You are on page 1of 12

Lap number 3 the name of the lab it's a tour for beginners and Torres stands for the

onion
router so don't get confused with or the mythological God over the avenger right this is
Thor without an age and in this lab we are going to learn how to use these tools of the
whites been used for an and all of that right so it's going to be an interesting lab again an
interesting tool that you should be familiar with I'm also going to explain a little bit of the
no the infrastructure behind door white works in well I will give you some of my opinions
about using Tor and in particularly things that you need to consider if planning to use
store OK but as usual before starting our class there are some announcements that we
need to cover so I know it's been #1 I hope that you been checking teams it keeping an
eye on teams because well your second assignment it's already published and you'll have
a weaker little bit of yeah that's right also today we'll have our third lap so you will have to
submit your reports for this lab tomorrow right so please keep an eye on those things so
you don't miss any deadlines now one more time I I will remind you to please pay
attention to the requirements when writing your reports you know I already explained this
a couple of times more than a couple of times I even show you examples how to write the
reports so it's these things are not optional these things are mandatory that you are
required to do it like that you are required to include your proof of identity when working
in your report you need to use that echo command I think that's the safest way for you to
show your identity right you need to do that you need to show your identity when writing
the report there were several students that need their points they lose some points or the
total score actually because they didn't show proof of work right this is a crucial
component of your reports you have to do that also you have to submit your report on
time right you have to do it it's but it's required from you so please please please pay
attention to these things keep an eye on your calendar here on teams so you know exactly
when you need to submit anything and also please instructions follow all the instructions
that you don't need anymore points OK so number 2 regarding the delapp well you can
you can work on this lap pretty much on any platform you want us as long as you are able
to connect to your virtual machine or or you already have a Linux machine or something
like that you can use that as well I think when I'm trying to change for it for this lab we do
need to work on a Linux distribution let me show you that let me share my screen with
you OK so this lab that or lab past three tasks and with me during class we are going to
cover tasks one and two it is it's going to be quick ish laugh right so we're going to cover
task one in two then as a group you won't have to work on task three and there is a four
task that is not it's not part of our it's not being explained here in the in the room percent
but if you go on teams to the actual description of the lab you will find the instructions for
the 4th task there right so for task number three and four you will have to work with the
Tor browser which is something completely different from tasks one and two where we
are going to work with torrazza infrastructure right so please keep an eye on that here
again here you want find the description for task number 4 but if you go to teams and if
you read the description for lab number three you will find there the extra steps needed
or the extra task the description for for that extra task that you need to complete now for
the report as groups you will need to of course works on work on task three and four but
also you need to include tasks one and two in your report you are going to do these tasks
with me but you need to include the steps in the in the in your report so if you're going to
get your screenshots as we work on tasks one or two please make sure that you are using
your echo commands or you know OK make sure of that and I guess that's it I guess that
we can Oh no I was explaining so tasks one and two that requires us working with
thordarson infrastructure we are going to configure Tor on a Linux machine so you would
need a Linux machine for this if you are using a local virtual virtual machine will that
should do it N if you are working like me on Asher then you can work pretty much from
anywhere as long as you can connect to your virtual machine for task number three you
can you can complete this task on any platform you can because Tor browser is an
application that you can install a windows Linux and Mac OS so it doesn't matter right so
it's like this lab is divided into two parts tasks one and two we need a Linux machine for
that tasks three and four you can work on any other platform that you wish OK now for
the very last part of task number 2 this is going to be one of those rare occasions where
we do need to have access to a remote graphical desktop on our virtual machine right and
again what I'm going to explain applies to those of you that like me or are working on Kali
Linux on Microsoft Azure so when I configure my Kali Linux I set it up so it also supports a
graphical deck so I don't use it because it it it sucks OK I don't like it it's too slow painful to
use it and to be honest I prefer to do pretty much all my my you probably are guessing I
prefer to do pretty much everything from the SSH terminal right I think it's faster cleaner I
