View
221
Download
0
Category
Preview:
Citation preview
8/10/2019 TOR for Anonymity
1/6
TOR for anonymity
TOR for anonymity
By Click Death Squad (C.D.S.)
Revision 1.1
TOR is a useful tool that can defend you aainst net!ork "rofilin and hel" you remainanonymous. The #asic summary is that TOR is a net!ork of com"uters that can #e connected
to anonymously$ and !ill route connections to the internet. This ty"e of routin model is
referred to as %onion routin% and "rovides an additional layer of security !hile #ro!sin the
!e#. &f you'd like to read more on ho! TOR !orks in detail$ check out the TOR overvie!on
the !e#site. By routin your !e# #ro!sin throuh other random com"uters via an encry"ted
connection$ you can defeat the "ossi#ility of your #ro!sin #ein "rofiled #y your &S$ or
censored #ased on content your are vie!in. The aim of this tutorial is to et TOR u" and
runnin as fast as "ossi#le on your com"uter$ allo!in you to #ro!se the !e# in a secure and
anonymous fashion. &f you aren't familiar !ith ho! TOR !orks in #asic detail or have an
interest in #ecomin a client$ this tutorial is "ro#a#ly not for you.Please keep in mind that
TOR does not provide end-to-end encryption$ and is certainly not a re"lacement for SS. &t isindeedpossible for the owner of a TOR exit node to sniff traffic as it passes back to the
internet and glean passwords. *ou should only use TOR to "revent data "rofilin or
circumvent fire!alls$ #ut under no circumstances should you rely on it for security+
&n this e,am"le$ !e are usin -irefo, as the !e# #ro!ser of choice$ and all the commands
issued are iven in quotes$ !ith the result of the commands#ein listed in rey.fter each
ste"$ a screenshot is iven so you may com"are your out"ut to !hat should #e ha""enin.
lease note that not all the screenshots contain the e,act same data !hich is iven in the
e,am"le$ they are merely for reference "ur"oses.
Tools you !ill need to accom"lish this task/
De#ian0#untu #ased inu, system !ith -irefo, installed
The a#ility to install -irefo, #ro!ser e,tensions
Basic inu, net!orkin skills and command line ca"a#ilities
cold #eer
Step 1: Install TOR and privoxy.
TOR is the anonymous net!ork routin tool that !ill "i"e your #ro!sin connections.
rivo,y is a !e# "ro,y that filters out content !hich may com"romise your identity !hile
surfin the internet. 2hen these t!o "rorams are cou"led toether$ you have a "o!erful duo
that can "rotect your "rivacy and anonymously take your data !here it needs to o. Once
these t!o "rorams are installed$ they !ill #e "re3confiured to run at #oot time in the
#ackround. -irst you need to install these TOR and "rivo,y$ then !e !ill confiure them.
%sudo a"t3et install tor "rivo,y% 444 install the TOR and "rivo,y "ackaes.
http://www.torproject.org/overview.html.enhttp://www.torproject.org/overview.html.en8/10/2019 TOR for Anonymity
2/6
Step 2: Configure privoxy to filter out web browsing information tat may !ompromise
our anonymity.
Out of the #o,$ usin TOR as a client (instead of an e,it node) requires no confiuration.
Confiure "rivo,y so that it filters out any information that may "ossi#ly com"romise our
host. This can #e done #y modifyin the "rivo,y confiuration file.
%sudo nano 0etc0"rivo,y0confi% 444 edit the "rivo,y confiuration file and make the
necessary chanes.
5o! that you have disa#led loin for connections$ you should disa#le loin of cookies
8/10/2019 TOR for Anonymity
3/6
that are transmitted and received !hile #ro!sin anonymously. Comment out the %6arfile%
cookie loin feature to "revent "rivo,y from loin anythin that could com"romise our
identity.
The final ste" in modifyin the confiuration file is to tell "rivo,y ho! connections should #e
for!arded to TOR. rivo,y !ill filter the content you are #ro!sin$ and TOR !ill route it
throuh the anonymous net!ork. t the very end of the "rivo,y confiuration file$ add a line
!hich s"ecifies !hich "ort to for!ard connections on. 7o to the #ottom of your "rivo,y
confiuration file and add a line !hich s"ecifies ho! the connections should #e routed afterthey are filtered. *ou !ill need to "aste in %for!ard3socks8a 0 localhost/9:;: .% into the
#ottom of your confiuration file. 5ote/ the %.% must #e included at the end.
8/10/2019 TOR for Anonymity
4/6
rivo,y is fully confiured to filter your !e# #ro!sin traffic$ and TOR !ill securely and
anonymously route it for you. By default$ TOR listens for connections on "ort 9:;:.
8/10/2019 TOR for Anonymity
5/6
*ou !ill need to restart -irefo, in order to have this add3on to take effect. Restart -irefo, andyou !ill notice in the lo!er riht hand corner of your #ro!ser that you have the %tor#utton%
installed. Click %Tor Disa#led% to have the TOR "luin take effect. 5o! try #ro!in to ensure
your & address does not resolve to !here your actual location is. *ou miht try oin to
&?ocationand havin a eora"hic & location looku" "erformed. &f you follo!ed the ste"s
correctly$ your connection should #e routed throuh the TOR net!ork and !ill end u"
resolvin to a totally different & than you are oriinatin from.
http://www.ip2location.com/http://www.ip2location.com/http://www.ip2location.com/8/10/2019 TOR for Anonymity
6/6
Click Death Squad isn't from 7ermany$ !e re"resent ortland Oreon+ s you can see$ TORand "rivo,y have routed our connection throuh an e,it node !hich ends in 7ermany. This
secures our connection #y "i"in it throuh multi"le encry"ted connections. 5o! that you
have TOR and "rivo,y u" and runnin$ you can #ro!se the net securely and safely !ithout
fear of #ein "rofiled #y your &S or #ein censored. l!ays remem#er to check your
lofiles$ !atch your #ack and stay safe.
http://maps.google.com/maps?f=q&source=s_q&hl=en&geocode=&q=Portland,+OR&sll=45.801999,-122.670593&sspn=0.876957,2.471924&ie=UTF8&ll=45.568871,-122.670593&spn=0.440309,1.235962&z=10&iwloc=addrhttp://maps.google.com/maps?f=q&source=s_q&hl=en&geocode=&q=Portland,+OR&sll=45.801999,-122.670593&sspn=0.876957,2.471924&ie=UTF8&ll=45.568871,-122.670593&spn=0.440309,1.235962&z=10&iwloc=addrRecommended