Page 1 of 2 12 LastLast
Results 1 to 10 of 15

Thread: Configuring tor in BackTrack 4

Hybrid View

  1. #1
    Senior Member
    Join Date
    Feb 2009
    Posts
    153

    Default Configuring tor in BackTrack 4

    I found this Googling one day and felt like i should share this to the Remote-Exploit community. This is a great program to add to your OS. If moderators feel like this is unappropriate for the forums, you can remove

    So you’ve been checking out BackTrack 4, and you want to get your anonymity on? This is assuming you have either installed BT4 to your hard drive or you’re using the VMWare version. You can do this on a LiveCD too of course, but your changes won’t stay unless you do some fancy lzm voodoo and burn a new copy of your CD.

    First, you need to add noreply.org repositories to your sources.list. These are the official tor repositories for debian-based Linux distrobutions. Open up a terminal and type:

    Code:
    nano /etc/apt/sources.list
    At the bottom of this file, add these two lines:

    Code:
    deb     http://mirror.noreply.org/pub/tor intrepid main
    deb-src http://mirror.noreply.org/pub/tor intrepid main
    Save the file. Now download the gpg key, and check the fingerprint:

    Code:
    gpg --keyserver subkeys.pgp.net --recv 94C09C7F
    gpg --fingerprint 94C09C7F
    The fingerprint should look like this:

    Code:
    pub   1024D/94C09C7F 1999-11-10
    Key fingerprint = 5B00 C96D 5D54 AEE1 206B  AF84 DE7A AF6E 94C0 9C7F
    uid                  Peter Palfrader
    uid                  Peter Palfrader <weasel@debian.org>
    uid                  Peter Palfrader <peter@palfrader.org>
    uid                  Peter Palfrader <ppalfrad@cosy.sbg.ac.at>
    uid                  [jpeg image of size 7974]
    sub   1024D/AFA44BDD 2003-07-09 [expires: 2010-07-18]
    sub   2048g/E8F4A328 2003-07-09 [expires: 2010-07-18]
    Then add it to your apt-key ring by doing this:

    Code:
    gpg --export 94C09C7F | sudo apt-key add -
    Now update your sources, and install tor and privoxy.

    Code:
    apt-get update
    apt-get install tor privoxy
    When this is done you’ll need to change a couple of privoxy settings. In a terminal, edit the privoxy config file:

    Code:
    nano /etc/privoxy/config
    Add this line to the top (including the period at the end):

    Code:
    forward-socks4a / 127.0.0.1:9050 .
    Now we need to disable logs. Find the line “logfile logfile” and add a # at the beginning to comment it out (tou can search a file in nano with ctrl-W). You may want to search file the line “jarfile jarfile” and make sure that’s commented out too, but it already is for me. Now exit nano and restart the privoxy service:

    Code:
    /etc/init.d/privoxy restart
    Now head on over to the Torbutton Firefox addon page <https://addons.mozilla.org/en-US/firefox/addon/2275>, install Torbutton, and restart Firefox.

    Now head over to the tor detection page <https://check.torproject.org/>. It should tell you that you’re not using tor. Click the tor button in the bottom right corner of Firefox, accept the sad fact that you might leak time zone data, and then press enter in the address bar to reload the page. Note that you can’t just hit refresh, because you need to make sure firefox is opening a new socket it check.torproject.org. If all is well, you see the bright green notice “Congratulations. You are using Tor.”

    Go forth and be anonymous.

  2. #2
    My life is this forum Barry's Avatar
    Join Date
    Jan 2010
    Posts
    3,817

    Default

    Tor is useless.
    Of course, if you really wanted to have some fun, go to Wal-Mart late at night and ask the greeter if they could help you find trashbags, roll of carpet, rope, quicklime, clorox and a shovel. See if they give you any strange looks. --Streaker69

  3. #3
    Member imported_vvpalin's Avatar
    Join Date
    Apr 2009
    Posts
    442

    Default

    Quote Originally Posted by Barry View Post
    Tor is useless.
    unless your running an exit node and sniffing all the data lol

    thanks for the tut tho
    Using backtrack for the first time is like being 10 years old again with the keys to a Ferrari.

  4. #4
    Senior Member streaker69's Avatar
    Join Date
    Jan 2010
    Location
    Virginville, BlueBall, Bird In Hand, Intercourse, Paradise, PA
    Posts
    3,535

    Default

    Quote Originally Posted by vvpalin View Post
    unless your running an exit node and sniffing all the data lol

    thanks for the tut tho
    The real question is, do YOU know who's running the exit node?

    Let's consider who could be running exit nodes:

    Russian Mafia
    The Yakuza
    Chinese Government
    US Government
    Antarctic Penguins 4eva Hacking Group
    Cellerdwellers

    Yep, Tor is a great solution for anonymity.
    A third party security audit is the IT equivalent of a colonoscopy. It's long, intrusive, very uncomfortable, and when it's done, you'll have seen things you really didn't want to see, and you'll never forget that you've had one.

  5. #5
    My life is this forum Barry's Avatar
    Join Date
    Jan 2010
    Posts
    3,817

    Default

    Quote Originally Posted by streaker69 View Post
    The real question is, do YOU know who's running the exit node?

    Let's consider who could be running exit nodes:

    Russian Mafia
    The Yakuza
    Chinese Government
    US Government
    Antarctic Penguins 4eva Hacking Group
    Cellerdwellers

    Yep, Tor is a great solution for anonymity.

    Isn't your computer room in the basement??
    Of course, if you really wanted to have some fun, go to Wal-Mart late at night and ask the greeter if they could help you find trashbags, roll of carpet, rope, quicklime, clorox and a shovel. See if they give you any strange looks. --Streaker69

  6. #6
    Senior Member streaker69's Avatar
    Join Date
    Jan 2010
    Location
    Virginville, BlueBall, Bird In Hand, Intercourse, Paradise, PA
    Posts
    3,535

    Default

    Quote Originally Posted by Barry View Post
    Isn't your computer room in the basement??
    Servers are there, but I'm not. Entire house including the garage is Wireless.
    A third party security audit is the IT equivalent of a colonoscopy. It's long, intrusive, very uncomfortable, and when it's done, you'll have seen things you really didn't want to see, and you'll never forget that you've had one.

  7. #7
    Super Moderator Archangel-Amael's Avatar
    Join Date
    Jan 2010
    Location
    Somewhere
    Posts
    8,012

    Default

    Quote Originally Posted by streaker69 View Post
    Let's consider who could be running exit nodes:
    US Government
    Doesn't theprez98 have something about the US Government not doing that sort of thing?
    To be successful here you should read all of the following.
    ForumRules
    ForumFAQ
    If you are new to Back|Track
    Back|Track Wiki
    Failure to do so will probably get your threads deleted or worse.

  8. #8
    Just burned his ISO Michaetito's Avatar
    Join Date
    Oct 2008
    Posts
    24

    Default

    Anyway if somebody is willing use Tor i thing he should be using Tork GUI. It has nice features like anonymous email, etc.

  9. #9
    Just burned his ISO
    Join Date
    Apr 2009
    Posts
    22

    Question

    Quote Originally Posted by Barry View Post
    Tor is useless.
    So what would the gods suggest?
    Beware the fury of a patient man.

  10. #10
    Just burned his ISO
    Join Date
    May 2009
    Posts
    23

    Default

    what is this tool use for ?

Page 1 of 2 12 LastLast

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •