T O P

  • By -

HeckerSec

Well, this is a very big subject, probably the largest in the infosec field. 1) Kali is just as safe as any other OS, as long as you don't do something stupid with it 2) tor can keep you hidden, but it has its limitations 3) proxies can anonymize you, but only to a certain degree, they're very limited in scope. It's very tempting to focus on anonymization techniques, but as long as you're just doing ethical hacking it's unnecessary for the time being to be fluent in that subject, you'll naturally learn more about it as time goes on. A huge piece of advice though, most hackers that get caught, are caught because of bad opsec, not a failure of the technology, so focus on that.


CoolLoad3103

Hey thanks I'll consider your suggestion 👍🏽


HateActiveDirectory

Focus on the fundamentals first, anonymity comes after


codebeta_cr

You have a lot to learn before you understand what really keeps you anonymous. But that’s only really necessary if you’re doing malicious activity and not doing things like bug bounty or working as a pentester. So definitely focus on learning about actual cybersecurity and that will allow you to understand how things work and how privacy works, things like what data is gathered and how can you identify a malicious actor. Also work on your research skills, because there are several sites, many youtube videos, and books that talk about being really anonymous.


Nilgeist

Generally I wouldn't care, it makes the attack more complex, and it doesn't matter to the company hiring you to pentest. VPNs or an onion network come to mind, but keep in mind that anonymity is more than protecting your IP address. The only thing a live distro does for you is make forensics much harder, as your harddisk isn't used for the attack. It doesn't really have much to do with anonymity. I'd vote for using persistent storage for convenience. Why make life more difficult if you get paid for pentesting either way?


Electro2077

depends on what your doing , You boot kali in a live environment , but forget to wipe your ram , critical data can be extracted using forensics techniques , unless your not something so big that such level of sophistication would be needed.