Lucky
Essential
- Joined
- 14.09.20
- Messages
- 97
- Reaction score
- 464
- Points
- 33
Administrative deanonymization involves sending a request to the hosting provider with a request to provide data on server connections. If multiple links are used, such as multiple VPNs, requests are sent sequentially to each hosting provider, starting with the last one. As a result, it is possible to reach the first link in the bundle, to which the user connects from their IP address.
Deanonymization by malware involves sending a malicious program that, once on the victim's computer, transmits information about it to the control server. The transmitted information also includes the victim's real IP address. Malware can be disguised as a program, image, document, or other file. This software is actively purchased by both law enforcement agencies and special services of various countries, and it is also actively used by attackers to collect data about the victim.
You can add a proxy to any scheme at the end to regularly change the IP address.
Deanonymization by malware involves sending a malicious program that, once on the victim's computer, transmits information about it to the control server. The transmitted information also includes the victim's real IP address. Malware can be disguised as a program, image, document, or other file. This software is actively purchased by both law enforcement agencies and special services of various countries, and it is also actively used by attackers to collect data about the victim.
You can add a proxy to any scheme at the end to regularly change the IP address.