just prefer it that way so I don't use the the remote desktop on my kaleena sat Sept 4 one
or two instances in the entire semester this is going to be one of those right and I only
need it for one step on task number 2 alright so everything else I'm going to do it from an
SSH terminal as set that very last step on task number two in for that I'm going to use my
remote desktop client by RDP client every single windows computer I'm on windows right
now every single windows computer hasn't RDP client rating solid right if you just search
for remote desktop you will find I And if not you can go to the Microsoft Store and
download the remote desktop client any remote desktop will work now let's say working
on your Azure virtual machine but you are not a windows you are only know Mac W don't
worry just search for an art client remote desktop client for your platform you will find
one for necklace you will find one for Linux as well right and the game windows your client
is already there you don't need to worry much about that OK there are ways to you will
see that in a minute how slow that that graphical text is in there there are ways to
improve its speed to make it faster but honestly because I don't use it pretty much at all I
just don't care I haven't taken the time how to make it go faster even if it is here so I will
still not use it I will see you prefer connecting through SSH OK it's just the way I prefer
things so that's why I haven't a much attention or I haven't you know invest much of my
time into making my order be experience a little bit better I will be faster another thing
that you can do maybe it's trying to find a different different graphical desktop client
maybe use VNC maybe solve tiger BNC or whatever you prefer to work this way
teamviewer or something like that I don't know I'm pretty sure there are some other ways
to have a better graphical decks of experience on these Azure machines but again I just
don't use it not not for this not for my colleague box so I I don't care basically OK that's
why I haven't I haven't tried different tweaks to make it go faster but you are more than
welcome to try that *** as you Well we're going to work with Cali notes on Azure so make
sure that your dogs is up today if you forgot don't do it right now because I don't know
how long will that take you so make a mental note or maybe right you write yourself a
note something so you can do it after the death but it's very important that your
computers are always up to date that's it so we can start working with four So what is
stored what why we care about it soon enough to have any challenge room to learn about
it so door it's a free and open source software for enabling anonymous communication
here is the key word or why we used or or why towards it because it provides
communication OK by using a common technologies or or common techniques but putting
top of its priority you will see that in I mean what I mean by this so direct Internet traffic
through a free worldwide audience you're overlaying networks consisting of more than
7000 relays to conceal a users location it used for anyone conducting network surveillance
or traffic panels so let me try to Maintain very long sentence there maybe a picture will
help you understand so ontact number two we are going to work with the the root origin
of the OR the initial idea that was used by Tor and it's called proxy chains so proxy chains
He's a tool that exists on Unix systems since forever and the goal of these proxy chains it's
too well actually create a proxy change now what is the proceed change it's what you see
here on this picture so let's say that you have this client that once you communicate with
this website client will go all these notes before reaching to web service OK so that's why
we call a proxy change now but that's exactly how the entire Internet works right place
this computers here by Walters well that's pretty much how it works last class on Monday
we saw what the Internet is just a bunch of routers connected with each other so white
different what's different here in proxy chain in store this particular case well proxy chains
as a tool as implement let you stab lish change the particular order you want traffic to flow
will help you or you will let you do that you can stab lish the path that your traffic is going
to take sometimes you need this for let's say performance go right you want your
communication to be fast enough and so you choose your fastest routers or your fastest
nodes in the network so traffic will flow at its top speed right I mean there are so many
reasons why you will want to specify in particular or network traffic analysis so you want
to make sure that all your major traffic flows through this particular node here because
here you are you have a truck traffic monitor here that will let you know what's happening
in your neck I'm there so many reasons why you want to start with particular path for
yourself right and proxy change change would let you do that but I don't want to get
ahead ahead of myself we are going to talk about process chains civically #2 now now that
you know that this is what its hind tore I mean this is exactly what's happening with store
that's why it says that store is a network of more than 7000 and relays from bold here so
it's something like this is an infrastructure like this bunch these intermediate nodes so
when you're trying to access this web server over here you will send up the the request
and the reply Will go through a particularly number of intermediate nodes or each of the
