Automatic Anonymous Wifi





Introduction: Automatic Anonymous Wifi

This Instructable will demonstrate a method of automatic wireless anonymity using two security applications.

Step 1: Downloading the Applications.

The two applications we will be using are called MadMACs and TOR.

When a computer connects to a wireless network it usually obtains an IP through a DHCP server, which is basically just a method of providing dynamic IPs so that everyone does not have to sit down and figure out what IP everyone else is using and then manually set one on their own machine. When a request is made to a DHCP server two pieces of information are recorded, your MAC address and your hostname. What MadMACs does is randomize both of these for you automatically every time you boot, or every time you manually tell the software to do so.

Once your computer is connected to the network, randomized or not, most of the traffic leaving your PC is in the clear. So any network admin, or *nix user with free software can eavesdrop on everything you do. TOR solves this problem through a suite of applications that anonymize your connection point and encrypt all your traffic.

So with both pieces of software installed you have hidden your identity from the network, and made all of your traffic unreadable by anyone else on the network you have chosen to connect to.

(Sorry, no how madmacs works, but then its pretty self explanatory)

Step 2: Installing and Configuring MadMACS

For the normal user the MadMACS installation is pretty straightforward.
You just click OK or YES for all of the options, making sure you select your wireless card for randomization.

At setup window 5 in the MadMACs program you are given the option of typing in a prefix for the the MAC address randomized. This just identifies the brand of the MAC to the DHCP server, you can find a database of prefixes here

Advanced, paranoid users :

For super paranoid users who rightfully do not trust precompiled code from virtually unknown publishers, the source is provided with the compiled program. I've made an instrutable on how to do this.

The compiler is available from AUTOIT, here. You want version 3.

Step 3: Installing Tor

Installing TOR is as easy as installing any other program. So just keep clicking next until it is completely installed.

The difficult part is configuring your programs to use it.

Here are a couple screenshots of the Tor installation program, don't worry if your version numbers are different, and leave all the options checked.

Step 4: Configuring Your Programs to Use TOR

TOR is an anonymizing program which is interfaced through a proxy that is included with the suite.

If you use Firefox it is incredibly easy to start using TOR, all you have to do is go to the Tor Button addon page, and install it. Then whenever you need to browse anonymously (and securely) you just click the tor button and you're all set.

For your other programs, you need to look up how the program interfaces with proxies, and manually enter the information. Since there is such a wide variety of programs people use I won't list any here, but I will provide details upon request. Just leave a comment with the program name and I will reply with a brief how-to.

Proxy Details for TOR ::
localhost port 8118
Or, port 8118

I've added three examples for programs I think are still somewhat popular, each are two pictures with comments. First two are Aim, second two are MSN, third two is Pidgin the gaim successor.

Step 5: Make Sure Its All Working.

My basic self test is to point Firefox to Whatismyip and make sure its not my home IP. to test it in the field, toggle the tor button while hitting your refresh key, when the tor button is on it should be a different IP from when its off.

If all works out, your laptop will now boot with a randomized MAC and hostname, and TOR will start and allow you to encrypt all your traffic.

It was bought up that TOR exit nodes could still eavesdrop on your traffic. For secure web browsing through an exit node you can use sites such as which encrypt the traffic through your entire session. More sites such as this one would be appreciated.

Any problems, feel free to comment.

Thats it for now, stay anonymous.



    • Science of Cooking

      Science of Cooking
    • Pocket-Sized Contest

      Pocket-Sized Contest
    • Spotless Contest

      Spotless Contest

    We have a be nice policy.
    Please be positive and constructive.





    When should I randomize my IP. Before I connect? After? During?

    How about a way to hack into secure networks

    thats what im looking for too. all the strong signals are secured, anyone got any tips?

    Thats cyber terrorism - don't do it

    That could be a separate instructable, I really just wanted to focus on a simple way to mask yourself on open wifi networks that you might stumble onto.

    So how do I configure BlueStacks Android App player to connect through Tor to use apps like Instagram?

    About Pidgin....
    the Torrify FAQ on specifically says: "Do not use the SOCKS 4 setting; this leaks DNS."

    So probably it's not a good idea to go this way.
    I'm also looking for how to configure Pidgin with Tor.

    This will go great with my biquad antenna, now the coffee shops downtown will never know what hit them :P

    You forgot to mention the FACT that even though TOR dose encrypt all of its traffic from NODE to NODE with a different key between each node IT DOSE NOT HOWEVER ENCRYPT THE DATA ENTERING AND EXITING THE NODES! this being fact you are at the disposal of anyone interested in setting up a node to analyze the traffic. Dan Egerstan demonstrated this publicly just recently even though this has been know for some time, out of pure common sense. to over come this simply encrypt your dam connection on the way in! THIS IS THE ONLY EFFECTIVE AND SAFE WAY TO USE TOR! this info is clearly stated on there main website