International Journal of Engineering and Information Systems (IJEAIS)
  Year: 2019 | Volume: 3 | Issue: 6 | Page No.: 57-61
The Art of Anonymity: Traces Detection
Mourad Henchiri

Abstract:
Hijack the identity on a network is a vital penetration testing behavior, yet, such a task must be done in a legal, before being ethical, scenario.[1] as per the mind of a hacker, being anonymous in an attack is a priority, thus, the obscurity and the obfuscation are habitual tactics each hacker start with when in action. In this research we are highlighting the famous; exposed and hidden methodologies hackers do to succeed in being anonymous. In addition to that we are able through this study to present new tactics to use as ethical hackers and crackers for your journey as penetration testers. [1, 3, 5]