| Joined: Feb 2004 Posts: 10 Junior Member | Junior Member Joined: Feb 2004 Posts: 10 | does anybody know of a good ip changing program out there that iether puts out a fack ip address and or changes it every so often?
SKITZO!
| | |
▼ Sponsored Links ▼
▲ Sponsored Links ▲
| | | Joined: Mar 2002 Posts: 1,041 UGN Elite Poster | UGN Elite Poster Joined: Mar 2002 Posts: 1,041 | No such thing. Edit: Now that I think about it, that was a piss poor answer. Totally true, but piss poor. First off, you need to learn what an IP address is, and then you will see why. Read this: http://support.wrq.com/tutorials/tutorial.html And then this: http://support.microsoft.com/default.aspx?scid=kb;EN-US;q169289 Don't worry about the technical stuff, just try to understand the concepts on those pages. Then when you're done come back and ask some more questions (because you will have some  ) Infinite | | | | Joined: Dec 2002 Posts: 3,255 Likes: 3 UGN Elite | UGN Elite Joined: Dec 2002 Posts: 3,255 Likes: 3 | Originally posted by servo system: does anybody know of a good ip changing program out there that iether puts out a fack ip address and or changes it every so often? Welllll there is no ip changing program per say... But there is something called IP spoofing. You can do it too. After say 2 years of study in how IP addresses work, browsers, http, ftp, smtp, pop3, and the list goes on. In the mean time you can hide or mask yoour IP several different ways. Do as Infinite says and read the content on those links. That will give you a base. | | | | Joined: Feb 2002 Posts: 7,203 Likes: 11 Community Owner | Community Owner Joined: Feb 2002 Posts: 7,203 Likes: 11 | There is a program called Stealthier which takes a list of proxies and randomates them for every request... It's about as close to an ip changin program as you're ever going to get... | | | | Joined: Feb 2004 Posts: 8 Junior Member | Junior Member Joined: Feb 2004 Posts: 8 | In my opinion, the best way to change your ip address, is to do ip chaining (connecting to multiple hosts, proxies, wingates), but to do it effectively, you should make a program, that checks every host, and adds new to the chain, hmmm..interesting.
Cheers Dancing_GalaxY
still alive...
| | | | Joined: Jun 2002 Posts: 207 Member | Member Joined: Jun 2002 Posts: 207 | steganos internet anonym pro does it too. changes the proxy like, once a second. for web browsing anyway.//
Unbodied unsouled unheard unseen Let the gift be grown in the time to call our own Truth is natural like a wind that blows Follow the direction no matter where it goes Let the truth blow like a hurricane through me
| | | | Joined: Sep 2002 Posts: 390 UGN Member | UGN Member Joined: Sep 2002 Posts: 390 | Connecting through proxys is the only way to "change" your ip address. Though it doesn't truly change YOUR ip, it does change the IP that thesite sees. Steganos does do this well.
The problem with spoofing your ip address is that you get no information back. Because it is sending it to the spoofed IP address. This method is most commonly used in DoS attacks. Because its use is very limited.
"The secret to creativity is knowing how to hide your sources." -Albert Einstein Tech Ninja Security | | | | Joined: Oct 2002 Posts: 616 UGN Super Poster | UGN Super Poster Joined: Oct 2002 Posts: 616 | it's that old windows spoof urban legen from back in the day when people spoofed in linux. Heh the windows uses then always wanted to spoof, and all of the windows c/vb coders tried their hardest to code a program to copy it. But humpty dumpty was never a egg. Heh. In short the question was piss poor like syntax said heh, thus any answers may be wasted till learning is done. Ip Fakers lol. Proxying, and ip chaining from a spoof topic. This used to be a big one, like how to hack your ex's hotmail account, and where to find cc's. LoL
"Beware the Jabberwock, my son! The jaws that bite, the claws that catch! Beware the Jubjub bird, and shun The frumious Bandersnatch!"
| | | | Joined: Apr 2002 Posts: 135 UGN Member | UGN Member Joined: Apr 2002 Posts: 135 | Originally posted by weeve: This used to be a big one, like how to hack your ex's hotmail account, and where to find cc's. LoL How to hack you ex's Hotmail: setup a webserver on ur computer, send them an email with a link to the server, wait for them to click the link, read the log, copy the url from which they came into ur browser and hit Enter. Where to find CCs: Go to ur local ghetto, buy a gun, put one of ur momma's stockings over ur head and stick people up for their CCs. make sure to tie them to a tree and cut of their fingers so they can't call the bank and cancel their account.
