Route Traffic and Program Through TOR Network

Route  Traffic and Program Through TOR Network

Newbie hackers are often wondering how to anonymize their activities on internet. In this tutorial I’ll show u guys how to send any data through TOR network.

So first you need to download TOR and Proxy Chains, if you have them already great !

Download them by entering following command:
$sudo apt-get install tor proxychains nano curl -y

After instalation is completed, we need to configure our TOR and proxychains, so lets start with tor configuration:
$nano /etc/tor/torrc
then find following line by using Ctrl-W:
#SocksPort 9050
uncomment it by erasing # and change port if you wish, i like to use port 8888, so line should then look like this
SocksPort 8888

Then go to the end of your TOR configuration file and add these 2 lines:
ExitNodes {ru}
StrictNodes 1

This will tell your TOR client to use exit nodes only from Russia, but you can change it to any country you like, simply replace “ru” with desired country, lets say United Kingdom – “uk”.

Save your TOR configuration file with Control-X and confirm changes.

Now you can start TOR by entering:
$tor

Open new terminal window and configure your ProxyChains with:
$nano /etc/proxychains.conf

At the end of your proxychains configuration file, you need to check for following entry:
127.0.0.1 9050
and change it so it looks like this
socks5 127.0.0.1 8888

Save and close your proxychains configuration file.

You could easily check your connection by making a simple curl request to a service like cmyip.com, here’s an example,

First make a normal curl request to www.cmyip.com, without using Tor or any proxies (just for comparison)

$curl www.cmyip.com | grep “<title>”
Remember “My IP Address Is” value, and now run it with proxychains:
$proxychains curl www.cmyip.com | grep “<title>”

You can clearly see in the part where it says “My IP Address Is ” and how the address has changed when you ran command with ProxyChains.

No comments:

Post a Comment

Information About You