relays until it reaches its final destination no but it's knew it or it's that each one of these
intermediate nodes would you two main things one it will alter your communication
information without altering the payload why I mean by this is for example this proxy or
this node here will change the source IP to something else to a random IP address right
before sending the packet along the way now the other thing that is note will do is that
they will forget about seeing that seeing that packet immediately through the path get left
of the property or the intermediate node node the relay here the the the device would
forget about that communication so if you think about that when you when the packet
reaches the web server there is no way that you can trace it back to its origin because the
source IP it's going to be completely different it's not going to be yours anymore it's going
to be completely different it also if you're trying to go from here to here there is no record
on any of these intermediate notes about the communication so there is no way for you
to let's say that you are on an attacker in their target in this web server here the web
server I ministrator will have no way to trace the communication all the way back to you
because there is no records of such communication in the information that you receive is
completely different false information right Now of course there are more things to tour
than this trying to paint you a big picture of how it works because there has to be some
information there has to be some way that the web server can reach the client without
response if not then there is not communication if this is a if the server doesn't know how
to order to whom it should send the response back but there is not communication right
and because the information here is false IP it's false the the actually the source IP will be
related to this proxy server here so when the web server sends a response but the
response will be sent to this proxy server and now it's back on that or infrastructure and
this servers exactly how to go back to each other OK so but this is this is this is some
information that is only known to the actual Tor network or that or infrastructure nobody
else can see these information nobody else has had access to that information right and
also these nodes over here and here are spread all over the world so a particular country
not necessarily we have jurisdiction over some of these notes it's not like let's say United
States can force server 3 to release information because well maybe this proxy is in China
this has no jurisdiction there and maybe proxy server number two it's on Russia and again
there's nothing that they can do about it right so you see it works like that now the main
goal hopefully after reviewing this picture we can better understand these sentence here
Tor directs Internet traffic through a free worldwide volunteer overlay network consisting
of more than 7000 really to conceal a user location in usage from anyone conducting
network surveillance or traffic analysis so whenever you're using that or infrastructure
well you are bouncing all these 7000 different relays all over the world your package going
bonkers until it reaches its final destination Every single packet might go through a
different chain my goal through a different path but it's not like they will always follow the
same path right so imagine the nightmare somebody conducting network surveillance
surveillance port traffic analysis but we cannot aggregate this information nothing will
make sense all these packets they will come for from different sources in all of that right
so this is how store guarantees anonymity in your communication now please keep in
mind the communication would be anonymous structure that doesn't mean that let me
give you an example let's say that you're using that or to check your Gmail account Google
will know your identity because you're revealing your identity to Google when whenever
you're signing into your account you are saying you are right so there's nothing that do
about that that that's not what we mean by enabling anonymous communication right we
may and animals communication as long as you don't logging into any system right so for
example if you browse I don't know Amazon.com using torque well they all those cookies
that Amazon uses keep track of your activity to see what I think have you been searching
and all of that right you are saying that way you're anonymous timely but now if you log
into your Amazon account and start checking in security books then Amazon will know
that you are searching for security books and they will send you it will be offering security
related products but again there's nothing that store can do about that because you are
disclosing your information or your identity in this case to Amazon by logging in so please
keep that in mind sometimes we get confused about what we mean by anonymous right
women and animals for everything else that doesn't include logging into a system the
moment that we log into the system we are disclosing our identity OK using turn makes it
more difficult to trace Internet activity to the user this includes visits to websites online
posts instant messages in other communication forms right all of those are true
remember after the moment where you sign in or login into a system that way or at that
moment you are revealing your identity so I think I have a question that it says torsey say
as the work of using VPN OK to say I have to be honest I'm not particularly particularly fan