I KNOW EVERYTHING. ASK ME.
| | | | Joined: Nov 2003 Posts: 478 UGN Member | UGN Member Joined: Nov 2003 Posts: 478 | If I connect to internet via a university network proxy server then would it be wise to use steganos or would it screw things up and then I wont be able to access the internet? | | | | Joined: Oct 2002 Posts: 955 UGN Super Poster | UGN Super Poster Joined: Oct 2002 Posts: 955 | Depending on what you are doing, always test your proxy and remember not all proxies are anonymous and they could also be logging your connections. So while you may be making it a bit trickier, if your doing something wrong and think a proxy will protect you, it won't. Well, not very well. | | | | Joined: Oct 2002 Posts: 616 UGN Super Poster | UGN Super Poster Joined: Oct 2002 Posts: 616 | anonymizer is l33t for that:D l33t...lol
"?" threw me off:) making me laugh to hard heh, all yea, were talking about spoofing here. I think your best bet would be mac address stealing, and multi proxy use. Chain them, like remote bouncing. The farther on ip range sets, and country wise. Both, the better. Yet, today, if your doing STUPID [censored], the real kind, have 500+ behind you, unless you have something auto sweeping, and cleaning logs/caches on a deep level your gonna get into trouble.
Jon basically said that. There's alot of ways to fraud an address, or hide. But if your wanting to be found, by doing stupid [censored], it's not gonna be hard. Esp for the skilled. If you are doing something wrong, like jon said. You should be on like a coupler on a payphone dialed up to an accout that's not yours, remote bouncing through about 50 shells, 3-10 internal terminals, and then out through 10-20 proxies/botnet parts. But then, unless you pick high end connections, it's gonna take like a minute for about 50-200k to tranfer:D Quick in, out. Though there are many ways to even the weight of connection strength, and anonymity so as to procure effects.
Either way I neither suggest, nor does ugn you follow said info, or attempt to hold anyone of this site responsible for your actions. As they are your own, and this is just for informational purposes.
"Beware the Jabberwock, my son! The jaws that bite, the claws that catch! Beware the Jubjub bird, and shun The frumious Bandersnatch!"
| | | | Joined: Apr 2002 Posts: 135 UGN Member | UGN Member Joined: Apr 2002 Posts: 135 | if I was to do something rite now I would jus use a hotspot or jack somebody's AP. I mean, they might be able to trace it quick but unless you go somewhere that has cameras it's pretty safe. but then again, we're all a little paranoid here. law enforcement agencies only solve haking cases if:
1. the hacker was very stupid 2. the hacker went on IRC an bragged about it 3. there is a lot of media attention about it 4. the hacker defaces a website and his hacking name is his real name (jonconley)
I KNOW EVERYTHING. ASK ME.
| | | | Joined: Oct 2002 Posts: 955 UGN Super Poster | UGN Super Poster Joined: Oct 2002 Posts: 955 | Good thing I don't do anything as malicious and pointless as website defacement And you may be correct about "General Law Enforcement", but you should probably do a search and read up on some hackers and how their were caught w/ the help of corporations themselves and the government. | | | | Joined: Feb 2002 Posts: 7,203 Likes: 11 Community Owner | Community Owner Joined: Feb 2002 Posts: 7,203 Likes: 11 | Yeh, JC would be [censored]... Look at my nick though, search google, come find me...
Edit By Ian | | | | Joined: Mar 2004 Posts: 419 UGN Member | UGN Member Joined: Mar 2004 Posts: 419 | simp gizmo "underground". tag you're it. you are #1.
D, world destruction Over and overture N, do I need Apostrophe T, need this torture?-They Might Be Giants
| | | | Joined: Mar 2004 Posts: 419 UGN Member | UGN Member Joined: Mar 2004 Posts: 419 | ok i know juat searching gizmo brings up alot of crap but iif a person was searchin for you they (looking at probability would know UGN) would know at leat basic googling.
i'm drunk BTW so fdorgive me for errors cause i can barely read my screen.
D, world destruction Over and overture N, do I need Apostrophe T, need this torture?-They Might Be Giants
| | | | Joined: Apr 2004 Posts: 5 Junior Member | Junior Member Joined: Apr 2004 Posts: 5 |
Pugna Bellum - Fight the Battle. I will fight the battle.
| | | | Joined: Feb 2002 Posts: 7,203 Likes: 11 Community Owner | Community Owner Joined: Feb 2002 Posts: 7,203 Likes: 11 | Lol, DHCP won't help anything you [censored] idiot...
DHCP will set your computer to obtain an ip address automatically from your ISP; some use dynamic IP's but in any case your ISP does keep logs.
He wants to HIDE himself, aka use a proxy.
BTW, look at dates; you're bringing up topics that have been solved for some time and it's getting annoying. | | | | Joined: Feb 2007 Posts: 1 UGN Newbie | UGN Newbie Joined: Feb 2007 Posts: 1 | You can try this http://www.privacyconnector.comIt uses VPN solution. It encrypts all your outgoing traffic and make you surf Internet anonymously. But their speed is not fast... | | |
Forums41 Topics33,840 Posts68,858 Members2,176 | Most Online3,253 Jan 13th, 2020 | | | |