• Home
  • Become a Hacker
    • Get Started
    • Hacker Mindset
    • Roadmap
    • Simple Setup – Hacker 101
    • Types of Hackers
    • Recommended Courses
  • Boot People Offline
  • Courses
    • All Hacking Courses
    • Cyber Security School
  • CTF
    • Beginners to Advanced Guide
    • Create your own CTF box
    • Field and Resources Guide
    • Platforms & Wargames
    • Tools Used for Solving CTF
    • Writeups
  • Dark Web
    • Beginners Guide
    • Darknet Markets
    • Darkweb 101 (Anonymity Guide)
    • Dark Web OSINT Tools
    • Hacking Forums
    • Latest News
    • Onion Links
  • Hacker Gadgets
  • Hacking Books
  • Tools Directory
Menu
  • Home
  • Become a Hacker
    • Get Started
    • Hacker Mindset
    • Roadmap
    • Simple Setup – Hacker 101
    • Types of Hackers
    • Recommended Courses
  • Boot People Offline
  • Courses
    • All Hacking Courses
    • Cyber Security School
  • CTF
    • Beginners to Advanced Guide
    • Create your own CTF box
    • Field and Resources Guide
    • Platforms & Wargames
    • Tools Used for Solving CTF
    • Writeups
  • Dark Web
    • Beginners Guide
    • Darknet Markets
    • Darkweb 101 (Anonymity Guide)
    • Dark Web OSINT Tools
    • Hacking Forums
    • Latest News
    • Onion Links
  • Hacker Gadgets
  • Hacking Books
  • Tools Directory
Search
Close
  • Home
  • 2015
  • April
  • 6
  • A guide to obtain full anonymity for RAT users

A guide to obtain full anonymity for RAT users

April 6, 2015November 18, 2017 Comments Off on A guide to obtain full anonymity for RAT users
A guide to obtain full anonymity for RAT users anonymous rat pro rat user VPN server WiFi router

This theme is not so much about the use of the RAT, but rather about the safety and anonymity for the user.
I watched a lot of videos and read quite a few topics resulting to shape the plan of action, that is the best in my opinion. Below I will describe the whole process, all actions and security measures that I have taken. If I am right, maybe it will be useful for someone as a brief guide for the safe use of RAT.

Anonymity

1. Purchase of equipment.

So first, I will give a brief list of what you need to buy.

1.1 Mobile Phone.
1.2 SIM card.
1.3 Laptop.
1.4 Prepaid card WebMoney.
1.5 External WiFi adapter.

1.1) Mobile Phone.
Theoretically, by phone IMEI is possible to determine which store sold it, and turning in this store is possible to determine at what time the phone was sold. If the store has video capture, then knowing the time of the phone sale gives opportunity to find your image on the video, and this is a serious piece of evidence. Therefore, I have found in my city underground shop where they sell used mobile phones without the receipts and with no video capture, and bought the cheapest working mobile phone.
1.2) SIM card.
Of course, SIM card must be anonymous, or framed on a stranger who has nothing to do with you, so I bought in the same underground store, without cameras and without a receipt.
1.3) Laptop.
Next you need to find on the internet to advertise the sale of second-hand laptop, call to the owner (using previously bought mobile phone and SIM card) to arrange a meeting in a place without video capturing and buy this laptop.
1.4) Prepaid card WebMoney.
Because in the future there will be some costs through the Internet, and we will need to pay anonymously, it is best to buy a prepaid card WebMoney. The required amount depends on the further choice of VPN provider and cryptor, which I will describe later. These services cost me $ 170 for the year.
1.5) External WiFi adapter.
For extra insurance, we will need to hack someone’s WiFi router, and for this we need a powerful external WiFi adapter that can work in monitor mode. I chose for this purpose Alfa AWUS036H. Buy it, of course, with no video capture and receipts in the underground store or second-hand by the ad.

2. Setting up the equipment and the use of RAT.

We now proceed to the main point. Briefly further steps:

2.1 Changing the device IDs.
2.2 Hacking someone else’s WiFi router.
2.3 Registration of WebMoney account.
2.4 Purchasing and configuration of VPN.
2.5 Purchasing of cryptor.
2.6 Creating of RAT.
2.7 Spreading of RAT.

