I hear some of you shouting in the back, why would you do that, just use the TOR browser. Erm, yeah, sure, but what about the rest of the traffic your machine generates? Where does that go, dev/null?
Let’s go through the super easy to use tool that will route all of your traffic through TOR.
What is TOR (refresher)
Here’s what TOR does for your traffic in a super-simple illustration:
For an in-depth TOR explanation check the official site: https://2019.www.torproject.org/docs/documentation.html.en
Suggested book (affiliate link): Deep Web: The Hunt For Dread Pirate Roberts
Step 1. Have a Kali Linux machine
Yeah, I know, boooo. But wait, I’m currently working on a script that should allow you to do the same in Ubuntu. So, if you’re not Kali-ing at the moment, check back here for an update on that project. Sorry folks.
Step 2. Have a keyboard
Step 3. PIP (Python magic sauce)
The package requires Python 2.7, grab that if don’t have it already.
Get PIP installed (what is PIP: https://pypi.org/project/pip/)
sudo apt install python-pip
Step 4. Grab the git (not all of it obviously)
Git clone this: https://github.com/SusmithKrishnan/torghost
git clone https://github.com/SusmithKrishnan/torghost.git
Step 5. Granting executable permissions
Go inside the directory by running:
Grant the permissions
chmod +x install.sh
Step 6. Install the ghost
And you’re done, here’s what can be seen in the terminal, once you run
torghost start to start a new session. The script will wrap your traffic tightly and will keep it nice and warm in an onion formation.
Current IP is your new wrapped IP address, meaning the one that’s exiting the router
Current IP is the exit node
That’s it, super simple stuff, but it keeps you protected when you’re going about your legal pen-tests (remember, always get permission!)
Keep an eye out for the Ubuntu script, that’s in the makings.