How do we start using our mad hacker skills in the real world AND remain undetected?
We need to set ourselves up to be anonymous! No, we’re not joining a hacktivist group here.
Let’s learn the basics to cover ourselves online. We’ll be using Kali Linux in this example, here’s my guide if you need help getting set up.
For a wider approach to online anonymity, see Kalle Hallden’s Become Invisible Online.
Spoofing an IP Address with
IP or Internet Protocol addresses are one element that makes sending and receiving data possible via our global internet infrastructure.
It gives a (somewhat) unique address that looks like
192.168.1.101 which makes identifying your device possible.
The term IP spoofing, defined as “deception or ruse” means to trick or change your unique address for other devices.
Ready to deceive devices? Ruse the robots?
Before we do, get your current Public IP, this is the real unique address for your home router. It’s how your ISP (Internet Service Provider) connects you to the larger internet infrastructure.
*Do not share your real Public IP with anyone, EVER!
git, version control software, to clone a repo (folder) to our desktop, so
Make sure it’s installed by running
git --help, if nothing’s there, then
sudo apt install git on your Linux machine to get it.
Now let’s grab Anonsurf which “provides users with system-wide anonymization”, awesome!
Setup is simple:
git clone https://github.com/Und3rf10w/kali-anonsurf.git
chmod +x installer.sh
sudo anonsurf start
That’s it! How cool is that? Test your Public IP again and you’ll notice it’s changed.
Meaning, other devices we use to connect to web services don’t know where we are. I live in Australia, but any web server my computer visits tells them I’m in Germany. Cool!
Spoofing a MAC Address with
The MAC (Media Access Control) address is another important element that makes our devices talk to each other. Think of this as a more ‘burnt in’ type of IP Address, a bit loose, but just go with it for now.
It’s assigned to a NIC (Network Interface Card) from the manufacturer/vendor i.e. Apple, Intel etc. It looks like
08:02:07:a2:a3:f6, a bit different to the IP Address from earlier.
We already know what spoofing means, so are you ready to try it?
We’ll use a tool called MAC Changer which can view and change MAC’s for NIC’s… aren’t acronyms fun?
To get your NIC name, use
ifconfig, it might be
eth0 or something similar.
Easy setup in your terminal emulator:
sudo apt install macchanger
sudo macchanger -s <nic>
sudo macchanger -r <nic>
sudo macchanger -p <nic>
help or man pages for more options like setting a manual MAC Address or changing only the Vendor section.
There’s a lot of flexibility that comes with this tool! If you wanted to emulate a specific device from Apple for example use
-l to see a full list of Vendors.
Be aware you can’t change your mac address permanently, so when you reboot your machine you’ll need to change your MAC address again.
Setup a Proxychain
When you think of a large metal chain or a small silver one, it’s an interconnected series of rings that form it, right?
A Proxychain is similar, but instead of a series of rings, it’s a series of servers.
When you visit
google.com there are a few steps for your device to get there but think about it as a fairly direct route.
A Proxy will send your request to
google.com through another server as a secure means.
So a Proxychain essentially sends your request through a series of other servers before it reaches
If that doesn’t make a whole lot of sense, just picture a hidden bridge only we know about, yeah that’s our Proxychain.
Okay! Enough expo, let’s go.
We’ll be using a tool appropriately named
proxychain is a bit more detailed, but not too bad once you’ve done it.
Follow these steps:
- Install TOR:
sudo apt install tor
- Install Proxy Chains:
sudo apt install proxychains
- Edit config file:
sudo nano /etc/proxychains.confuse the arrow keys to navigate.
- At the end of file, add
socks5 127.0.0.1 9050
- Close file with
CTRL + Xthen
- Run TOR:
sudo service tor start && service tor status
- Use Proxy Chains:
You can now send any tool through a tor proxy chain, pretty cool!
Automate The Process
So now we’ve set up each area to make ourselves more anonymous online, it’s time to automate this setup.
Why? Well, every time we boot our machine, we don’t want to set each service up again! Let’s make a simple BASH script to do this for us.
First, let’s create the file with
nano auto-stealth and then we’ll add in the following text:
#!/bin/bash sudo service tor start sudo anonsurf start sudo macchanger -r eth0
Save and exit that file using
CTRL + X then
Lastly, make it executable by using
chmod +x auto-stealth. Now it’s good to go! Run your BASH Script by simply entering
./auto-stealth and wella!
How cool is that?
Now every time you want to go full Mr Robot mode, just simply run that one file and BAM! You’re in the matrix.
*You’ll still have to use
proxychains before any other command for it to route via the TOR setup, but it’s up and running!
Thanks for reading this guide toward your hacker dreams.
If you have any feedback, please send me a message @mrashleyball.