2.1) Changing the device IDs.
Before you connect the laptop to the internet, you need to make it as unrecognizable to any servers.
After formatting of the hard drives and reinstalling of Windows you must change:
2.1.1) MAC address. For Windows 7 with this task copes MAC Changer utility (old MAC-addresses will not be restored after a reboot). Just do not forget to change the MAC-address of the external WiFi adapter. The utility is free and it is easy to find on the Internet.
2.1.2) HWID. It is hidden in the registry, namely the HKEY_LOCAL_MACHINESoftwareMicrosoftCryptography.
Figures, perhaps we could put random, but I use the generator.
2.1.3) Volume ID. You can change it using tool from Microsoft.
2.2) Hacking someone else’s WiFi router.
Next, we need to gain access to someone else’s WiFi router. To do this, run on a laptop Live CD with Kali Linux operating system and hack someone else’s WiFi router. I will not write, how to do it because the internet is full of instructions. In the future, all internet connections will go exactly through this router, in case if our methods of protection will not work and our IP address will be detected. After gaining access to the settings of WiFi router, you must to setup port forwarding, as well as to disable logging on the router.
2.3) Registration of WebMoney account.
Register WebMoney account using the Tor (all connections without a VPN need to carry out further through it). To verify the account use the purchased phone and SIM card.
2.4) Purchasing and configuration of VPN.
We will not use DUC, because No-IP are keep the logs and will hand over you to law enforcement on the first request . Therefore, choose a good VPN server that does not keep logs, supports port forwarding, allocates fixed IP address, as well as accepts WebMoney. I choose for the “nVPN”. Account for the year with a permanent private IP costs me $ 60. Do not forget to open the ports in the VPN account. After the purchase, configure VPN, put it in startup and in the future go to the Internet only through him or through Tor.
2.5) Purchasing of cryptor.
Next, buy a good cryptor for the same WebMoney. What cryptor choose and how to use it will be better to read in the other topics on the forum.
2.6) Creating of RAT.
Create your RAT and encrypt it. Do not forget that the network settings of your RAT need to use the IP address that was given by VPN provider and the port, that you have opened at the VPN server and on the router.
2.7) Spreading of RAT.
Well, actually, the last – spread your encrypted RAT. How is it better to do – there are plenty of forum information.
2.*) Just want to draw your attention that for security purposes, prior to each new registration in any of the used Internet services, it is better to change the identity of the your laptop iron (MAC address, HWID or Volume ID). Just when you register you should to use every time a new, random names and nicknames. It is best to use online random generators.


3. Possible threats.

We now analyze whether it is possible to track us. We will rely on worst-case scenarios.

3.1) We assume that the victim called the police. Police checked the victim’s computer, found on what IP it sends requests. This is IP on private VPN server that does not keep logs. If the VPN provider deceived us, and kept some logs, there are the following options:

3.1.1) VPN provider is kept routing logs and give to police your real IP, but the police did not come to you, they will come to the owner of the hacked WiFi router. Then they can see the logs of the router, but there will not be stored information about transmission of the data to devices, because we turned off logging on the router.
3.1.2) VPN provider writes logs of account payments. He gives the police the address of your mail and WebMoney account number. It does not give the police nothing, because All actions are performed through Tor, address registered in false names, and to verify the WebMoney account we used an anonymous SIM card and anonymous phone.
3.2) If somehow the police will know the identity of the your laptop iron (MAC address, HWID or Volume ID), then they will not be able to find its previous owner, to find you, because we changed all of these data.
3.*) As a result, I see in this plan are only 2 options to hunt you down:
3.*.1) If the police will find a WiFi router that you hacked and track the traffic, on which of the MAC address the data is transmitted, and determine the location of your laptop on the signal strength.
3.*.2) If the police will determine the phone number from which was done the verification of WebMoney Account , contact your service provider and if the service provider keeps very accurate triangulation logs of subscribers for all SMS sent, and will give your exact coordinates to police.
3.*.*) Both versions of events, I think it is highly unlikely because they require the concurrence of many circumstances.

======
Do not consider me for the paranoid, but I think that if you decide to do forbidden things you need to do it safely and anonymously as possible.

