cafedread.com will be shutting down on 30th of June.
/d/hacking icon

/d/hacking

22,793 subscribers

Everything related to hacking, opsec, and programming. Malware, phishing, DDoS, coding, research and news.

Rules:

• Be civil.

• No promotion for paid content or selling of guides.

• No looking for or advertising hacking services. For that please visit /d/Jobs4Crypto.

• Be nice to newbies, you used to be one of them.

All rules as well as the punishments are here.

What is your optimal opsec setup for gaining unauthorized access to networks?

by /u/DeepCreep · 2 votes · 1 week ago

Threat model law enforcement (not nation state in general)

Comments (3)
/u/cryptoking999 · 1 votes · 1 week ago · Link

Kali Linux VM routed through Whonix and a use a vpn service on my host machine. Its a fairly simple and fast setup that keeps everything isolated and anonymized.

/u/httpredator · 1 votes · 1 week ago · Link

was going to say something very similar to the comment by cryptoking.

1: vpn you acquired anonymously on your host machine

2: windows vm for using rdp

3: rdp hosted in a country your country is in conflict with

4: on rdp use kali linux thats routed through whonix gateway

/u/ImHereToLearn · 1 votes · 1 week ago · Link

QubesOS using the Whonix gateway is handy too, def give that a look when you get the chance :)