HACKLOG 1×07 – Cos’è una VPN, tipi di VPN e quale VPN scegliere (Tutorial Anonymous Internet Linux)

HACKLOG 1×07 – Cos’è una VPN, tipi di VPN e quale VPN scegliere (Tutorial Anonymous Internet Linux)

Until now we have seen how an address
IP can be a very dangerous track to leave when browsing the web;
any server in this world is able to log and store a visitor’s IP address
and associate it with any actions he performs. Hide an IP Address (in computer jargon,
spoof an IP) is not enough to cover up the activities of an Internet user in the network:
just think that any request not encrypted can be monitored not only by
governments but also by the ISP (Internet Service Providers, or the network providers),
but also by other services and malicious of any type. We have just introduced the HTTPS protocol,
the new way in which computers are starting to communicate within the web. encryption
Data is having an increasingly important role IT ecosystem and protocols
sure they are replacing the weaker ones (SSH ->Telnet, SFTP ->FTP, HTTPS ->HTTP
and so on). So, unless the program we use or proxy to which we are doing
reliance are not specifically encrypted, all our operations within
Internet are easily monitored. A note pertaining to navigation WWW:
if privacy and anonymity are your priorities forget forever Google and related
and point to the search engines that there monitor as StartPage or DuckDuckGo.
Because? Take for example Youtube. Youtube is
a service purchased and operated by Google and Google, we know, track anything.
Youtube takes note of what your IP and which video you are viewing, then throws down
a user profile called fingerprint and knows already know what you like to see next or maybe
buy while you visit websites with Google Adwords. A vicious circle. We have seen how the proxies are tools
votes but due to a series of problems they can not guarantee us the right balance
between safety and speed. I’ll tell you more: navigate with an open proxy is now virtually
impossible, as well as insecure! Rates of incredible latency and sudden down make it
unusable for longer operations of 5 minutes! Many believe that the VPN
Proxies are the future. Is it true? Let’s go to find out. VPN (short for Virtual Private Networks)
are the “tunnel” encrypted that, exactly as proxies, perform a liaison between clients
and servers; This means that all traffic Internet goes through this encrypted tunnel,
preventing anyone to monitor the connection. VPNs are originally designed to create
a computer connected via LAN Internet, just like a physical network,
but did not address all of the costs involved (Localization of the devices, connections
physical etc …) and with all the precautions Safety of the case as Firewall, Proxy
and so on. Using a VPN we will not nor worry of finding working lists
or to find specific types of protocols: all traffic that travels over a VPN is
transmitted and encrypted with quality standards normally guaranteed to at least 128 bits. The main advantage compared to a proxy is
the high reactivity that the VPN often guarantees; the architecture of such infrastructure
and the geolocation server allows to optimize the requests to the Internet network;
also you do not need to reconfigure browser and tools to be anonymous as tunneling
– Generally – it is carried out throughout the system. In the VPN market we can define at least
three types of VPN: VPN Trusted, Secure VPN and Hybrid VPN.
In this chapter we will discuss the Secure VPN as the Trusted require
Special contracts with ISPs and are not easily applicable in public reality:
the latter are in fact almost think exclusively for corporate networks where
It must ensure that the information arrives always to the recipient. The Hybrid are the union of the Trusted
and Secure, and since we will not talk of first, also we will exclude the latter. it
that actually determines the quality of security of a VPN – besides of course the
policy and the stability of services that we will see at the end of chapter – are both the types of protocols
provided, both the safety of the covered keys. Often not enough to speak of VPN to be
sure: for example, until a few years ago known VPN Ipredator providers only offered
connectivity via PPTP: This protocol type was already under suspicion of
not 100% sure as decommissioned from Microsoft (who invented and patented)
and we are almost sure that espionage government is already able to crackarlo
in a short time. This is one of many examples we have highlighted but we see the protocols
one by one and pull the money on their characteristics and quality. PPTP (acronym for Point-to-Point
Tunneling Protocol) was developed by Microsoft for creating VPN corporate networks
via the telephone dial-up connection. It is a protocol designed exclusively for
