How to Protect yourself While Hacking in Kali Linux!

Defend and Protect yourself while Hacking in Kali Linux Operating System. That’s for both White-hat hacker and Black-hat Hacker, Sometimes if your a White-hat hacker and testing exploit lots of companies consider it a threat to their company so they hire a complaint against you!

So, it’s better for protecting your identity first and stay safe!

For this tutorial, we’ll be using Kali Linux.

If you’re fuzzing or exploiting a vendor or individual you should keep these methods enforced to protect your privacy.

Hacking over the internet:

I will write all comments in red, so please don’t type the yellow letters into the terminal!

Changing (spoofing) your MAC address

In this case, we use the network adapter “wlan0” for hacking. Replace “wlan0” with your network adapter.

Open a Terminal and Type:

ifconfig //to check your network adapter in my case "wlan0"

ifconfig wlan0 down

macchanger -m 00:11:22:33:44:55 // you can use any MAC you want

ifconfig wlan0 up

Install Tor & Proxy:

sudo apt-get install tor privoxy // this will download and install tor and privoxy
sudo apt-get install vidalia polipo
sudo apt-get install gedit // this step is optional. You can use any text editor you want but i prefer gedit
sudo gedit /etc/privoxy/config // scroll down and put following line at the bottom and save the file : forward-socks4a / localhost:9050
/etc/init.d/tor start && /etc/init.d/privoxy start // this will start tor & privoxy

Now open the IceWeasel Browser and change proxy settings to:

Proxy IP: 127.0.0.1
Proxy Port: 9050
Type: Socks5

Hacking local networks:

Open a Terminal and Type:

ifconfig //to check your network adapter in my case "wlan0"
ifconfig wlan0 down
macchanger -m 00:11:22:33:44:55 // you can use any MAC you want
ifconfig wlan0 up

Changing your Hostname

If a Network Admin sees a machine in his network named kali-364 or Kali-Linux or something like this he will definitely know that there is something wrong. To prevent this we have to change our hostname to something that matches the internal network scheme.

Example:

If the computers in this network got hostnames like Peter-01, Peter-02, Peter-03 .. up to Peter-91, you should choose a hostname like “Peter-92” to stay undetected.

Open a Terminal and type:

gedit hostname//change the hostname and save
gedit hosts //change the hosts and save the file
sudo reboot

Closing Ports

Many network admins and ids will detect Linux machines automatically cause of the open ports like 22 for SSH.

To check your open Ports open a terminal and type:

nmap 127.0.0.1

Now check your open ports and close them. You can close the ports by stopping the service.

Example Port 22:

service ssh stop

Example Port 80:

service apache2 stop

If we want to be undetected we also have to turn off the ping request. After this, your Kali Linux box doesn`t reply to ping requests anymore.

Open a Terminal ad type:

echo 1 >/proc/sys/net/ipv4/icmp_echo_ignore_all

So that’s it for today.

Please use this only for hacking/pen-testing on allowed networks and not for illegal things Black Hat

If you have any questions just let me know.

Back to top button
Close