Solved

Appearing "unique" behind the same router / modem?

Posted on 2012-03-14
2
302 Views
Last Modified: 2012-08-13
Say that I have 5 IPs assigned to me from my ISP. I want to be able to use all 5 of these IPs from my primary computer. Basically, 1 IP for the main system and the other 4 ips assigned to vmware workstation slices of new OS installs.

Beyond using different software configurations (OS, browser, and other client side traceable things like font set, etc) my question is, even though the IPs are unique... is there anything else hardware wise that can connect all 5 IPs at the end point? For example:

1. All network traffic passes through the same NIC, will this leave a fingerprint?
2. All network traffic passes through the same router, will this leave a fingerprint?
3. All network traffic passes through the same modem, will this leave a fingerprint?

I just want to make sure that I don't need to buy new routers and new computers in order to eliminate a common fingerprint shared between all of the systems.

For the curious, I'm working on creating a couple of separate adwords accounts because my main account got suspended for collecting emails without a privacy policy (hindsight is 20/20 - I should have read the rules beforehand) and any subsequent accounts I tried to make were suspended. After some research I learned that people are having to go the extra mile with ips, hardware, hosting, etc.

It didn't make sense to me that people weren't having success with vmware but were doing okay when cheap new computers were used instead of vmware installs even though they were on the same network.

I'm assuming that either they messed up somewhere during their attempt at vmware or there actually is a fingerprint attached to every packet that can identify it's source if it leaves the same machine or goes through the same network.

Hope that makes sense guys! Enlighten me!
0
Comment
Question by:mcainc
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 13

Accepted Solution

by:
prashsax earned 500 total points
ID: 37724770
Hi,

The best way to find out is to capture the traffic which is leaving your vmware machines and physical machines and then compare them.
You can install wireshark and on all vmwares and try to login to google account one by one.
Compare the packet capture and see if there is something common.

You won't be able to see anything common which is being added by your router/modem.
But then again, a single router can be used by multiple users living in same building.

If Google asks you to install some application on machine, before you can access Adword account, then it's possible for them to fingerprint your physical machine. Multiple worms/viruses are known to identify the virtual environment these days, and it's no  big deal if Google is somehow being able fingerprint your physical machine.

But, if you are simply logging into your account using Web browser, without installing anything, then wireshark should be able to show it. Provided they are not tracking you via email ID, which you are using to register.
0
 

Author Closing Comment

by:mcainc
ID: 37789930
thanks
0

Featured Post

Secure Your WordPress Site: 5 Essential Approaches

WordPress is the web's most popular CMS, but its dominance also makes it a target for attackers. Our eBook will show you how to:

Prevent costly exploits of core and plugin vulnerabilities
Repel automated attacks
Lock down your dashboard, secure your code, and protect your users

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

When it comes to security, there are always trade-offs between security and convenience/ease of administration. This article examines some of the main pros and cons of using key authentication vs password authentication for hosting an SFTP server.
I've been an avid user and supporter of Malwarebytes Premium Version 2.x for years. It's an excellent product that runs alongside just about any Anti-Virus application without issues. It seems to have an uncanny ability to pick up many things that A…
NetCrunch network monitor is a highly extensive platform for network monitoring and alert generation. In this video you'll see a live demo of NetCrunch with most notable features explained in a walk-through manner. You'll also get to know the philos…
Michael from AdRem Software explains how to view the most utilized and worst performing nodes in your network, by accessing the Top Charts view in NetCrunch network monitor (https://www.adremsoft.com/). Top Charts is a view in which you can set seve…

695 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question