tools:tor
Differences
This shows you the differences between two versions of the page.
Next revision | Previous revision | ||
tools:tor [2024/09/25 01:24] – created Humphrey Boa-Gart | tools:tor [2024/10/01 03:30] (current) – AspHunter | ||
---|---|---|---|
Line 1: | Line 1: | ||
- | {{wst> | ||
- | |||
====== Tor ====== | ====== Tor ====== | ||
+ | **Tor** //(short for **"The Onion Router" | ||
+ | |||
+ | Tor is most often used to anonymously browse the web, somewhat similarly to a [[security: | ||
+ | |||
+ | |||
+ | ===== Browsing the Web with Tor ===== | ||
+ | |||
+ | [[https:// | ||
+ | |||
+ | Tor Browser works by establishing randomized links to **entry, middle and exit nodes** for the clearnet. When you first open Tor it will randomly connect to these. You can always reconnect and grab new nodes. | ||
+ | |||
+ | |||
+ | ==== Testing Your Connection ==== | ||
+ | |||
+ | First open your regular browser window and go to [[https:// | ||
+ | |||
+ | |||
+ | ==== How It Works ==== | ||
+ | |||
+ | When you visit [[https:// | ||
+ | |||
+ | It then forwards the data onto a middle node which only acts a relay between nodes. It doesn’t know the final destination nor does it know where the data came from. It only knows the entry node and the exit node. This is vital for making sure you stay anonymous. The Middle node or relay, only moves your encrypted data back and forth between entry and exit nodes. | ||
+ | |||
+ | When the exit node gets your data from the middle relay, it decrypts the URL that you are wanting to go to and forwards just that information onto a DNS server which sends back the webpage you are looking for. This then enters the exit node, is encrypted and sent through the middle relay, which in turn moves the data back to the entry node and then to you. | ||
+ | |||
+ | |||
+ | ===== Hosting Your Own .onion Website ===== | ||
+ | |||
+ | This lesson will briefly cover the aspects of using Tor and Python 3 to host your own site. | ||
+ | |||
+ | In your [[tools: | ||
+ | |||
+ | mkdir my_tor | ||
+ | cd my_tor | ||
+ | |||
+ | Because I am using Python 3 as my web server, now is the time I will launch it: | ||
+ | |||
+ | python3 -m http.server –bind 127.0.0.1 8080 | ||
+ | |||
+ | Now open open a new terminal in the same folder. | ||
+ | |||
+ | The first thing we need to do is create an index file for our onion website. In this lesson we will use nano, but you can use any text editor that you like. | ||
+ | |||
+ | nano index.html | ||
+ | |||
+ | Once that is open type the following: | ||
+ | |||
+ | < | ||
+ | |||
+ | Now save and close your file. | ||
+ | |||
+ | It’s time to test. Open your browser and visit **localhost: | ||
+ | |||
+ | Next we need to configure Tor. Change directories to ''/ | ||
+ | |||
+ | cd /etc/tor | ||
+ | ls | ||
+ | |||
+ | You will see a file called '' | ||
+ | |||
+ | nano torrc | ||
+ | |||
+ | Once the file is open you need to scroll down to the section that says //“This section is just for location-hidden services."// | ||
+ | |||
+ | Next, start Tor with the following command: | ||
+ | |||
+ | sudo tor | ||
+ | |||
+ | Open another terminal and become super user, navigate to the '' | ||
+ | |||
+ | sudo su | ||
+ | cd / | ||
+ | ls | ||
+ | |||
+ | You will see a file there called '' | ||
+ | |||
+ | cat hostname | ||
+ | |||
+ | You will get an output like this: '' | ||
+ | |||
+ | Open your favorite Tor browser and paste that address in and you will see your own website. You now have a working website that is on the dark web. Type '' | ||
+ | |||
+ | |||
+ | ===== Security Caveats ===== | ||
+ | |||
+ | It is very important to know that this is not the most secure way of moving data. While highly anonymous, you can still be tracked by users running their own entry and exit nodes. **It is very important to note that Google, Amazon, most major ISPs, various US federal & law enforcement agencies, and many other governments as well, all run a sizable amount of the entry and exit nodes on Tor.** For more information, | ||
+ | |||
+ | Since entry nodes know your IP and exit nodes know where you’re going, your movements can be tracked if you get an entry and exit node run by someone harvesting data. This means it is a very good idea to [[https:// | ||
+ | |||
+ | |||
+ | {{tag> | ||
- | {{tag> |
tools/tor.1727227473.txt.gz · Last modified: 2024/09/25 01:24 by Humphrey Boa-Gart
Find this page online at: https://bestpoint.institute/tools/tor
Find this page online at: https://bestpoint.institute/tools/tor