I really just have to answer this question correctly because most answers here are incorrect!

Hackers doesn't use VPN, Socks etc as claimed in most answers to hack, but script kiddies does!

Most hackers started from Rookie to Script Kiddies then advanced to a good, better or advanced hacker.

A good hacker will not buy any VPN, socks just to hack and cover his tracks, because you know that you are not covering anything.

A good hacker will own or hack into different computers, servers, mobile phones, smart tv or any connected devices and place a hidden backdoor to allow undetected access back to the pawned system.

For example, attacker hacked into a mobile phone named MobileA in California, then hacked a server named ServerB in China, hack into a SmartWatchC in Zimbabwe etc. Now he could easily SSH into MobileA and SSH into ServerB, then SmartWatchC and so on using encrypted connections before any attack is launched.

This method allow such hacker to create a chained connections that enables the attacker to bounce from one computer to another before carry out any attack.

For example, a cyber attack in a particular city may originated from 3 to 5 different chained connections from different countries, which makes it difficult to track and make prosecution to be extremely difficult because of jurisdictions and country's laws from where those connections originated from.

Seriously? Why would any hacker buy VPN to hack when the same VPN IP addresses were sold repeatedly to tons of users, spammers and kiddies? which immediately render those IP useless because they were already blacklisted, and blacklisted IP addresses are filtered at the Firewall level.

So you want to hack into a top to agency in the world, or merely a bank, your best plan was to buy a VPN then hack? (*_^). I don’t think you could login with your VPN into some bank’s websites because the VPN address is abused and filtered at the bank end, period.

A good hacker will have knowledge of what he/she is doing, write a little script that auto mate vulnerability checking which reports back to the hacker about which device has what vuln. With vulns on your system, it give the hacker a greater chance of hacking your system without knowing your password or information.

A good hacker will not use VPN to perform any good system hacking but may hack other devices such as mobile phone, smart tv, home or office pc and more ( clean IP ) , retain a backdoor access and operate from there using tunneling or similar techniques.

An example of a script kiddie is that self acclaimed hacker that always run autohack script on a website such as RFI Remote File InclusionLFI Local File InclusionRCE … and successfully injected a C99 shell in the server via mal-configured website. This give such kiddie a backdoor access back to server to install bulk mailer and other malicious codes and may do other things, or simply deface the website, (|<1dd135).

As you can see, most kiddies do not know how to write a complete working code, but uses those written by others and find a cheaper way to cover their tracks by using VPN, Tor etc, while a good hacker will hide in a hacked systems using private (Pr1v8) tools mostly written by the hacker or traded in some underground forum or bbs, but not some open source Backtrack, Kali BS, basically if you can’t write your own code, don’t call yourself a hacker, if you’re using codes written by someone else, what should they be called?

I hope it helps.




   黑客们在他们的回答中声称不会用vpn socks 来进行入侵,除了脚本小子


   一个优秀的黑客不会去买vpn socks 去侵入为了掩饰他的行踪,因为你知道你不可能把任何踪迹都隐藏的


   举一个例子,攻击者黑入了一个叫手机a的加利福尼亚的手机,黑入了一个服务器叫做服务器b的中国服务器,黑入了一个叫智能手表c的一个津巴布尔的智能手表。那么现在他就可以轻松的在发动(launched)攻击之前使用加密(encrypted)连接将SSH 连接到手机a 服务器b 智能手表c


   举个例子某个特定的城市的网络攻击(cyber attack) 可能来自不同国家的3到5个不同的链接连接这使得很难去追踪和起诉因为这些连接地区的法律都不同

   在相同的vpn ip地址被重复销售给了成千上万的用户,垃圾邮件发送者或者是孩子那么为什么还有这么多黑客会去买vpn去进行侵入呢?而且很多ip都没有用了因为已经被列入了黑名单,然后这些黑名单的ip都会被防火墙所过滤



   一个优秀的黑客不会使用vpn去执行任何优秀的黑入系统的操作但是有可能会攻击其他的设备例如手机,智能电视,家里或者是办公室的pc 或者更多,保留后面的访问权限,并且使用隧道或则和类似的操作来进行操作

   脚本小子的一个例子就是自称黑客然后在网站上运行自动黑入的脚本例如RPF远程文件包含,LFI 本地文件包含,RCE之类的… 通过错误的配置网站从而成功的在服务器中上注入C99 shell,这样给了这些小孩子一个后门可以通过服务器去安装批量邮件发送或者是别的恶意代码(malicious)或者是做别的事情,或者只是简单的污染这个网站

   如你所见,很多小孩并不知道如何去写一个完整的工作代码,用着由别人写的这些工具然后通过找到更加便宜的方法就像VPN Tor来掩盖自己的行踪一个好的黑客会使用私人的工具以此藏匿在被侵入的系统,很多工具被黑客缩写然后再地下论坛或者bbs 上面进行交易,但不是一些开源的 Backtrack,Kali BS ,如果你无法自己写出你自己的代码,那么你就不能被称为黑客,如果你一直使用别人的代码,那么你应该被叫做什么呢?



发送评论 编辑评论

 ̄﹃ ̄
∠( ᐛ 」∠)_
φ( ̄∇ ̄o)
ヾ(´・ ・`。)ノ"
( ง ᵒ̌皿ᵒ̌)ง⁼³₌₃
Σ(っ °Д °;)っ
( ,,´・ω・)ノ"(´っω・`。)
( ๑´•ω•) "(ㆆᴗㆆ)
Source: github.com/k4yt3x/flowerhd