- Joined
- Nov 26, 2020
- Messages
- 716
It's no secret that modern browsers are simply crammed with various spyware and Socks with VPN is an illusion of anonymity.
Bypassing Socks and VPN, you can:
1. You can determine your real location through VPN in several ways
2. Even through VPN by browser ID, Google and other offices know that you are you and what IP you are changing and what you are doing
3. You can determine through the browser that you are under a virtual machine, like VmWare
4. Through Socks or VPN, you can find out the real IP address
In the article I will give simple examples of detections
1) Test for detecting WebRTC IP addresses
Go to http://net.ipcalf.comfirefox or chrome, even through VPN or socks5 will give out internal IP. Thus, you can determine the presence of VMware and others. An interesting example is that on USB modems you can determine where you are (IP inside the NATO are distributed by region). What is especially interesting is that you can also find out the neighboring hosts, see the article on the topic https://hacking.ventures/local-ip-di...-privacy-risk/
2) Geolocation test. New browser features
Install Firefox browser, go to http://www.browserleaks.com/geo
If the laptop has GPS modules, your location will be determined exactly up to 20 meters. Trusted sites, including Google and without permission, find out the real location through VPN and Sox. If you browse, for example, Firefox, then it merges to geo.mozilla.org completely without demand, then you can figure out you using your browser identifier
3) Etag is a reliable chip for detecting you
Go to http://javascript.ru/unsorted/Id with firefox # kesh-brauzera . Close the browser, go again, there will be the same code
4) Test for the specificity of the browser (there are no IE chips in Firefox, for example)
Try to change the IE headers in any browser (as much as possible for IE) and go to http: //www.browserleaks. com / javascript... In the Internet Explorer Features section, it will write No Internet Explorer found and it doesn’t work around it, at least change it - it will still determine that it’s not IE
5) Profile systems / fingerprints by a bunch of browser parameters
You can determine that you are you by the hash that is generated from a number of browser options (fonts, timezone, headers, javascript internals and much more). Go to https://panopticlick.eff.org/index.p...ion=log&js=yes with firefox The point is that all bits of identifying information are less than 20. Otherwise, you can be identified. And this means, at least change the IP, at least do not change, you can be calculated
6) Mass detection of various browser parameters
Go to Fox at https://whoer.net/extended... There are defined different browser parameters such as screen resolution and other
7) Pale IP via DNS
Through DNS, you can burn your real IP bypassing VPN. Go to https://www.dnsleaktest.com
8) Router injection. Determining Geolocation
Here is an interesting article http://habrahabr.ru/post/110299/ . Go to http://samy.pl/mapxss/ . Enter your MAC address and click Search MAC
9) HTML5 Canvas Fingerprinting
See http://browserleaks.com/canvas . It's hard to get around this thing.
And this is all the tip of the iceberg, there are a number of things that no one will say and that even I do not know
The advantage of my browser is that I am a security systems researcher, and I myself used to write detections, from there and the quality. Apply for a purchase to [email protected] , you will have access to a number of private technologies that no one else has.
Bypassing Socks and VPN, you can:
1. You can determine your real location through VPN in several ways
2. Even through VPN by browser ID, Google and other offices know that you are you and what IP you are changing and what you are doing
3. You can determine through the browser that you are under a virtual machine, like VmWare
4. Through Socks or VPN, you can find out the real IP address
In the article I will give simple examples of detections
1) Test for detecting WebRTC IP addresses
Go to http://net.ipcalf.comfirefox or chrome, even through VPN or socks5 will give out internal IP. Thus, you can determine the presence of VMware and others. An interesting example is that on USB modems you can determine where you are (IP inside the NATO are distributed by region). What is especially interesting is that you can also find out the neighboring hosts, see the article on the topic https://hacking.ventures/local-ip-di...-privacy-risk/
2) Geolocation test. New browser features
Install Firefox browser, go to http://www.browserleaks.com/geo
If the laptop has GPS modules, your location will be determined exactly up to 20 meters. Trusted sites, including Google and without permission, find out the real location through VPN and Sox. If you browse, for example, Firefox, then it merges to geo.mozilla.org completely without demand, then you can figure out you using your browser identifier
3) Etag is a reliable chip for detecting you
Go to http://javascript.ru/unsorted/Id with firefox # kesh-brauzera . Close the browser, go again, there will be the same code
4) Test for the specificity of the browser (there are no IE chips in Firefox, for example)
Try to change the IE headers in any browser (as much as possible for IE) and go to http: //www.browserleaks. com / javascript... In the Internet Explorer Features section, it will write No Internet Explorer found and it doesn’t work around it, at least change it - it will still determine that it’s not IE
5) Profile systems / fingerprints by a bunch of browser parameters
You can determine that you are you by the hash that is generated from a number of browser options (fonts, timezone, headers, javascript internals and much more). Go to https://panopticlick.eff.org/index.p...ion=log&js=yes with firefox The point is that all bits of identifying information are less than 20. Otherwise, you can be identified. And this means, at least change the IP, at least do not change, you can be calculated
6) Mass detection of various browser parameters
Go to Fox at https://whoer.net/extended... There are defined different browser parameters such as screen resolution and other
7) Pale IP via DNS
Through DNS, you can burn your real IP bypassing VPN. Go to https://www.dnsleaktest.com
8) Router injection. Determining Geolocation
Here is an interesting article http://habrahabr.ru/post/110299/ . Go to http://samy.pl/mapxss/ . Enter your MAC address and click Search MAC
9) HTML5 Canvas Fingerprinting
See http://browserleaks.com/canvas . It's hard to get around this thing.
And this is all the tip of the iceberg, there are a number of things that no one will say and that even I do not know
The advantage of my browser is that I am a security systems researcher, and I myself used to write detections, from there and the quality. Apply for a purchase to [email protected] , you will have access to a number of private technologies that no one else has.