VPN and generally relies on MS-CHAP for handling authentication. being
It was for years a very popular tool today is easily installed (or even
pre-installed) at any device on market and is also very rapid because
It requires few resources for its operation. PPTP, which can only support
based 128-bit keys, began to yield the vulnerability shots enough to force
in 2012 Microsoft to declare it unsafe, although the latter had released
dozens of patches to ensure the situation. This protocol is now considered insecure
and surely already it violated the NSA but useful for low-latency activities like gaming
online, torrent, streaming etc … L2TP (short for Layer 2 Tunnel Protocol)
It is a type of VPN protocol that basic does not It provides no data security; this is
why it is often accompanied from a suite called IPsec. L2TP / IPsec
It is then a mix of tunneling protocol and already implemented in encryption systems
Operating the latest generation, allowing so easy configuration via clients
and good overall speed. Currently no known vulnerabilities
relatively severe for this protocol so I can recommend it to you if you want to keep
a good level of privacy and security, however, research conducted by two experts implies
that the NSA is working diligently to violate it. Although this has not yet been tried,
some sources confirm that IPsec is one the main targets of the NSA and that theoretically
an attack would be possible. However, L2TP / IPsec provides encapsulation
of the data in two steps with encryption keys to 256 bits, making it technically facts
slower than PPTP but thanks to the support implemented in the kernel multi-threading
latest generation allows you to encrypt and decrypt exploiting the architecture of calculation of
multi-core processors. The only slight flaw in this protocol
resides in the fact that the default L2TP traveling on UDP port 500: the latter
It is often blocked by the firewall business and forces to carry out port-forwarding
of routers and access points more sophisticated (Raising questions about the browsing species
in open networks). With OpenVPN means a opensource software
specifically designed to create encrypted tunnels between two computer systems and that exploits
cryptographic protocols based on SSL / TLS and the OpenSSL library. The fact of being
totally open warrant to this system proper transparency to regard it as
the most reliable and secure solution; currently, there are very few risks that a spy agency
government manages to violate it. Its open nature makes it a product
extremely configurable allowing us to use it on any door without making
port-forwarding (using eg Also TCP port 443 to meet demands
an HTTP over SSL) on the device for your network. The library that uses (OpenSSL)
can make use of different ciphers (such as Blowfish, AES, DES, etc …) however most
of VPN providers make almost exclusive use cipher AES or Blowfish. The latter,
based 128 bits, is the cipher default present in OpenVPN. AES cipher is instead a relatively new
and it is currently used by several governments world to protect their data: being
able to handle 128-bit blocks can manipulate large information up to 1GB,
unlike Blowfish that being based 64-bit it can only handle half.
Compared to the IPsec protocol it turns out to be much less fast and this can be
deleterious species in those devices that do not They have a lot of computing power: the cause of
this slowness is the absence of a native support for multi-threading then
It does not allow to exploit the CPU of the new generation on the market.
Although it is not a de-facto standard as previous PPTP and L2TP / IPsec, the market
VPN provider has received with joy OpenVPN and the developer community has released
the client for all major Operating Systems, including mobile devices. (SSTP stands for Secure Socket Tunneling
Protocol) is a tunneling protocol introduced by Microsoft and native to all versions
Windows from Vista onwards, while it is provided but not pre-installed in Linux-based systems
and BSD. At the moment there are no plans reliable for the mobile world as well as
for the more famous (except router firmware Router-OS, currently the only system
Operational for router that supports it). As with OpenVPN makes use of cryptography
based SSLv3 thus allowing the use of encrypted tunnel even behind secure networks
firewall; SSTP can be used in conjunction with the authentication
Winlogon or smartcard. He is currently the security protocol used in the cloud
Microsoft called Windows Azure. Unlike OpenVPN is however a closed protocol
and the PRISM scandal that has seen together Microsoft and NSA is certainly no sleep
quiet. Well at this point we pull the money: what
kind of VPN does for you? Well personally I I feel to recommend a OpenVPN as
