Video – Remaining Anonymous Online using TOR and Proxychains

Ethical Hacking - A Hands-On Approach to Ethical Hacking Anonymity - Remaining Anonymous While Hacking Online
9 minutes
Share the link to this page
You need to have access to the item to view this lesson.
One-time Fee
List Price:  $139.99
You save:  $40
List Price:  €128.51
You save:  €36.71
List Price:  £110.53
You save:  £31.58
List Price:  CA$190.63
You save:  CA$54.47
List Price:  A$208.90
You save:  A$59.69
List Price:  S$188.42
You save:  S$53.84
List Price:  HK$1,092.29
You save:  HK$312.10
CHF 91.18
List Price:  CHF 127.65
You save:  CHF 36.47
NOK kr1,073.95
List Price:  NOK kr1,503.58
You save:  NOK kr429.62
DKK kr686.39
List Price:  DKK kr960.97
You save:  DKK kr274.58
List Price:  NZ$228.20
You save:  NZ$65.20
List Price:  د.إ514.18
You save:  د.إ146.92
List Price:  ৳16,307.21
You save:  ৳4,659.53
List Price:  ₹11,661.24
You save:  ₹3,332.02
List Price:  RM656.20
You save:  RM187.50
List Price:  ₦205,785.30
You save:  ₦58,800
List Price:  ₨38,789.74
You save:  ₨11,083.57
List Price:  ฿5,038.70
You save:  ฿1,439.73
List Price:  ₺4,513.75
You save:  ₺1,289.73
List Price:  B$714.59
You save:  B$204.18
List Price:  R2,565.91
You save:  R733.17
List Price:  Лв251.83
You save:  Лв71.95
List Price:  ₩189,601.05
You save:  ₩54,175.60
List Price:  ₪516.98
You save:  ₪147.71
List Price:  ₱8,098.42
You save:  ₱2,313.99
List Price:  ¥21,792.94
You save:  ¥6,227
List Price:  MX$2,325.03
You save:  MX$664.34
List Price:  QR507.87
You save:  QR145.11
List Price:  P1,886.91
You save:  P539.15
List Price:  KSh18,172.80
You save:  KSh5,192.60
List Price:  E£6,553.98
You save:  E£1,872.69
List Price:  ብር7,998.81
You save:  ብር2,285.53
List Price:  Kz118,851.51
You save:  Kz33,960
List Price:  CLP$125,220.73
You save:  CLP$35,779.90
List Price:  CN¥1,011.17
You save:  CN¥288.92
List Price:  RD$8,157.46
You save:  RD$2,330.87
List Price:  DA18,848.39
You save:  DA5,385.64
List Price:  FJ$311.92
You save:  FJ$89.12
List Price:  Q1,081.96
You save:  Q309.15
List Price:  GY$29,135.07
You save:  GY$8,324.90
ISK kr13,781.37
List Price:  ISK kr19,294.47
You save:  ISK kr5,513.10
List Price:  DH1,386.51
You save:  DH396.17
List Price:  L2,464.07
You save:  L704.07
List Price:  ден7,916.55
You save:  ден2,262.03
List Price:  MOP$1,119.16
You save:  MOP$319.78
List Price:  N$2,547.77
You save:  N$727.98
List Price:  C$5,126.52
You save:  C$1,464.82
List Price:  रु18,565.58
You save:  रु5,304.83
List Price:  S/520.05
You save:  S/148.59
List Price:  K540.79
You save:  K154.52
List Price:  SAR524.96
You save:  SAR150
List Price:  ZK3,554.51
You save:  ZK1,015.64
List Price:  L640.62
You save:  L183.04
List Price:  Kč3,180.29
You save:  Kč908.72
List Price:  Ft49,813.32
You save:  Ft14,233.39
SEK kr1,071.59
List Price:  SEK kr1,500.27
You save:  SEK kr428.67
List Price:  ARS$123,415.66
You save:  ARS$35,264.13
List Price:  Bs962.21
You save:  Bs274.93
List Price:  COP$532,965.46
You save:  COP$152,286.72
List Price:  ₡71,270.84
You save:  ₡20,364.55
List Price:  L3,448
You save:  L985.21
List Price:  ₲1,043,416.42
You save:  ₲298,140.27
List Price:  $U5,431.06
You save:  $U1,551.84
List Price:  zł548.49
You save:  zł156.72
Already have an account? Log In


Greetings and initiate video presentation we're going to see how we go about remaining anonymous online using Tor and proxy chains. Tor is software and an open network that helps you defend it because traffic analysis is a form of network surveillance that threatens personal freedom and privacy. proxy chains are a tool that forces any TCP connection made by any given application to follow through a proxy such as Tor, or any Sox four sock five HTTP or HTTPS proxy. Shown from this image from the last file. proxy chains allow us to move from one proxy server to the next all the while changing our location and our IP address, allowing us to remain anonymous. To enable proxy change we're first going to need to edit the proxy change config file.

To do this, I'm going to Use the nano text editor, you're free to use any text editor of your choice. I'm using nano to help keep everything as simple as possible. So in my terminal, I've typed in nano space four slash e TC forward slash proxy change dot c o n f, I'm going to go ahead hit Enter. And now inside of the text editor with the file for proxy change dot config, every line with the pound sign in front of it is commented out and will be ignored by the machine. What we're going to do now is we're going to use our down arrow, and we're going to move all the way down to where we come through dynamic chain. This is the first line that we want to uncomment.

