Category: Tor

All about Tor!

Anonymity, Hacking, Kali, Tor

Kali Running everything through Tor

> Download and import the Whonix Gateway Virtualbox appliance into Virtualbox. > Complete Whonix Gateway initial setup and perform any OS updates. > Create a new Kali Linux virtual machine in VirtualBox. Perform any OS updates. Set Adapter 1 to Internal Network, and Whonix. > Edit network settings for Kali. cp /et c/network/interfaces /et …

Anonymity, Tor

Tor – anonymity, privacy and security

Whonix is an operating system focused on anonymity, privacy and security. It’s based on the Tor anonymity network, Debian GNU/Linux and security by isolation. Whonix consists of two parts: One solely runs Tor and acts as a gateway, which we call Whonix-Gateway. The other, which we call Whonix-Workstation, is on a completely isolated network. Only …

Add-ons, Anonymity, Browsers, Tor

Surf anonymously | Staying safe online

Let’s see how you surf anonymously (not 100%) using firefox. First of all we are going to install 3 firefox addons to improve our privacy.   Addons HTTPS Everywhere HTTPS Everywhere is a Firefox extension that encrypts your communications with many major websites, making your browsing more secure.   The following two addons we need …

Anonymity, Tor

Avoid countries when using Tor

Let’s see how we can avoid specific countries when we are using tor. We are going to tell Tor which countries should not use when it is building its circuit by providing ISO country codes. Open Tor settings-configuration file and add ExcludeNodes followed by a fingerprint, country code, server name etc.   Examples avoid Greece …

Anonymity, Tor

Tor | specific country in exit node

1. Open Tor configuration file (torrc). If you download Tor bundle, Tor configuration is in folder, \Tor\Browser\Data\Tor 2. Add the following lines: ExitNodes fingerprint1, fingerprint2, fingerprint3 StrictNodes 1 3. Start Tor 4. Check your ip address by opening the url:

Anonymity, Metasploit, Tor

Anonymity First – Tor & Metasploit

Anonymity First Tor protects your anonymity by bouncing your communications around a distributed network of relays, run by volunteers all around the world. The primary purpose of Tor is to protect communications and improve privacy and security on the Internet. To remain anonymous we should launch our attacks through the TOR network using the Socat …

Metasploit, Tor

Launch attacks through the TOR network

Anonymity with Tor Tor protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world. To launch our attacks through the TOR network, we will use the socat program. Socat is a command line based utility that establishes two bidirectional byte streams and transfers data between them. …

Backtrack, Tor

Tor on BackTrack 5 R2 & R3

Add repository Edit file /etc/apt/sources.list and append the following line: deb lucid maindeb lucid main   Add the new key for repository gpg –keyserver –recv 886DDD89gpg –keyserver –recv 886DDD89 gpg –export A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89 | sudo apt-key add -gpg –export A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89 | sudo apt-key add –   Update the software list apt-get updateapt-get …