Post navigation

How to crack a password protected Zip file.
Complete Guide to Anti-Forensics – Leave no trace

Related Articles

AsyncRAT – Open-Source Remote Administration Tool For Windows

- Remote Administration Tools
August 24, 2019

Slackor – A Golang implant that uses Slack as a CC2 Server

- Remote Access Tool, Remote Administration Tools
July 9, 2019

PassPie – Multiplatform Command-Line Password Manager

- Tricks & How To's
July 8, 2019
hacker gadgets
hacker phone covers

Recent Posts

Heap_Detective - The Simple Way To Detect Heap Memory Pitfalls In C++ And C

Heap_Detective – The Simple Way To Detect Heap Memory Pitfalls In C++ And C

February 6, 2023
OneNoteAnalyzer: analyzing malicious OneNote documents

OneNoteAnalyzer: analyzing malicious OneNote documents

February 6, 2023
Winevt_Logs_Analysis - Searching .Evtx Logs For Remote Connections

Winevt_Logs_Analysis – Searching .Evtx Logs For Remote Connections

February 5, 2023
NJ Man Attempted to Hire a Hitman on the Dark Web

NJ Man Attempted to Hire a Hitman on the Dark Web

February 5, 2023
PlumHound v1.5.1 releases: Bloodhound for Blue and Purple Teams

PlumHound v1.5.1 releases: Bloodhound for Blue and Purple Teams

February 4, 2023
EAST - Extensible Azure Security Tool - Documentation

EAST – Extensible Azure Security Tool – Documentation

February 4, 2023

Social Media Hacking

SocialPath – Track users across Social Media Platforms

SocialPath – Track users across Social Media Platforms

- Social Media Hacking
October 16, 2019October 16, 2019

SocialPath is a django application for gathering social media intelligence on specific username. It checks for Twitter, Instagram, Facebook, Reddit...

SocialScan – Check Email Address and Username Availability on Online Platforms

SocialScan – Check Email Address and Username Availability on Online Platforms

June 17, 2019
Shellphish – Phishing Tool For 18 Social Media Apps

Shellphish – Phishing Tool For 18 Social Media Apps

June 10, 2019July 27, 2019
WhatsApp Hacking using QRLJacking

WhatsApp Hacking using QRLJacking

May 2, 2019May 19, 2019
How to Hack any Facebook Account with Z-Shadow

How to Hack any Facebook Account with Z-Shadow

April 26, 2019June 29, 2020
hacker buffs

About Us

Haxf4rall is a collective, a good starting point and provides a variety of quality material for cyber security professionals.

Join Our Community!

Please wait...
Get the latest News and Hacking Tools delivered to your inbox.
Don't Worry ! You will not be spammed

Active Members

Submit a Tool

Hackers Handbook 2018


Grab your copy here

ABOUT US

Haxf4rall is a collective, a good starting point and provides a variety of quality material for cyber security professionals.

Our primary focus revolves around the latest tools released in the Infosec community and provide a platform for developers to showcase their skillset and current projects.

COMPANY
  • Contact Us
  • Disclaimer
  • Hacker Gadgets
  • LANC Remastered
  • PCPS IP Puller
  • Privacy Policy
  • Sitemap
  • Submit your Tool
Menu
  • Contact Us
  • Disclaimer
  • Hacker Gadgets
  • LANC Remastered
  • PCPS IP Puller
  • Privacy Policy
  • Sitemap
  • Submit your Tool
Live Chat
RESOURCES
  • Attack Process
  • Become a Hacker
  • Career Pathways
  • Dark Web
  • Hacking Books
  • Practice Your Skills
  • Recommended Courses
  • Simple Setup – Hacker 101
Menu
  • Attack Process
  • Become a Hacker
  • Career Pathways
  • Dark Web
  • Hacking Books
  • Practice Your Skills
  • Recommended Courses
  • Simple Setup – Hacker 101
Get Started
TOOLBOX
  • Anonymity
  • Bruteforce
  • DoS – Denial of Service
  • Information Gathering
  • Phishing
  • SQL Injection
  • Vulnerability Scanners
  • Wifi Hacking
Menu
  • Anonymity
  • Bruteforce
  • DoS – Denial of Service
  • Information Gathering
  • Phishing
  • SQL Injection
  • Vulnerability Scanners
  • Wifi Hacking
Tools Directory

2014 – 2020 | Haxf4rall.com               Stay Connected:

Facebook Twitter Google-plus Wordpress
Please wait...

Join Our Community

Subscribe now and get your free HACKERS HANDBOOK

Don't Worry ! You will not be spammed
SIGN UP FOR NEWSLETTER NOW