of tour I think that there are better ways doing the things that tour help us do right there's
nothing wrong with using before or at least not from the technical point of view
implementation solution the problem with door it's it's bad reputation alright so many
organizations many companies that many network managers or administrators don't like
door why well because store is being used by hackers and attackers to do bad things right
so it's it's hard to tell who's using door in a good way or all for good things and for bad so
in general many network managers will block Tor access in their networks they just don't
want to from the risk there is one good thing I mean there is one special thing about or I
don't know when what's the best word for here so we can have access to a different part
of the Internet right the so-called dark web or the deep web right and also we have the
deep deep dark weapon all of that this is what we refer to as the onion sites as you can
see the logo for Thor Onion right so onion sites are websites that are only accessible if you
are using the Tor infrastructure meaning that they are not being published anywhere you
cannot access using your regular browser you will have to access them through Tor only if
you if you use store right and this is the part I mean the deep web it's like it's like another
website like the second web end and you have good sites and had bad sites the same as
the regular Internet I mean even Facebook has an onion side right so again not all onion
sites are bad and not everybody that uses store it's about many onion sites in many torv
users are price and it's been flat or not allowed block in different networks and different
environments right so now what does because I mentioned there are other ways that we
can do pretty much the same thing so store except for having access to these onion sets
right so can't or save us from using a VPN yes and no right here you're only reason for
using poor it's to not use a VPN don't do it why well first one of the main reasons why you
use a VPN it's too when I say you I mean the general public for the public in general right
VPNs they do have a very use for remote users something that we still need to talk next
week right trying to see here really I do this lab after two or three network security classes
but because we miss an entire week of class I I needed to I mean I'm doing this lab only
after one network security class why I didn't push it this love to the next week because I'm
next week I want you to fully concentrate on working on your final sorry on your midterm
exam and also I'm pretty sure that you would be a little bit trapped with final project and
all of that before the exact right so I didn't want to add more things to do that right kind of
like my way of balancing things so I'm doing this lab here in usually do tour after
explaining the benefits of using a VPN in my students they they have a clear
understanding what's the real purpose of why do I say the real purpose because the
general use of the general public when they say oh use a VPN it's because they want to
change their IP address they want to change where they come from so they can watch a
different Netflix catalog or maybe have access to restricted services like I don't know
before having the distant past here the only way that you can get this blood was if you
were using a VPN to be in The United states or something right those are or that that's no
main reason why people use a VPN right so they want to change their IP address and of
course using Tor will change your IP address but you have almost no control over where
your your best your new IP address will be from right so when using it or you can you can
be assigned an IP address in Germany or Switzerland or India or parul I mean you have
zero control or almost no control regardie where your IP is going to be right an even if you
can control the country which is a really big step being able to control the country that's
something you can do for Tor browser you cannot control it say that you are in the US
right you cannot control a specific location where you want that IP address to come from
so let's say that you want an IP address specifically in Florida because well that's a
requirement you need to have a Florida IP address right you need to prove that you are
free and by having a three IP address you cannot do that but you can control with Tor
browser the country yes but then you can be in Washington state right or you can be in
Nevada or Montana or Nebraska anywhere right so that's what I'm saying yes I know to
the question that if using Tor help us from using a VPN right then in terms of anonymity
yes it help us it will give us the same benefits of using a VPN right now using a real VPN or
with a real VPN you have more control over these things you can choose the location
where you want your VPN to be and and and all of that now if you're going to use a VPN
please be very careful about your VPN provider right not all VPN providers are good news
so again hopefully next week all this will will make sense or will make more sense but
when using that VPN the traffic is protected it's secure it's anonymous while on the VPN
Brian so what happens is that the VPN provider or or your client you you your browser or
you your VPN client and the VPN provider server they will encrypt traffic they will they will
use hybrid cryptography to encrypt that traffic right and the information will be protected
on transit but the moment that information reaches the VPN servers the VPN server can
