Tag: tor

Anonymity, Hacking, Kali, Tor

Kali Running everything through Tor

> Download and import the Whonix Gateway Virtualbox appliance into Virtualbox. https://www.whonix.org/wiki/VirtualBox > Complete Whonix Gateway initial setup and perform any OS updates. > Create a new Kali Linux virtual machine in VirtualBox. Perform any OS updates. Set Adapter 1 to Internal Network, and Whonix. > Edit network settings for Kali. cp /et c/network/interfaces /et …

Anonymity, Tor

Tor – anonymity, privacy and security

Whonix is an operating system focused on anonymity, privacy and security. It’s based on the Tor anonymity network, Debian GNU/Linux and security by isolation. Whonix consists of two parts: One solely runs Tor and acts as a gateway, which we call Whonix-Gateway. The other, which we call Whonix-Workstation, is on a completely isolated network. Only …

Anonymity, Tor

Avoid countries when using Tor

Let’s see how we can avoid specific countries when we are using tor. We are going to tell Tor which countries should not use when it is building its circuit by providing ISO country codes. Open Tor settings-configuration file and add ExcludeNodes followed by a fingerprint, country code, server name etc.   Examples avoid Greece …

Anonymity, Tor

Tor | specific country in exit node

1. Open Tor configuration file (torrc). If you download Tor bundle, Tor configuration is in folder, \Tor\Browser\Data\Tor 2. Add the following lines: ExitNodes fingerprint1, fingerprint2, fingerprint3 StrictNodes 1 3. Start Tor 4. Check your ip address by opening the url: http://whatismyipaddress.com/

Anonymity, Metasploit, Tor

Anonymity First – Tor & Metasploit

Anonymity First Tor protects your anonymity by bouncing your communications around a distributed network of relays, run by volunteers all around the world. The primary purpose of Tor is to protect communications and improve privacy and security on the Internet. To remain anonymous we should launch our attacks through the TOR network using the Socat …

Metasploit, Tor

Launch attacks through the TOR network

Anonymity with Tor Tor protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world. To launch our attacks through the TOR network, we will use the socat program. Socat is a command line based utility that establishes two bidirectional byte streams and transfers data between them. …

Backtrack, Tor

Tor on BackTrack 5 R2 & R3

Add repository Edit file /etc/apt/sources.list and append the following line: deb http://deb.torproject.org/torproject.org lucid maindeb http://deb.torproject.org/torproject.org lucid main   Add the new key for repository gpg –keyserver keys.gnupg.net –recv 886DDD89gpg –keyserver keys.gnupg.net –recv 886DDD89 gpg –export A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89 | sudo apt-key add -gpg –export A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89 | sudo apt-key add –   Update the software list apt-get updateapt-get …

Linux, NMAP, Tor

Anonymous port scanning through the tor network

To accomplish this task you have to install privoxy and proxychains on your system. For ubuntu users just issue the following command: sudo apt-get install privoxy proxychains proxychains is configured by default to work with the Tor network. Now that we have privoxy and proxychains installed we can issue the following command in the terminal: …