Becoming a Ghost Hacker

BRACE YOURSELVES because, this is a very long post and, I’ve gathered my pasts pointers to this entire topic and, with social-engineering being one of my primary special endeavors, I have now decided to give all of my pointers to you in one page. There is a lot that’s been covered, so I’m sure a thing or two has been missed.

Being Quiet

**
When I say this, I mean it in any possible way. Do NOT say a single word about your hacking life. Don’t even mention the word. The key to people not thinking you are a hacker is to never go in that area. If one day you pull of a great hack, and you didn’t cover all of your tracks, and the feds show up in your neighborhood to question your friends, they are obligated to tell the truth or they’ll be interfering with a federal investigation. But they can’t lie if they don’t know the truth.

That is, of course, a very drastic measure to take but, some hackers, possibly black hat hackers do take this measure very seriously and, most definitely members of *Anonymous *, since it’s an illegal movement. With the exception of their ISIS operations.

  • Conclusion
    Don’t tell your friends, family or loved ones, or you’ve put your secret identity in their hands too.

**

Don’t Put a Name to Yourself

**

What I mean here is, most hackers love attention. Take a look at Lizard Squad for example. They share the hacks they complete. Doing so, you give everybody the chance to communicate with you because having a social media profile is for everybody in the whole world who wishes to, can be able to communicate with you. incl. feds. So, don’t put a name to yourself.

It also provides the ability for LE to watch you, whether you have 10 hops or 3 hops, it doesn’t matter because eventually, you’ll make a mistake, whether or not that mistake is something you can afford is unclear. So, by having this public profile, anyone can ‘attack’ your profile and spy on you until that person makes a mistake.

  • Become a Ghost Hacker
    Ghost hackers are hackers who constantly changes his alias. No one can ever really get in contact with him, and he never is one place too long. This gives many advantages, as it being much harder for anyone to track you down. A good example would be Elliott from Mr. Robot. He doesn’t tell anyone about his hacks and doesn’t put a name to himself.

**

Communication Methods

**

A key part of anonymization is a secure communication method. There are so many different software’s that provides you several ways of talking securely to one another. However, the one major downside is you are putting your identity in the hands of a company you do not know personally. This is very bad because you do not know if they are actually being truthful on what they are providing.

We have seen this before with HideMyAss (VPN service) who was approached by the US and, had to hand over information on a specific user, however, HideMyAss claimed not to keep logs from its users, but yet they were able to hand over information on a specific user. That is a perfect example because even though a company states something, that doesn’t mean its entirely true. Likely it is, but know that this company might be non-profit which means they can do whatever they want, or you didn’t read their Terms of Service and therefore don’t know, that there are exceptions towards certain services to a company, which then results in a company handing over your data to the government.

I want you to know that even though a company is stating something, do some investigation. Ask around, read reviews, read their Terms of Service and Privacy Policy. (Yes I’m not kidding)

  • Key things to look for in a communication method:
    Check if they provide strong encryption
    Read the customers feedback
    InvestigateRead ToS & Privacy Policy

**

Aliases

**

I mentioned that you should become a ghost hacker. A ghost hacker is someone who never uses the same name for everything. He constantly changes alias and, doesn’t stay in one place for too long, which gives him many advantages such as FBI not knowing where or who to look for. I want to point out that this also applies to all the accounts that you own, if you have an Instagram & twitter account with the same alias, FBI & NSA and, any skilled hacker will be able to link them together because of the same alias has been used, and trust me that is not hard to do.

There is not much else to explain because, generally this should be common sense to anyone who understands the basics of anonymity and so, this is usually a precaution that people take. Probably even journalists do this when communicating with hackers or anyone using the deep web etc.

**

VPN Providers

**

This is an obvious one, however, many newbies ask the common question on “ What VPN should I purchase? ” and, “ If I have to remain anonymous, why should I then pay for one? ”. I will now clarify these two questions.

Question 1: This will and, I repeat, WILL depend on your current location. If you are located within the US, it would be smart to fool your country thinking you are in China or Russia or India.

Question 2: This is because, if you don’t pay for your product, you are the only product being sold. A company needs money, and it costs money to keep their servers up and, they have families to feed, so why would they provide you and, everybody else a really good software that anonymizes you, when they can charge for it? We live in 2019, and you need to remember that everything is about money now. That’s how it works as sad as it may sound to some of you. We need money to run things and, a successful firm can’t keep their service secure if they don’t have any money to that.

