Solved

Appearing "unique" behind the same router / modem?

Posted on 2012-03-14
2
297 Views
Last Modified: 2012-08-13
Say that I have 5 IPs assigned to me from my ISP. I want to be able to use all 5 of these IPs from my primary computer. Basically, 1 IP for the main system and the other 4 ips assigned to vmware workstation slices of new OS installs.

Beyond using different software configurations (OS, browser, and other client side traceable things like font set, etc) my question is, even though the IPs are unique... is there anything else hardware wise that can connect all 5 IPs at the end point? For example:

1. All network traffic passes through the same NIC, will this leave a fingerprint?
2. All network traffic passes through the same router, will this leave a fingerprint?
3. All network traffic passes through the same modem, will this leave a fingerprint?

I just want to make sure that I don't need to buy new routers and new computers in order to eliminate a common fingerprint shared between all of the systems.

For the curious, I'm working on creating a couple of separate adwords accounts because my main account got suspended for collecting emails without a privacy policy (hindsight is 20/20 - I should have read the rules beforehand) and any subsequent accounts I tried to make were suspended. After some research I learned that people are having to go the extra mile with ips, hardware, hosting, etc.

It didn't make sense to me that people weren't having success with vmware but were doing okay when cheap new computers were used instead of vmware installs even though they were on the same network.

I'm assuming that either they messed up somewhere during their attempt at vmware or there actually is a fingerprint attached to every packet that can identify it's source if it leaves the same machine or goes through the same network.

Hope that makes sense guys! Enlighten me!
0
Comment
Question by:mcainc
2 Comments
 
LVL 13

Accepted Solution

by:
prashsax earned 500 total points
ID: 37724770
Hi,

The best way to find out is to capture the traffic which is leaving your vmware machines and physical machines and then compare them.
You can install wireshark and on all vmwares and try to login to google account one by one.
Compare the packet capture and see if there is something common.

You won't be able to see anything common which is being added by your router/modem.
But then again, a single router can be used by multiple users living in same building.

If Google asks you to install some application on machine, before you can access Adword account, then it's possible for them to fingerprint your physical machine. Multiple worms/viruses are known to identify the virtual environment these days, and it's no  big deal if Google is somehow being able fingerprint your physical machine.

But, if you are simply logging into your account using Web browser, without installing anything, then wireshark should be able to show it. Provided they are not tracking you via email ID, which you are using to register.
0
 

Author Closing Comment

by:mcainc
ID: 37789930
thanks
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

When it comes to security, there are always trade-offs between security and convenience/ease of administration. This article examines some of the main pros and cons of using key authentication vs password authentication for hosting an SFTP server.
I had an issue with InstallShield not being able to use Computer Browser service on Windows Server 2012. Here is the solution I found.
Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…

895 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

15 Experts available now in Live!

Get 1:1 Help Now