see the information because it can decrypt it remember the information is going to be
encrypted from the VPN client to the VPN servers on the VPN server will be able to
decrypt that information right so there are some VPN providers that will miss use this
information they will steal this information and sell it or resell it for their own benefit so
for example they will resell For information to people or other companies that do ad
campaigns for 3rd cards right so you are gaining gaining pretty much no anonymity by
using a VPN you're getting all the hassles of configuring your VPN and none of the benefits
why because your provider is reselling your information right so please make sure do your
homework do your research if you're going to use a VPN provider well make sure it's a
reputable company and not somebody that is just trying to review of right actually one
thing that you can do is to create your own VPN if that's what you want to do if you want
to change your IP address right and maybe encrypt your traffic for for anonymity purposes
one thing that you can do is create your own VPN right do it yourself type of fashion this is
what we call the poor man's VPN solution and it's actually an SSH tunnel So if you Google
SSH tunneling Windows 10 or Linux or Mac OS or whatever you will you will find tons of
instructions how you can create a an SSH tunnel from your local computer to a remote
computer so let's say that I want to change my IP address to an I IP address in US I can fire
up my Linux box here my color Linux box by the way it has an IP address in the US I can
fire this computer up and then from here from my working computer I can set up a an SSH
tunnel right from my computer to my calendar not spots and then I will forward
everything through that tunnel right every time they use a web browser I will forward that
all my Internet traffic through that tunnel right so that will sending information to my
calendar spots which will act as a relay and then it will send that information out as if it
were coming from the Linux machine so my IP address and everything else will be from
the US right I can do that and I'm in total control of what's happening between my
computer and my colleagues bold right so I know nobody will be spying on me and
stealing my information then please I mean I understand that this is a person or kind of
like do-it-yourself solution right after the information leads Mike Allen spot it's no longer
protected right or it will be only protected by using HTTPS right but it's no longer on any
any type of VPN solution right but if if my only intention is to watch some Netflix movies
or something that are on the only America catalog or the US catalog right I can for sure do
my SSH tunnel into this and then from my local computer I can connect to Netflix and I will
have access to the US title OK that's completely possible as you can see my computer here
is in the east part of the US OK so there is another question those websites those onion
websites are up in Tor servers yes it's just been part of the tour infrastructure so you
cannot have access to these servers on the regular Internet you have to be using the Tor
relay network in order to get to them to have access to that OK OK so this is been very
long traduction 4th or so let's actually start using Tor right by the weight or we love using
Tor for pentesting that that that is a very good use Tor because now we can have all these
attacks coming for a particular system from all these different places right so I can I can
stress test the defense mechanisms come on that system I can see where I can test if
these defense mechanisms will be resilient too attacks coming from different sources or
not right so torn it's it's it's used quite often by pendance OK so how we used or how we
start using Tor and more that we need to install Tor in our computer so let me start my
calenus in actually I need to share my entire screen so you can see my terminal because
I'm going to connect from my terminal to my calendar spot so OK so this should work do I
have an IP address already yes I do OK so that got my IP address it's 20 121 dot 22.154 OK
yes So the first thing that we need to do is to install Tor and for that you need to just run
your att get install Tor but don't forget to run this as soon right you need to have
superuser permissions she's tall and you packages here right so sue do get install now
because I already have door installed on my computer nothing is going to happen to me
right it's it's are installed it I'm running the latest version so nothing will happen if this is
the first time that you're installing this then the the command will download the packages
installed those packages in your system or if you already have tour there but running an
outdated version it will update no the program it will update or or in my case nothing it's a
cheap because well I'm running the latest and greatest version of Tor OK so that's step
number one and that's pretty much all that we need to do in order to have Thor now the
next part of task number one will show us how to work with services in so you don't
remember right we will learn how we can Start Stop restart and check the status of
services in Leonards because when we start Tor what actually happened is the wind stole
a service be tored service so we can or we need to start that service right so the first thing
that we could do is actually check if authorities mean it's running or not so the way that
we do that is we use the service command the name of the service that we want to check