So I'm going to use my peril, come on over and use my back arrow and remove that pound sign so that this becomes active. I'm not going to scroll on down again, using my down arrow to like come to strip chains. And now I'm going to comment this out using pound sign. I'm now going to scroll on down further until we come to the DNS portion. I'm now going to uncomment the line where it says proxy, DNS request no leaks for DNS data. Now this is very important.

Because though we are going to be getting a random IP address and a random location, we will not be getting a random DNS server unless we use this feature. So what happens is, is we can be found out by using our default DNS server, which will have our default IP address. So to make sure this doesn't happen, we're going to make sure that we pick up a different DNS server when we use proxy change. We're going to scroll down a little bit more. Now we're going to the proxy list format. Now you'll notice on the examples that we have Sox five and this is the format we're going to be using when we enable the Sox 500 auction chain.

So we're going to type in Sox five space, the IP address space, the port number, the username and the password. That is for individuals that subscribe to a proxy chain service. Since we're using the free version, we're just going to scroll on down here until we come to the proxy list. Down here we see that we already have an entry for Sox four, and we're going to use our Down Arrow one more time. And on the next available line, we're going to type in Sox five. We're going to tab over one time and we're going to type in 127 dot zero dot zero dot one space 9050.

So I now have an entry for Sox five and I've using the same IP address which is the default loopback address for my Cali machine. And we're going to be using the port number for tour which is 9050. And I'm now going to go ahead and hit Ctrl X to save my changes He's going to ask me, do you want to save the changes, type in Y for yes, I'm going to hit Enter. And that brings me back to my prompt. The next thing we have to do is check the status of our tours service. So I've typed in service tour space status, I'm gonna go ahead and hit enter.

It tells me that is present, but it's not currently running, it is inactive. By default, the Tor service does not come pre installed with Kali 2.0. So you're going to have to download and install it. If you have an error or you have grief, with trying to install the Tor service, there's a troubleshooting guide inside of the lab to help overcome any problems you're going to encounter. We're now ready to start the tour service. So I'm going to go ahead and type in service space tour face start and it comes right back to the prompt letting you know that that command completed successfully.

Now we're going to go use my up arrow and we're going to check the status one more time. And we see that we have a green active Light letting us know that the tour service started success, we're now ready to test to see if we really do have anonymity. And if we are being hidden from any prying eyes while we're on the internet. So to do this, I'm going to type in proxy change space. And we're going to launch proxy changes in Firefox. And we're going to go to WWW dot DuckDuckGo.

Com, I'm going to go ahead and hit Enter. And just a moment my browser is going to fire up and it's going to take me out to DuckDuckGo calm. Now notice that the proxy chains are now activated. And the rotation of the dynamic proxy change is in progress. It's going to take a little while for this site to actually load up because we are using dynamic proxies. So my request is going through a number of proxies before it actually is able to return the webpage to me.

We now need to do a couple of things. First, we need to check to see What my IP address is, and then we need to check for DNS leaks. So what we're going to do now is we're going to type in check for DNS leaks into the search bar for DuckDuckGo. Now DuckDuckGo is a search engine much like Google, except that Duck Duck go does not log your IP addresses. So you can see that it's actually a great way for you to do your reconnaissance, such as looking up information for a potential target doing who is or whatever. And that information will remain anonymous.

So inside the search bar for my Duck Duck go, I've typed in check DNS leak, I'm gonna go ahead and hit Enter. And just a moment can take me over to the results page, we're going to be using the first result here, which is DNS leak test. I'm gonna go ahead and click on that. And it's going to take me out and it's going to show me my location and my new IP address. According to the results of the DNS leak test, I'm actually being seen as being located in the Netherlands with an IP address of 77247 dot 181 dot 165. In reality, I'm actually in the Philippines.

So that part of the anonymity is actually working. We're now going to do a standard test to see if I have any DNS leak. The DNS leak portion of this test shows that my DNS servers are currently located in Germany, not in the Philippines. So we do have complete anonymity. Now, we can go ahead and do one more test to ensure that this is actually working. To do this, I'm going to go ahead and close out my browser.

I'm gonna go back over here to my prom. And notice that the proxy chain has stopped working once I close out the browser. I'm not going to do a restart from my Tor service and then we'll run through the process of checking for my anonymity one more time. So at the prompt of my terminal, I've typed in service space tour space, restart, and then hit enter. Notice that it comes back to the prompt letting me know that my command completed successfully. I'm now ready to go on back out to duck duck go calm using my proxy change.

So I'm going to go ahead and use my up arrow bringing that command back up and we're going to launch my Firefox browser one more time. As before I type in checked DNS leak up inside of the search bar from my DuckDuckGo site. I'm gonna go ahead and hit enter. On the next page, I'm going to go ahead and launch the result for DNS leak test. And this time I'm being seen from Canada with an IP address of 4562 236 62. Again, we'll go ahead and do the DNS leak test by clicking on the standard test button.

And again, I am shown as using a number of different DNS servers located over in Germany. In this short video presentation, you got to see how we can use Tor and proxy chains to hide our current IP address and our location from prying eyes. Now, the tourists Service, takes our requests and encrypts that data and routes it through the Tor network. And then we can use proxy chains to jump from one proxy server to another hiding our current location and our IP address. The caveat to all of this is that there's no way to ensure 100% anonymity. While you're on the internet.

This method of using Tor and proxy chains is probably as close as we can come right now. And there may be other methods to help ensure that you remain anonymous, but the 100% rules will still apply. If you have any questions or concerns about the content of this short video presentation, please do not hesitate to reach out and contact your instructor and I'll see you in my next video.

Sign Up


Share with friends, get 20% off
Invite your friends to LearnDesk learning marketplace. For each purchase they make, you get 20% off (upto $10) on your next purchase.