So I've researched techniques attackers use to hide their IP and one of the ways mentioned is using other people's machines to launch their attacks. Let's say an attacker wanted to use a browser to perform tasks on a particular website and want to remain anonymous, can they use their compromised machines like proxy chains to hide their original IP and what techniques do they use to do this?
[link] [comments]
from hacking: security in practice https://ift.tt/TSh5zrY
Comments
Post a Comment