  • Additional precautions:
    Again read ToS & Privacy Policy (Yes, you have to)
    Make sure they are not located in the USA.
    Strong encryption
    Read customers feedback

Second precaution: This is because if you have a company in the USA then the USA will have complete jurisdiction over the company and the company will have to abide by US laws. As many of you know, other countries have better privacy laws, such as Sweden and Switzerland and, they will, therefore, be a better advantage. Also FBI & NSA has
headquarters in the US which are the main 2 companies wanting to have all your information, but they have no power of getting such information if your VPN provider is located in Russia for example, because America doesn’t have any jurisdiction there.

  • **BEWARE ** : Some companies have many servers spread through many countries and, these will sometimes include America. Know that if you sign up for this VPN, you
    could end up on the server they have in the US and, therefore they have the right to demand information from that particular server.

**

Provide False Information

**

Many things fall into place when one has to successfully become a ghost hacker and, one of
the key things are what you’re telling people. When you are communicating online, you have two options. Either don’t say anything at all or give them completely false information. Going with option one will most definitely spark interest to people whose intentions are to bring hackers to justice, so you might as well give them what they want but, you didn’t guarantee them that would you’re giving them will be correct information. That’ll be their job to determine, so let’s make it very difficult for them. And it’s important that you don’t reveal anything that can be remotely be connected to you in any way what so ever. It’s difficult but, it’s great to take these types of measures if you have to. For example, Dead Pirate Roberts did this too I have been informed.

**

Your Timezone

**

This is also very important that you keep it a secret to everybody. Now, this is where it can get very complex, because we all have jobs and, education probably, and family friends and so on. So, in the end, you’ll only have a few hours a day to come on your secret identity, so to get online at completely random times will be a tough task for some because of that. But for those who have that possibility shouldn’t take it for granted. Your buddies will not be able to determine where in the world you live if you come online at a completely random time, with no pattern at all.

**

Wiping Everything

**

You also have to keep in mind that, even the best can be exposed to unexpected situations and so, you could find yourself in a situation where you have minutes to rescue your future. So, you’ll have to be prepared to DoD your hardware if you should have to, this is what most black hat hackers do when they find out they’ve been raided. If they’re lucky enough (or skilled enough) to find it before their door gets busted in.

**

Strong Encrypted Passwords

**

Next up is passwords. Again, the smart ones will only use one password for each account and never re-use it. This way you again exclude the possibility of one being able to link two accounts together. Again a paranoia measure you can choose to do if you are paranoid like that. I don’t judge.

**

Language Patterns

**

Next up is the way you speak. This is the most crucial step when becoming a ghost hacker, because you can determine a lot, by the way, one types, and with 2019 now being here, we have very smart people being able to determine various things out from just how one types and or speaks, therefore this is very important you understand this step. I’ll elaborate.

Say you have 2 different aliases, and if you truly want to make sure no one is thinking you are the same individual, type differently than you usually type. This includes words you wouldn’t usually include in your vocabulary, and maybe make certain spelling mistakes. By doing this you are giving people an idea of who your alias is, and if you continue to type in that way, they won’t even begin to think if this account they came across on eBay, speaking very sophisticated is in some way connected to this account on craigslist, typing with basic grammar.

**

Creating an Identity

**

The goal for the multiple aliases and additional steps taken here are to create a character to the people you are speaking to. Because when you are sitting behind your screen, you obviously don’t know who is sitting on the other end and, therefore you might as well fill these persons head with a completely false idea of who you actually are in real life. This gives great advantages such as if the FBI should stop by and question that individual, he’ll be describing someone completely different, and maybe someone who doesn’t even exist. Who knows.

**

Knowing When to Leave

**

As a ghost hacker, you also need to know that you can still upset some people and make some enemies, and a wise ghost hacker does not wish to be in such a situation. You need to know when danger is headed to your door, and if even the slightest sign of ‘shadyness’ is present, you have to leave your alias. As I have also mentioned earlier, ghost hackers never stay one place for too long, and a perfect example of such a scenario is if the danger has occurred. By ‘discarding’ your alias, you never log onto it again and never talk to the people you knew under that alias on a different alias, otherwise, they’ll be suspicious.

Closing

I hope you’ve learned a lot, I decided to take a few pointers out because I didn’t feel they were worthy enough. These pointers are useful, so I advise you all to remember them. Also i Have tried to tap into the mind of a Black Hat Hacker… :innocent:

7 Likes

@lolt3under Thanks for the post very informative. Please try to remember to give credit to whom deserves it for information you collected on this. Thanks again :tophat:

2 Likes

Really great post!! Thanks for sharing!
edit : here is a list of privacy oriented tools https://www.privacytools.io/

2 Likes

Actually i might start a topic about setting up the hacking machine and anonymizing the system as good as possible

Great share buddy

3 Likes

You can always go with Kodaichi

1 Like

sweet post man I like it. How to be a ghost hacker.

thanks man i appreciate this long post

This post was flagged by the community and is temporarily hidden.