OFFICIAL SECURITY BLOG
April 24, 2012 | BY Adam Kujawa
WARNING: The information included in this tutorial could be used for malicious purposes in the wrong hands, please expect to be yelled at by people who think you are a bad guy if you start talking about this or asking questions. Also, please use responsibly.
Hello everyone! Today I am going to give a detailed tutorial on how to make the traffic originating from your Analysis VM completely anonymous! I spent a lot of time searching the nets for comprehensive explanations on how to accomplish this goal for the novice Linux user with non-expert level knowledge of networking; unfortunately I found nothing but little bits and pieces here and there so I decided to compile it all in one neat tutorial!
First things first though, I need to tell you why it is so important to keep yourself anonymous when dealing with malware and in general when performing research. Here are a few reasons:
I think those are enough reasons to make you crap your pants every time you decide to poke around at a known C&C (Command and Control) server without hiding yourself. ^_^
This tutorial is split into sections! (YAY!) The sections are:
Each section gives a tutorial, tips and technical explanations of ways to make your traffic anonymous at various levels, meaning how hardcore and secure do you want to be?
NOTE: None of these methods are capable of Anonymizing UDP packets, only TCP. Sorry =/