and then the status command OK so for every single service there are the things that you
can do are just start the service stop the service restart the service and check the status of
that service right stop here we are checking the status and as you can see tour it's inactive
because we haven't started it yet so let's fix that service door start will start the tour
service for us here because we didn't use sudo it's asking us for our password whenever
you're going to start a service on Linux you need to have again brute prick right so if you
want you can cancel that or you can input your password wherever you want and better
yet run dot com and it's the same command but with right and then no password needed
because well I mean we have fruit relations on this computer we can do all of that right if
you want to stop your soo do it's the same so stop and it will stop the service right and if
you want you can also restart this service right and finally you can check the status of your
service and as you can see it's active now so Tor it's now running on your computer right
now if Are working or if you are creating the screenshots for your report don't forget
please don't forget to use your echo your echo command right this is the safest way for
your report OK so that's it that's pretty much what we need forward task now What right
that's how we do it OK now task number two I kind of already started explaining you proxy
change what proxy change it right it's the the the technology behind this idea of storage
what's running Tor this notion of having this relay this proxy service that will forward go
information and right so proxy chains the the do we have available on Linux to create this
type of infrastructure biggest there are some some valid reasons why we want that for
example for for for quality of service or for for network monitoring or network or for load
balancing and all of that we we we might want certain traffic to go one way in another
traffic to go with different way to different path the different chain of process right so
there are tons of valid reasons why we want such a configuration like this and the tool
that would let us cheat this it's actually proxy chains OK it will let us do this so proxy
chains is a tool that forces any TCP connection made by any given application to follow
through a process proxy like Tor or any others socks five socks or or HTTP HTTPS proxy
changes I mean proxy change the command lets you create one or more proxy chains it's
just a command that would let you configure this OK so now why we need this for this lab
not because we aren't going to create a tour infrastructure for all these 7000 railings no
that's already there that's that's already working we're going to use proxy chains so
everything that the client wants to send over it or we can re direct it through it we can
Take the the the packets generated by the client and inject those or or forward those
packets two the that or infrastructure right so we're going to re direct traffic into that or
infrastructure that's why we're going to use proxy chains for to redir so the configuration
for proxy chain is going to be quite simple but before doing that again we need to stall
proxy chains on our system so similar to what we did with Thor here we need to sudo abt
gate store proxy chains in again please make sure that you're running this as soon as you
need permission for doing that in my case nothing else needs to be done because Percy
change is already installed and I'm running the latest and greatest version right your case
in might be downloading right now the package and it's going to install it once you have
proxy chains install on your computer the next thing that we need to do it's You change its
configuration file so we can instruct proxy chains to inject everything through Tor OK now
tour might look like this magic things but it's not it's just software it's just an application as
in as any other application any other software in your network it runs on a port right So
what are we actually going to do it's to redirect our traffic to a particular port the store
port and also that's why it's quite simple to blocked or on a network because it just close
support and that's it right OK so how we do that well the configuration file for proxy
chains it's on the Etsy folder in the name of the file its proxychains.com a pretty standard
name for configuration files in Unix and Linux right so we need to edit this this file and for
that you can use for pretty much any text editor that you drive you can use VI you can use
nano or any other text editor to use refresh here I'm going to use the suggestions of non
I'm going to use nano or doing the changes now again because this configuration file it's
on the folder for assistant why software you need brute privilege in order to modify this
file so whatever editor you are using run it with zoo you need to run it with sudo it later
after you done all the modifications you're trying to save that those changes and you get a
permissions needed error it's because you didn't started the editor with suit so before
doing any changes make sure that you are running the tool using SU So what I'm going to
do here sudo nano and then my proxy chains.com again I'm running this with suit because
I need root privilege when modifying its this file OK now my file my configuration file looks
a little bit different than yours because well I already added all the modifications needed
here right but let me try to explain what changes we need to do here process the first
