that you are going to make.
But the most important thing is to understand and use this knowledge in practice.

C
Chii, 2012-03-30
@Chii

And all the problems from an erroneous understanding of the word "hacker". But in fact, these are just IT specialists of the highest qualification (unless it’s a “coolhacker”) and they simply understand what is happening inside (and outside) the computer and know how to use this information.
And it’s worth reading about system administration (the real one, not courses from proprietors), about hardware architectures, rfc communication protocols, and about the structure of the network in which you need to ensure security.
But the most important thing is to understand and use this knowledge in practice.

M
moderatorh, 2012-03-31
@moderatorh

< on what they burn, how they are encrypted.
Scorching is usually either greed, or stupidity, or carelessness. And oddly enough, the luck factor plays a significant role here.
How they are encrypted, alas, this is the same separate science that develops and grows ... On any hacker site you will find separate collections on this topic. But in order to learn in detail about the culture of work, apparently you will have to plunge into this work, you won’t understand from articles and forums. What to read? And here is the problem, Alas, in Russian there are cult resources on this topic, such as the first hackson of the late nineties or how the carderplanet of the early 2000s has long been gone and is unlikely to appear, moreover, more or less worthwhile resources are constantly being closed, only in the last three years more a couple of dozens of interesting sites have sunk into oblivion. Unfortunately, that's what's left. xakep.ru is the site of the magazine of the same name published since 1998. Not a bad forum, but the main part of the community, alas, are schoolchildren. Lots of good articles and magazine archives. Well, zloy.bz is probably the most powerful in Russian,

D
Dmitry, 2012-03-31
@Neir0

< on what they burn, how they are encrypted.
If they take you seriously, there is practically no chance of leaving.
Of course, neither Tor (see the relevant articles about fake nodes) nor VPN from the Somali server will save you. If you go online all the time with a new SIM card and a new IMEI or go to cafes with wi-fi, with regular outings this will only delay the inevitable.

L
lightman, 2012-03-31
@lightman

Two-way satellite Internet from a hut in the wilderness is pretty reliable.
Pitfalls:
1. Expensive.
2. You need to somehow get an account registered in someone else's name. And, given that there are few users of such an Internet, finding and withdrawing an account seems to be a very difficult task.
3. We need to come up with a way to anonymously replenish the account on the Internet.

S
Sergey, 2012-03-31
@bondbig

Blackhats have no ethics and culture, as unnecessary. For them, the result is important, which (today it is in most cases) brings them financial benefits. There are quite a few tools and techniques for anonymization. One of the most reliable is to use the zombie machines you have infected as an intermediary, preferably a chain. There is no trust in Tor and other anonymizers.
Grayhats already have quite an ethic, they notify system owners and software manufacturers about found vulnerabilities, but at the same time they do not hesitate to publish (or sell) information about vulnerabilities, not necessarily giving time for correction.
Well, whitehats are the so-called ethical hackers, who have kept their proximity to the original “hacker” as much as possible. These are security professionals, often working as pentesters, security auditors, and information security analysts.

N
Nick Wilde, 2016-03-06
@Nick_Wild

https://webware.biz/?p=6092

Didn't find what you were looking for?

Ask your question

Ask a Question

731 491 924 answers to any question