Cyber Security Course
- 40k Enrolled Learners
- Live Class
Ethical Hacking is considered to be the bright side of Hacking because it is used for the purpose of making the Security better. But even if Ethical Hacking is legal, it is not completely safe for an Ethical Hacker, and hence, Anonymity is like a shield. In this blog, I will tell you why Anonymity is important for an Ethical Hacker and how one can increase their Anonymity.
Anonymity is just a simple thing in Ethical Hacking & CyberSecurity. If you are interested in this domain, check the live CompTIA Security+ Training.
This is a common question I have been asked when I tell someone about being anonymous for Ethical Hacking. The answer to this is, “Because you are not alone”.
Let me explain this in brief. If you are an Ethical Hacker, then the organization has given you permission and due to this, you might think that you are not in trouble. But keep in mind that while you are trying to find a vulnerability, there might be some other hacker in the network. And to protect yourself from that hacker, you need to be Anonymous.
You never know who else is in the same network that you are in. And if a Black hat hacker finds that there is someone else in the network, then he might try to hack your system. This is why Anonymity is important even for Ethical Hackers.
Now, that you know why Anonymity is necessary, let’s see how you can be anonymous. I will discuss 3 ways to protect your identity using Anonsurf, Proxychains, and MacChanger for ethical hacking.
Before understanding about Proxychains for ethical hacking, let me tell you what Proxies are. Do you know what happens when you request a server for some web page? The request is sent from your system to the server. The server processes the request and responds with the data that you requested for. And then, this response is sent to your system.
Well, how do you think the server identifies your system? Through your IP address!
The IP address can be used to identify the hacker’s system and proxy is a way to avoid this. A proxy redirects the requests from your system to the main server through the proxy server. Using this, the IP address of your system is hidden because the request made to the main server is through the proxy server.
When you use Proxychain for ethical hacking, instead of one proxy server, your request gets redirected through multiple proxy servers. This makes tracing back the IP difficult. Now that you know what Proxychains are, let’s see how to use Proxychain for ethical hacking.
To install Proxychain, open the terminal and run the following command:
$ sudo apt-get install proxychains
Next, you need to make some changes in the configuration file. Open the proxychains.conf file.
$ sudo nano /etc/proxychains.conf
In this file, by default, the line dynamic_chain is commented and the line strict_chain is not commented. Remove the comment from dynamic_chain and comment out strict_chain. This is to make Proxychain work even if few proxy servers are not online.
To make Proxychain for ethical hacking more effective, let us add some more proxy servers. Scroll down to the end of the file and you will see a default proxy server. Add the following lines at the end of the file:
socks4 18.104.22.168 44034 socks4 22.214.171.124 32591 socks4 126.96.36.199 4145 socks4 188.8.131.52 4145 socks4 184.108.40.206 4145 socks4 220.127.116.11 4145
I suggest you add more such proxy servers. You’ll find the details of proxy servers with a simple “proxy server list” search on the internet.
Save (Ctrl+O) and exit (Ctrl+X) the file.
Before using Proxychain, check if your IP address is traceable. To check this, open any Internet Browser and open the following URL: https://www.dnsleaktest.com. This website will display your IP address. Close the browser. Now let’s try Proxychain.
The syntax to run proxychain is:
$ proxychains <application/command>
Let’s run Proxychain and see if it works. Open the terminal and run the following command:
$ proxychains firefox www.dnsleaktest.com
You can now see that the IP address has changed.
Proxychain is a great way to hide the IP address. But it is not enough. To add another layer of anonymity, you can use Anonsurf.
Anonsurf is a tool that will help you stay anonymous by routing every packet through TOR relay. When you use Anonsurf for ethical hacking, all the traffic from your system goes through a TOR proxy server due to which your IP address is changed.
Now let’s see how to install and use Anonsurf for ethical hacking on Ubuntu.
To download Anonsurf, run the below command in the terminal:
$ git clone https://github.com/Und3rf10w/kali-anonsurf.git
Next, you will have to install Anonsurf. To do this, run the following commands in the terminal:
$ cd kali-anonsurf/
Now that Anonsurf is installed, let’s see how it works. But before that, let’s check if your IP is traceable. To check this, open any internet browser and open the following URL: https://www.dnsleaktest.com
This website will display your IP address. Now close the browser and run Anonsurf.
To start Anonsurf, run the below command in the terminal:
$ anonsurf start
Now, open the browser again and goto https://www.dnsleaktest.com. You will see that your IP address is changed. This means that the traffic from your system is being routed through another server.
To know about other options of Anonsurf for ethical hacking, run the following command in the terminal:
Anonsurf and Proxychains help you hide your IP address. But is hiding the IP address enough? Not at all! The next level of Anonymity can be achieved by changing the MAC address.
Every device has a unique MAC address assigned to it by the manufacturer. This MAC address is stored in the router’s table when you are connected to it. Because the MAC address is unique to every device, it can be used to identify the system/ device that was used by the hacker, which might result in revealing your identity.
To avoid getting identified by your MAC address, you can temporarily change it. This is where you can use MacChanger for ethical hacking. MacChanger is a tool that will change the MAC address of a device to a fake MAC address until the device is rebooted.
To install MacChanger, run the below command in your terminal:
$ sudo apt install macchanger
Now, let me tell you how you can change the MAC address of a network device.
To check which devices are available on your system, run the below command in your terminal:
Look at the MAC address of the interface ens33, I will be changing this to some random MAC address. To change the MAC address, I will run the following command in the terminal:
$ sudo macchanger -r ens33
Note: You might have different interfaces on your system, make the changes in the above command accordingly.
You can see that the MAC address has been changed. MacChanger is a simple, but important tool to hide the hacker’s identity.
You have learnt 3 ways to maintain your anonymity. There are many such tools hackers use to keep themselves anonymous. I suggest you research more on how else you can increase your anonymity. And if you have any question, post it on Edureka Community and we will get back to you.
If you wish to learn Cybersecurity and build a colorful career in Cybersecurity, then check out our Cybersecurity Certification Training which comes with instructor-led live training and real-life project experience. This training will help you understand Cybersecurity in depth and help you achieve mastery over the subject.
Learn Cybersecurity the right way with Edureka’s cyber security masters program and defend the world’s biggest companies from phishers, hackers and cyber attacks.
|Cyber Security Course|
Class Starts on 28th May,2022
28th MaySAT&SUN (Weekend Batch)
|Cyber Security Course|
Class Starts on 25th June,2022
25th JuneSAT&SUN (Weekend Batch)