thing that we need to do is to stab lish what type of policy project change it's going to
follow there are three options dynamic chain strict chain in random chain so to
understand this remember that proxy chains will work with this with a with a bunch of
proxy servers or intermediate nodes these relays right so there will be a set of these
servers or as proxy chains called and it's a list of proxies right so at the very end of this file
you can find you can find that list right right now it's a very short list I'll I'll explain this in a
minute but here in this in this last section is where you can specify all the proxy servers
that you can follow that could be in your path now these these policies here instruct
person chains how to select those files so the dynamic dynamic chain will try to go
through all the servers in the list right but if one server is down or there is an issue with
one of them it will try a different a different path so it will dynamically adjust itself until it
reaches its destination if there is nothing wrong with the path it will always follow the
same path but if there is an issue with the path it will try to dynamically find a new one
that's why we call this a dynamic change but the first priority will have will be the order of
these proxies in the list that's the dynamic change now the strict chain is similar to the
dynamic but you have to follow or proxy change will strictly follow the order of the
process in the list so there's no proxies keeping there is no dynamically adjusting it
something happens if there is a proxy down or something like that the communication will
end there is no communication will not reach its end destination right because you have
to follow the orders strictly you need to follow the order wait it's plain right now random
chain from the list of proxies it was randomly choose the path so there is this option these
days configuration option that chain length that will specify how many random proxies
you want to use so let's say that you specify 3 then randomly you will choose three
process and follow that order for that change write everything every every time the the
packages been sent through proxy chains using a random chain it will randomly choose
end proxies from the proxy list and then follow that the one that we want for this
experiment or for this lab it's dynamic change right so if your file is something like this
meaning that this line is commented just delete the #symbol anuar remove in the
comment on that line so now dynamics change is the the option that's been selected that
is that is happy for the US and exchange here make sure that proxy DNS it's also
uncommitted so if your line is like this delete the hashtag and make align active in finally
because We only care about um the work proxy list will only have one proxy in it and it's
going to be a socks 5 type of proxy it's going to be ourselves our loophole address so it's
everything everything is coming back to ourselves right on port 9050 why important 1950
well because that's the tour board that's or that's the portware tour it's listening for
request or four packets right so whenever you're using proxy chains all the traffic will be
redirected back to our own machine on port 9050 right and your Tor services it's listening
on that port and that's it that's all that we need to do please make sure to use socks 5
here instead of socks four why because socks 5 is newer better faster than social 4 right so
use so you will get a better experience by making that change that's it now that we have
that right all the changes so if you're a nano how you write changes well you use control 0
to write it and then control X2 exit and does it so I have this overlay over here anyway so
once you have all those changes again let me show you all all the changes that you need
so uncomment dynamic change uncomment proxy DNS and finally this line to your proxy
list it should be a sub 5 120 seven 001 and 9050 asked port and that's it that's all that you
need right there the changes why I have this I don't know what happened no I don't want
any changes so once we have that now we can use proxy chains right so here is where we
need to use the remote desktop client because what we're going to do is to run Firefox
over proxy chains in that way all our traffic will all our networking or sorry Internet activity
will go through Tor right so I'm not going to use my terminal window here because I
cannot run Firefox here I I need a graphical desktop for that I'm going to use my remote
desktop client instead and again this is something that you can get from the Microsoft
Store just search for remote desktop client and you will find it or also you can use this one
here the remote desktop connection which is natively installed on Windows 10 it's pretty
much the same thing right you can specify the IP address that you want to connect the
username and then just connect so you can use either this one or this one I prefer this one
just because I can have everything saved here and you know the thumbnail and I know
what all my PC's are right although I only have one right now here but I need to edit the IP
address because as you know these IP addresses changed all the time or us and I think it's
this one here OK so let me try anyway and here I need to use my username and password
because RDP to does not support pen files I need to configure a username and password
which I already did so I'm just using that OK and I'm getting my graphical desktop and you
