I'm very interested to the security topic, but sometimes I fail in understanding how a hacker would be successful like for example a group that recently claimed they got data from FBI.
I wonder while they engage in such a hacking the target's logs will be telling everything you are doing, specially engaging against the government which is very rich in resources to trace and go against anyone who would attack and get data from their servers... My biggest doubt is regarding the networking perspective.
How the anonymity is done right. It is probably the hardest thing to do I guess, you would have to bypass firewalls, IDS, and a bunch of other security measures without letting a track of your location...
I know about IP spoofing, Tor, VPNs, passive attacks and Zombie machines, but is there other way to be invisible in such a good way or is it a well done combination of the options I mentioned?
How would someone be able to get maximum "invisibility" in the networking context? Sorry for my noobness :-/