Routing connections?
Results 1 to 6 of 6

Thread: Routing connections?

  1. #1
    Banned
    Join Date
    Sep 2001
    Posts
    64

    Question Routing connections?

    Now i hear that hackers some how route connections around the world, so that the traces take longer to complete. Now i want to know if this is true, how it works, how to do it, and is there freeware that will do it for me. \thx
    Share on Google+

  2. #2
    Junior Member
    Join Date
    Aug 2001
    Posts
    25
    ok i believe what your talking about is about is setting up proxy's when you use a proxy all your packets are routed through a computer some where else. then that computer pretends like it is your computer and get the info back. then sends it to you. so if you plann on doing some thing that you don't want traced back to you find some anynomous proxy's and string them together. so that your proxy sends its requests to the next proxy and then that proxy sends its requests to the next and so on down the line. no keep in mind that this will really slow down your connection and put your ping way over 200 if your playing counter strike
    Share on Google+

  3. #3
    Fastest Thing Alive s0nIc's Avatar
    Join Date
    Sep 2001
    Location
    Sydney
    Posts
    1,584
    hmm yeah it is done through proxys and shell accounts..
    mr cracker uses numbers of proxys then loads winnuke in a shell account..

    thats why my friend who owns Hackers Inc and Unix Hideout stoped giving shell accounts coz someone used the shell account we gave him/her to hack into the FBI website.. and well Hackers Inc and Unix Hideout was down for a while and we transfered some files in the Hackers Inc server coz the shell account was in the Unix Hideout server and the feds wont let us use the server till the investigation was over.. but this was few months ago..
    Share on Google+

  4. #4
    Senior Member
    Join Date
    Jan 2002
    Posts
    883
    Chaining proxies. Find some overseas anon public proxies. Chain them together and they have at it. An example is to surf anon, chain them in your browser is simple enough.
    h**p://any.proxy1.com/h**p://any.proxy2.com/h**p://the.siteyouwanttogoto.com
    Just a very simple example. You can go to http://www.webattack.com or http://www.freewarehome.com and they have freeware that will find free non-anon and anon public proxys. Then chain them for you so you can surf. As far as using them for sinister puposes. You're on your own on that one.
    Hope this helps.
    The COOKIE TUX lives!!!!
    Windows NT crashed,I am the Blue Screen of Death.
    No one hears your screams.

    Share on Google+

  5. #5
    Senior Member
    Join Date
    Jan 2002
    Posts
    206
    Didn't I see another thread where a kid in the US was arrested with heavy handed tactics? He said he was using 5 proxies, if I remember right, still he got caught out.
    Share on Google+

  6. #6
    Computer Forensics
    Join Date
    Jul 2001
    Posts
    672
    hrmmm 5 whole proxies.....thats too easy. Datastream cowboy used to go around the world 2-3x before he got to his target. My suggestion if you are even thinking about doing this. Don't even consider it.
    Antionline in a nutshell
    \"You\'re putting the fate of the world in the hands of a bunch of idiots I wouldn\'t trust with a potato gun\"

    Trust your Technolust
    Share on Google+

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •