Advice for HackerPenetration Testing

How to Protect yourself While Hacking in Kali Linux!

If you want to defend yourself and protect your identity while performing security audits and doing enumeration against firewalls. In that case, we’ll discuss various techniques you can use to protect your identity and conduct your scanning without worry.

For this tutorial, we’ll be using Kali Linux operating system.

If you’re fuzzing or exploiting a company or individual, you should enforce these methods to protect your privacy.

Hacking over the internet?

Changing (spoofing) your MAC address

In this case, we use the network adapter “wlan0” for hacking. Replace “wlan0” with your network adapter.

Open a Terminal and Type:

ifconfig //to check your network adapter in my case "wlan0"

ifconfig wlan0 down

macchanger -m 00:11:22:33:44:55 // you can use any MAC you want

ifconfig wlan0 up

Install Tor & Proxy

sudo apt-get install tor privoxy // this will download and install tor and privoxy
sudo apt-get install vidalia polipo
sudo apt-get install gedit // this step is optional. You can use any text editor you want but i prefer gedit
sudo gedit /etc/privoxy/config // scroll down and put following line at the bottom and save the file : forward-socks4a / localhost:9050
/etc/init.d/tor start && /etc/init.d/privoxy start // this will start tor & privoxy

Now, open the IceWeasel Browser or any other browser and change proxy settings to:

Proxy IP: 127.0.0.1
Proxy Port: 9050
Type: Socks5

Hacking on Local Networks?

Open a Terminal and Type:

ifconfig //to check your network adapter in my case "wlan0"
ifconfig wlan0 down
macchanger -m 00:11:22:33:44:55 // you can use any MAC you want
ifconfig wlan0 up

Changing your Hostname

If a Network Admin sees a machine in his network named kali-364 or Kali-Linux or something like this he will definitely know that there is something wrong. To prevent this we have to change our hostname to something that matches the internal network scheme.

Example:

If the computers in this network got hostnames like Peter-01, Peter-02, Peter-03 .. up to Peter-91, you should choose a hostname like “Peter-92” to stay undetected.

Open a Terminal and type:

gedit hostname//change the hostname and save
gedit hosts //change the hosts and save the file
sudo reboot

Closing Ports

Many network admins and ids will detect Linux machines automatically cause of the open ports like 22 for SSH.

To check your open Ports open a terminal and type:

nmap 127.0.0.1

Now check your open ports and close them. You can close the ports by stopping the service.

Example Port 22:

service ssh stop

Example Port 80:

service apache2 stop

If we want to be undetected we also have to turn off the ping request. After this, your Kali Linux box doesn`t reply to ping requests anymore.

Open a Terminal ad type:

echo 1 >/proc/sys/net/ipv4/icmp_echo_ignore_all

Please use this only for hacking/pen-testing on allowed networks and not for illegal things, Black Hat. If you have any questions, just let me know.

Leave a Reply

Your email address will not be published. Required fields are marked *

Back to top button