it gathers all the features we look for in a VPN, namely the
best compromise between speed, security and transparency of development. The only small
problem will result in greater difficulty respect to the installation and use
other (as it is not present a function built-in in almost any Operating System)
However, every society in most cases provides sufficient documentation
to solve all the problems in the setup and in the days to come. L2TP / IPsec is also
very popular and unless you live in more complete paranoia, ensures excellent
speed and good overall safety. Honestly I would advise against PPTP
and SSTP: the first is definitely outdated and risk doing more harm than good, the second
It is better suited to the corporate world that does not anonymity. Arrived at this point it would be appropriate
make yet another list of best online VPN. But, as we have already done for the proxy,
we’ll just give directions on what VPN is the right one for you based on the characteristics
We are looking for, then kick you down a list the most popular VPN with an overall summary. Maybe you’ll be asked: VPNs are free
or paid? The answer is both, however, I want to clarify that from here on out
I will discuss only VPN paid. Because? Some of the best VPN services as HideMyAss,
NordVPN ExpressVPN offer or something like more than 1000 servers located throughout the
world. And think, these cost servers! Coast keep them, replacing them costs when they break,
manage costs. And unless you do not believe which in this world is full of benefactors
that they spend hundreds of thousands of dollars per month to keep them do not trust the VPN
Free! But how do you earn a VPN? Simply
may sell your information. I’m not talking usernames and passwords (even if it is not said!)
but of real honeypot used for making statistical and sell them to the highest bidders. Once you’re in the circuit you are part of the
Virtual network, then automatically become “Accomplice” of the network; this means
not only your Internet goes slower (This was obvious), but you can end up
the “tail end” and be the responsible for a practice to be incorrect
other users. This is a practice much in vogue in the world
of free proxy as in that of the free vpn. Adware present in the Free VPN can
either be installed along with the client be shown during navigation manipulating
the source of the Web pages you’re going to display. When you purchase a service protected by six
a document that will automatically accept both you that the selling company: This document
is called Terms and Conditions of Use which, together with the Privacy Policy, form the document
legal that establishes the relationship between the two. In the case of Free VPN these documents are
often confused and being free you think: oh well, who cares as long as it’s free!
In fact, as we will see shortly the ToS and Privacy are of paramount importance for
have a quality VPN that guarantees efficiency and safety in navigation. Now you understand that those spending € 9 per month
(More Euros Euros less) can make a real difference? The logs are files that are generated
for each activity carried out within of a computer system: in the case of
VPN, the log can store information such as IP, data access, and other information
that are not encrypted before the handshake (Which will lead to tunneling real
and then the total encryption). If you’re choosing a VPN logless not limit
the advertising slogan, but controls the Privacy Policy declared by the provider. Imagine you are a business owner
VPN provider, and in the middle of the night you knocks on the FBI (or the CIA, the police or who
I think) with a search warrant of Data of your server. Are you to
do the champion of justice and defend a stranger on the other end of
world has started playing with computers a corporation? The answer, needless
to say, it is of course not! there is no VPN providers that would risk years in prison
for you. There is no benefactor of this Typically, therefore always remember that the provider
always does its interests and with the right pressures is willing to sell (as in
If HideMyAss). The key then is to understand that a provider
VPN can not release information about you that does not have, so they can not be prosecuted
for not having cooperated by giving information that – the facts – do not have. normally a
VPN providers solicit personal information to create accounts and process payments,
then ask: name, email, payment information and billing addresses. Best VPN providers have lately
realized that it is possible to allow for more anonymity to its users by offering them payments
with cryptomonete (which will be discussed in there): this still allows, with
precautions, to make the anonymous purchase of service by lifting sellers
weighing store billing information.


