Want to win a PS4? Go Premium and enter to win our High-Tech Treats giveaway. Enter to Win

x
?
Solved

Appearing "unique" behind the same router / modem?

Posted on 2012-03-14
2
Medium Priority
?
306 Views
Last Modified: 2012-08-13
Say that I have 5 IPs assigned to me from my ISP. I want to be able to use all 5 of these IPs from my primary computer. Basically, 1 IP for the main system and the other 4 ips assigned to vmware workstation slices of new OS installs.

Beyond using different software configurations (OS, browser, and other client side traceable things like font set, etc) my question is, even though the IPs are unique... is there anything else hardware wise that can connect all 5 IPs at the end point? For example:

1. All network traffic passes through the same NIC, will this leave a fingerprint?
2. All network traffic passes through the same router, will this leave a fingerprint?
3. All network traffic passes through the same modem, will this leave a fingerprint?

I just want to make sure that I don't need to buy new routers and new computers in order to eliminate a common fingerprint shared between all of the systems.

For the curious, I'm working on creating a couple of separate adwords accounts because my main account got suspended for collecting emails without a privacy policy (hindsight is 20/20 - I should have read the rules beforehand) and any subsequent accounts I tried to make were suspended. After some research I learned that people are having to go the extra mile with ips, hardware, hosting, etc.

It didn't make sense to me that people weren't having success with vmware but were doing okay when cheap new computers were used instead of vmware installs even though they were on the same network.

I'm assuming that either they messed up somewhere during their attempt at vmware or there actually is a fingerprint attached to every packet that can identify it's source if it leaves the same machine or goes through the same network.

Hope that makes sense guys! Enlighten me!
0
Comment
Question by:mcainc
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 13

Accepted Solution

by:
prashsax earned 2000 total points
ID: 37724770
Hi,

The best way to find out is to capture the traffic which is leaving your vmware machines and physical machines and then compare them.
You can install wireshark and on all vmwares and try to login to google account one by one.
Compare the packet capture and see if there is something common.

You won't be able to see anything common which is being added by your router/modem.
But then again, a single router can be used by multiple users living in same building.

If Google asks you to install some application on machine, before you can access Adword account, then it's possible for them to fingerprint your physical machine. Multiple worms/viruses are known to identify the virtual environment these days, and it's no  big deal if Google is somehow being able fingerprint your physical machine.

But, if you are simply logging into your account using Web browser, without installing anything, then wireshark should be able to show it. Provided they are not tracking you via email ID, which you are using to register.
0
 

Author Closing Comment

by:mcainc
ID: 37789930
thanks
0

Featured Post

Looking for a new Web Host?

Lunarpages' assortment of hosting products and solutions ensure a perfect fit for anyone looking to get their vision or products to market. Our award winning customer support and 30-day money back guarantee show the pride we take in being the industry's premier MSP.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

One of the biggest threats facing all high-value targets are APT's.  These threats include sophisticated tactics that "often starts with mapping human organization and collecting intelligence on employees, who are nowadays a weaker link than network…
Tech spooks aren't just for those who are tech savvy, it also happens to those of us running a business. Check out the top tech spooks for business owners.
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…

636 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question