?
Solved

Appearing "unique" behind the same router / modem?

Posted on 2012-03-14
2
Medium Priority
?
303 Views
Last Modified: 2012-08-13
Say that I have 5 IPs assigned to me from my ISP. I want to be able to use all 5 of these IPs from my primary computer. Basically, 1 IP for the main system and the other 4 ips assigned to vmware workstation slices of new OS installs.

Beyond using different software configurations (OS, browser, and other client side traceable things like font set, etc) my question is, even though the IPs are unique... is there anything else hardware wise that can connect all 5 IPs at the end point? For example:

1. All network traffic passes through the same NIC, will this leave a fingerprint?
2. All network traffic passes through the same router, will this leave a fingerprint?
3. All network traffic passes through the same modem, will this leave a fingerprint?

I just want to make sure that I don't need to buy new routers and new computers in order to eliminate a common fingerprint shared between all of the systems.

For the curious, I'm working on creating a couple of separate adwords accounts because my main account got suspended for collecting emails without a privacy policy (hindsight is 20/20 - I should have read the rules beforehand) and any subsequent accounts I tried to make were suspended. After some research I learned that people are having to go the extra mile with ips, hardware, hosting, etc.

It didn't make sense to me that people weren't having success with vmware but were doing okay when cheap new computers were used instead of vmware installs even though they were on the same network.

I'm assuming that either they messed up somewhere during their attempt at vmware or there actually is a fingerprint attached to every packet that can identify it's source if it leaves the same machine or goes through the same network.

Hope that makes sense guys! Enlighten me!
0
Comment
Question by:mcainc
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 13

Accepted Solution

by:
prashsax earned 2000 total points
ID: 37724770
Hi,

The best way to find out is to capture the traffic which is leaving your vmware machines and physical machines and then compare them.
You can install wireshark and on all vmwares and try to login to google account one by one.
Compare the packet capture and see if there is something common.

You won't be able to see anything common which is being added by your router/modem.
But then again, a single router can be used by multiple users living in same building.

If Google asks you to install some application on machine, before you can access Adword account, then it's possible for them to fingerprint your physical machine. Multiple worms/viruses are known to identify the virtual environment these days, and it's no  big deal if Google is somehow being able fingerprint your physical machine.

But, if you are simply logging into your account using Web browser, without installing anything, then wireshark should be able to show it. Provided they are not tracking you via email ID, which you are using to register.
0
 

Author Closing Comment

by:mcainc
ID: 37789930
thanks
0

Featured Post

Create the perfect environment for any meeting

You might have a modern environment with all sorts of high-tech equipment, but what makes it worthwhile is how you seamlessly bring together the presentation with audio, video and lighting. The ATEN Control System provides integrated control and system automation.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

When you try to share a printer , you may receive one of the following error messages. Error message when you use the Add Printer Wizard to share a printer: Windows could not share your printer. Operation could not be completed (Error 0x000006…
One of the biggest threats facing all high-value targets are APT's.  These threats include sophisticated tactics that "often starts with mapping human organization and collecting intelligence on employees, who are nowadays a weaker link than network…
There's a multitude of different network monitoring solutions out there, and you're probably wondering what makes NetCrunch so special. It's completely agentless, but does let you create an agent, if you desire. It offers powerful scalability …
Monitoring a network: how to monitor network services and why? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the philosophy behind service monitoring and why a handshake validation is critical in network monitoring. Software utilized …
Suggested Courses

771 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question