can see it's painfully slow yours might be better hopefully yours is better than mine it's
just completely unusable because it's just too slow here again I do need to enter my
password and wait for it to bash and I'm not doing anything I'm just waiting for wait to
batch OK so it's gone up to now before running Firefox over Thor I will run Firefox that the
regular way so I can show you what my IP address is and then what my IP address will be
once it started using Tor right so for that I will go to geolocation.com I think there is
another another site that is recommended by the location also works and as you can see
right in the middle of the Washington state I'm in the United states region is Washington
and the CD is Redmond and you know that Microsoft is from Redmond state United States
right so it's data center and everything else it's there so under and I'm in the United states
because I'm using my box which is being hosted on Microsoft data center OK so this will
be the same location that I will get when using my SSH tunnel right OK so it's working here
but I'm not using Tor yet right this is just regularly browsing the Internet this is just me
regularly browsing Internet there is no protection no VPN no anonymity none OK so let
me close this and now I'm going to run park folks over proxy chains and I will repeat the
experiment I will use Geo location and show you my new IP address so terminal window
proxy trains Xbox run this like that so I get my prompt back so I can use somewhere
commands if I want OK so let's run it like that Ann it's Firefox running over proxy chains
3.1 and then we'll hear you're seeing on the proxy change activity in here we are going to
geolocation.com time It's wait now you see I have a totally different IP address in my
location is going to be completely different try we can while we wait for the map to load
there is the map we are in Latvia OK so we are not longer in the US we are in Latvia stop
door it's working now I can browse onion sites and all of that now if you want to browse
on your sites well one thing that you can do is on your site you can search for best onion
sites and then I mean just be careful because as I said before someone insides are good
someone insides are not that good and those bad onion sites can give you some trouble
so if you're going to do this maybe do this experiment on a virtual machine instead of your
real machine right here we have 160 plus dark web websites to visit try hot here we have
top 20 dot onion websites in these are called onion sites because their domain names all
of these domain names will end up in dot on and as you can see this is painfully slow to
use it it's for me this is not usable at all right call Sean before you visit the dark web sites
please be very cautious when doing this so here is the hidden wiki the hidden wiki Talking
are you have the link and open open that link on and you tap and you can have access to
the hidden wiki right this is not a site that is regularly accessible on the regular Internet
Know if I can there OK it says server not found so that's like it's dead so that's right the
second one so dred is like the reading of dark way so let's see if we can have access to that
so we don't have access to that either maybe GPS can we get a side from here anyway I
mean you get you get the idea right this is a dark web search engine hopefully this will
work I don't know if we are being loved or all these sites are dead but to be honest this is
so slow that trying to troubleshoot this that's not something that I'm going to do right see
here I I think I said this right even Facebook has an onion site so you can try going to face
the Facebook onion site as well but do this on your on your own computer here my my
remote desktop it's it's just that I really done done I can use it like this check something so
clear service it's running it's connected oh maybe my port is closed on my caroline's
machine that's why I'm not getting anything back from the service because I mean pretty
much all ports are close here except the one that I use for RDP and SSH so the 4th might
be close and I need you open that before using Tor but well that's pretty much it I mean if
you try this on your on your machine or remember task number 3 away from here if you
try sorry task number 3 will ask you to install the Tor browser try and you can solve this on
your windows computer I'm not sure if I do have Tor browser or yeah this is the browser
on my windows computer so connect to Tor connect stablishing the connection and this is
completely different from what I did on my Catalina so right this is on my windows
computer try so Tor browser it's contained application have nothing to do with with the
things that we did on tasks one in two and as you can see I'm having trouble connecting
ah so let's see I hope that I could connect or if not maybe there is something with my ISP
or something delete or OK I'm connected so let's try the experiment again so best onion
sites gay and let's try this let's close it yeah the hidden wiki looking for the hidden wiki
hello try Facebook on your site I think it's lonely wiki and Facebook not doing much so this
site might be down I don't know but well you can try you can try a different different
onion sites and see what you can find it could be as I said before it could be that my ISP is
blocking onion requests or Tor traffic right that's how it is there is not much that we can
do about it right this site I think they are actually down try Walmart it's kind of like slow so
i not that sorry

You might also like