Data Traces 2.1 MAC Address 2.1.1 Identifying the MAC Address 2.1.2 MAC Spoofing 2.2 Hostname 2.2.1 Changing the Hostname 2.3 Domain Name System 2.3.1 Choosing DNS 2.3.2 Changing DNS 2.3.3 Cache DNS 2.4 IP AddressĢ.4.1 Determining the IP in use 2.4.2 Proxy 2.4.2.1 Proxy types 2.4.2.2 Where you can find Proxies 2.4.2.3 How to use Proxies 2.4.2.4 How safe are Proxies? 3. Operative System 1.1 Which distro? 1.1.1 Virtual Machines 1.1.2 Live Distros 1.1.3 The Terminal 2. GLOSSARY Translator's Foreword Foreword Anonymity 1. For all the hackers, or aspiring hackers, worldwide. The owner of the rights for this document is Stefano Novelli, and its distribution is by .įor my friends, my loved ones, and all who made this possible.
Copyright The textual content and the images of Hacklog: Volume 1 ebook are released under Creative Commons 4.0 license – non-replicable, no derived works, commercialization. The original text was written in 2017, in Italy. Since this project required a high amount of time, if this document has been useful for third party projects, we think it should be shared, out of respect for its author, his coworkers and who believed in it. You’re free to use parts of this document for any work, properly quoting the source (Hacklog by ) and, including a footnote link, when possible. Notes on this work The content of Hacklog: Volume 1 is issued free of charge for the whole net, and is available in different formats, according to the Ethical Hacking selfregulation and respecting the different cultures practicing it. Some of the procedures hereby outlined are only for educational/explanatory/informational purpose and only executed on devices under our possession or within controlled test environments, therefore you hold harmless the authors of this document for what you’ll learn during this course and against any verifiable consequence. Warning Violation of computers or networks of others is a criminal offense punishable by the law.