Route Traffic and Program Through TOR Network
Newbie hackers are often wondering how to anonymize their activities on internet. In this tutorial I’ll show u guys how to send any data through TOR network.
So first you need to download TOR and Proxy Chains, if you have them already great !
Download them by entering following command:
$sudo apt-get install tor proxychains nano curl -y
$nano /etc/tor/torrc
then find following line by using Ctrl-W:
#SocksPort 9050
uncomment it by erasing # and change port if you wish, i like to use port 8888, so line should then look like this
SocksPort 8888
Then go to the end of your TOR configuration file and add these 2 lines:
ExitNodes {ru}
StrictNodes 1
This will tell your TOR client to use exit nodes only from Russia, but you can change it to any country you like, simply replace “ru” with desired country, lets say United Kingdom – “uk”.
Save your TOR configuration file with Control-X and confirm changes.
Now you can start TOR by entering:
$tor
Open new terminal window and configure your ProxyChains with:
$nano /etc/proxychains.conf
At the end of your proxychains configuration file, you need to check for following entry:
127.0.0.1 9050
and change it so it looks like this
socks5 127.0.0.1 8888
Save and close your proxychains configuration file.
You could easily check your connection by making a simple curl request to a service like cmyip.com, here’s an example,
First make a normal curl request to www.cmyip.com, without using Tor or any proxies (just for comparison)
$curl www.cmyip.com | grep “<title>”
Remember “My IP Address Is” value, and now run it with proxychains:
$proxychains curl www.cmyip.com | grep “<title>”
You can clearly see in the part where it says “My IP Address Is ” and how the address has changed when you ran command with ProxyChains.
No comments:
Post a Comment