  • xB4ckdoor says:

    Complimenti per il video, spiegazioni praticamente "perfette" .

  • Alessandro Caliò says:

    stefano per aumentare la sicurezza posso concatenare un l2tp/ipsec pagato con bitcoin a tor? Cambio i dns e uso duckduckgo. Qualcos altro?

  • carlo alberto giordano says:

    ma un video-spiegazione di che cosa è un chaosvpn? io non ho mai capito cosa sia

  • Luca Ballone says:

    Che programma usate per il montaggio? É un problema se ho usato una free vpn per poco tempo, senza aver fatto niente di illegale?

  • Fabio Salamone says:

    Ottimo video, segnalo solo un errore grafico al minuto 1:45 nel passaggio da FTP a SFTP

  • Giovanni _ says:

    Grandissimo! Esattamente come nel libro <3 (logicamente)

  • Marco Piccinni says:

    Nella scheda sulla crittografia SFTP e FTP sono scambiati.
    Bellissimo corso, continuate così!

  • Sinnex Designs says:

    Se non vuoi i tuoi dati venduti dalle aziende basta che ti compri un server dedicato e ci installi openvpn server side.
    Ecco, ora hai una vpn personale creata da te.

  • Aleandro Prudenzano says:

    1:40 Credo tu abbia invertito FTP con SFTP xD

  • The Big Boss says:

    si ok tutto bello ma i video di hacking?? non li fate più?

  • Leo Capuano says:

    continuate così, bravi!

  • hurricanecla says:

    Bel video semplice, chiaro e professionale. Continuate così;)

  • Alessio Carniato says:

    parlerai della botnet?

  • Fedrix says:

    Video fatto davvero bene!Continua così!
    Mi consigli qualche OpenVpn a pagamento che sia sicura è che abbia le caratteristiche che hai elencato?

  • Melbourne Music says:


  • ScaNicky rcxd says:

    sotto vpn funzionano i client peer to peer?

  • Vittorio Pinti says:

    NordVPN potrebbe andare bene? Sto vedendo che ha quasi tutte le caratteristiche consigliate

  • Ronald Berrera says:

    salve inforge. vorrei farti una domanda . nel caso di naviagazione nel deep web quindi con tor , è giusto dire che oltre la criptazione cipolla si ha uno strato di sicurezza in piu dato dalla criptazione vpn? possono funzionare in modo sinergico giusto? grazie. A proposito ottimo video! complimenti!! ps:la vpn è gratuita ( no logs – 256-bit AES encryption algorithm) si tratta di cyberghost. ( conosco l importanza di una vpn a pagamento, ma questo è solo un rimedio transitorio e penso che momentaneamente cyberghost sia la migliore gratuita disponibile)

  • Angelo Raffaele LISO says:

    Complimenti per il video ma 14:06 la lista dov'è? speravo di farmi un'idea sulle aziende serie. Poi sei installo openvpn sulla mia distro o ne installo una su virtualbox è la stessa cosa o funzionano bene solo quelle a pagamento?

  • Davo says:

    Troppo interessante questo Hacklog. Complimenti ancora agli sviluppatori!

  • Manuel says:

    ottima serieeee

  • GalaxyMan says:

    inforge.net potresti fare un video sul rootkit kernel ?

  • Mirco Cazzavillan says:

    Ma come mai i vpn consumano più traffico del normale se non è una domanda stupida

  • Mirco Cazzavillan says:

    un'altra cosa se uno hai i privilegi del root sul proprio telefono ha una qualche protezione per gli hacker

  • Nikappa 57 says:

    nome di una delle migliori vpn?

  • Matteo Pregnolato says:

    ciao, devo farti una proposta! se mi dai un link di fb ti scrivo

  • Momeggio says:

    Il video inizia a 0:38

  • Melle A says:

    quel est le meilleur open VNP pour toi ? le quel me conseillerais tu ?

  • radio-Echo Quebec Alfa says:

    SSLv3 è ormai dichiarato insicuro (cfr. https://security.googleblog.com/2014/10/this-poodle-bites-exploiting-ssl-30.html). Usare solo TLS.

  • Arrigo Guarinon says:

    Bravi, ottimo lavoro!!!!

  • TOPMMAUFC says:

    #Inforge.net Secondo te Express VPN è buono?

  • 2maracas says:

    Quindi……? Meglio non usarli!!! Visto che io già pago il servizio internet, non dovrebbero assicurarmi la privacy e farsi dare i soldi dalle compagnie telefoniche? Tanto quelli che ti vogliono fottere i dati e quelli che ti vogliono vendere anonimato sempre gli stessi, è sempre stato così e sempre lo sarà, se non cambiamo mentalità!

  • om. D says:

    Una buona vpn per Android? Anche a pagamento

  • NoSense Fiuuh says:

    ma se sono collegato a un VPN e non ho il mio wifi attico posso giocare tipo a MINECRAFT????

  • appennini1 says:

    Salve, per caso hai realizzato un tutorial come installare e configurare openvpn su linux ?

    Secondo te quale è la soluzione migliore per navigare in totale anonimato sul deep web ?

    Tails+tor+openvpn+dnscrypt possono bastare ?

  • Nicolae Ceaușescu says:

    Ciao stefano. Volevo farti una domanda.

    Se nelle privacy policy dicono chiaramente che non mantengono logs significa che si è al sicuro?

  • Saby19 says:

    Se usi una OpenVpn si possono anche tralasciare tutti gli altri spoofing come quello del mac o dns????

  • puntotriveneto says:

    Posso spedire file con FTP se ho una VPN?

  • Mikadin Shinjuk says:

    Io mi sono abbonato a nordvpn, è buono? come antivirus ho kaspersky internet security.

  • Vincenzo Marinelli says:

    CyberGhost è una buona vpn?

  • Il Coach HD says:

    Se utilizzo una VPN il traffico dati del mio provider internet viene scalato? So che alcune persone usano la connessione VPN per non consumare giga

  • Giuseppe Bosco says:

    noise voluto, ma insopportabile!

  • Mimi rko says:

    Conosco le VPN, conosco i tipici protocolli dove le VPN consentono di inoltrare il traffico di rete, ma devo ammettere che le vostre lezioni, tornano abbastanza utili ed alimentano la logica del classico italiano medio che si rende conto realmente di fornire milioni di informazioni a motori di ricerca più noti e decide di diventare un fantasma nella rete abbandonando la sua ignoranza. Ma peccato che questo non sempre accade.

  • simo 1 says:

    Ottima serie. Volevo chiederti se una VPN nasconde /CAMUFFA il MAC address?? GRAZIE ciao

  • Davide Colaci says:

    Ciao Bellissimi video me li sto studiando ben bene.. Grazie mille.
    Volevo chiere una cosa uso una VPN con cyberghost e solitamente lo usavo anche per gli acquisti online a prezzi più convenienti ma ultimamente non ci riesco più nonostanti svuoto cache ecc.. mi connette sempre al sito centrale, in qualche modo riesce a tracciarmi per riportarmi al principale con le impostazioni che usavo prima.. Come posso fare a non essere riconosciuto più ? Quale video è più adatto?
    Grazie mille

  • SMG-TEAM says:

    ma quindi se io uso vpn posso entrare in qualsiasi server anche non europeo ? quindi è sicuro e mi posso affidare al vpn senza che degli hacker mi entrino nella mia rete o nel mio router ? scusate la mia IGNORANZA !

  • curiosita curiose says:

    quindi il vpn non cifra le nostre informazione fin quando non facciamo l'handshake cioè il contratto?

  • Lord Byron Valchiria says:

    Per contattarvi? Scopo consulenza

  • severino massa says:

    nulla è gratis.


    Adesso per Android hanno messo Orbot utile per il vpn sia in web che in app.

  • ツiFranK says:

    Io e i miei amici abbiamo un server Vanilla su Minecraft e paghiamo 3 euro al mese. 2 giorni fa un hacker non si è impossessato del server su Minecraft ma della VPN in sé,per questo non possiamo più controllare nulla,c'è un modo per toglierlo dalle palle o dobbiamo semplicemente puntare a una VPN migliore la quale non permetterà più una cosa del genere?

  • Mc0 yT says:

    Se volete comprare una vpn vi consiglio quella di HMA (Hide my Ass).
    Cambia ip ogni 30 secondi e si attiva velocemente sul pc chiedendo quale server usare e ovviamente successivamente anche i dati per artivarlo

  • Mico Upulici says:

    bella guida,peccato che nessun sistema operativo ne vpn puo salvare la navigazione e tutto,visto che nei processori sia intel che amd ce un vero e proprio sistema operativo che invia dati di tutto quello che fai ecc.. senza avere nessun controllo su di esso 🙁 parlo di intel ime 🙁 se ne sai qualcosa potresti farci un video 😉

  • Kamil. Player99 says:

    Ho visto più volte il video, è abbastanza approfondito e forse complicato.

  • PisellinoFindus says:

    Guadando questo video, mi è venuta una pubblicità sulla privacy dei miei dati.

Leave a Reply

Your email address will not be published. Required fields are marked *