tools:tor
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
tools:tor [2024/10/01 02:04] – AspHunter | tools:tor [2024/10/01 03:30] (current) – AspHunter | ||
---|---|---|---|
Line 1: | Line 1: | ||
====== Tor ====== | ====== Tor ====== | ||
- | **Tor** //(short for **"The Onion Router" | + | **Tor** //(short for **"The Onion Router" |
- | 1. How to setup your own Linux computer to host your own (dot)onion | + | Tor is most often used to anonymously browse the web, somewhat similarly to a [[security: |
- | 2. How to use Tor to connect | + | |
- | Then at the end of this paper we will look at the security risks of using tor. | ||
- | First and foremost tor is a service. It can be installed and ran on: Linux, UNIX, apple OS, and even Windows. It provides | + | ===== Browsing |
- | This lesson will briefly cover the aspects of using tor and python3 | + | [[https:// |
- | Open a terminal | + | Tor Browser works by establishing randomized links to **entry, middle |
- | mkdir my_tor | ||
- | Now change directories into that folder. | + | ==== Testing Your Connection ==== |
- | cd my_tor | + | First open your regular browser window and go to [[https:// |
- | Because I am using python3 as my web server, now is the time I will launch it. | ||
- | python3 -m http.server –bind 127.0.0.1 8080 | + | ==== How It Works ==== |
- | Now open open a new terminal in the same folder. | + | When you visit [[https:// |
- | The first thing we need to do is create an index file for our onion website. This paper will use nano but you can use any cmd line text editor that you like | + | It then forwards the data onto a middle node which only acts a relay between nodes. It doesn’t know the final destination nor does it know where the data came from. It only knows the entry node and the exit node. This is vital for making sure you stay anonymous. The Middle node or relay, only moves your encrypted data back and forth between entry and exit nodes. |
- | nano index.html | + | When the exit node gets your data from the middle relay, it decrypts the URL that you are wanting to go to and forwards just that information onto a DNS server which sends back the webpage you are looking for. This then enters the exit node, is encrypted and sent through the middle relay, which in turn moves the data back to the entry node and then to you. |
- | Once that is open type the following: | ||
- | < | + | ===== Hosting Your Own .onion Website ===== |
- | Now save and close your file. | + | This lesson will briefly cover the aspects of using Tor and Python 3 to host your own site. |
- | It’s time to test. Open your browser | + | In your [[tools: |
- | Next we need to configure Tor. Change directories to /etc/tor | + | |
- | cd /etc/tor | + | mkdir my_tor |
+ | | ||
- | now | + | Because I am using Python 3 as my web server, |
- | ls | + | python3 -m http.server –bind 127.0.0.1 8080 |
- | You will see a file called torrc. Open it with your favorite editor | + | Now open open a new terminal in the same folder. |
- | nano torrc | + | The first thing we need to do is create an index file for our onion website. In this lesson we will use nano, but you can use any text editor that you like. |
- | Once the file is open you need to scroll down to the section that says “This section is just for location-hidden services” | + | nano index.html |
- | Uncomment | + | Once that is open type the following: |
- | Next start tor with the following command. | + | < |
- | sudo tor | + | Now save and close your file. |
- | Open another terminal | + | It’s time to test. Open your browser |
- | Sudo su | + | Next we need to configure Tor. Change directories to ''/ |
- | now navigate to | + | |
- | cd /var/lib/tor/ | + | ls |
- | and type | + | You will see a file called '' |
- | ls | + | nano torrc |
- | you will see a file there called hostname. | + | Once the file is open you need to scroll down to the section that says //“This section is just for location-hidden services."// |
- | You can either use your favorite editor to open it and see your hostname or you can cat the file. | + | Next, start Tor with the following command: |
- | Cat hostname | + | sudo tor |
- | you will get an output like this s2zybriihvvjq4g55ckgfpdjwh2or3gg7dfosdz3sd4hrt5hvd5g2eqd.onion | + | Open another terminal and become super user, navigate to the '' |
- | Open your favorite | + | sudo su |
+ | cd /var/lib/tor/ | ||
+ | ls | ||
+ | You will see a file there called '' | ||
- | You now have a working website that is on the dark web. | + | cat hostname |
- | type exit in the terminal and exit from being root | + | You will get an output like this: '' |
+ | Open your favorite Tor browser and paste that address in and you will see your own website. You now have a working website that is on the dark web. Type '' | ||
- | Lesson 2 | ||
- | TOR Browser or The Onion Router browser is a Mozilla based browser that is able to navigate both the dark web and the clear-net. For instance if you were to put the address (s2zybriihvvjq4g55ckgfpdjwh2or3gg7dfosdz3sd4hrt5hvd5g2eqd.onion) for our Tor website into Google Chrome, MS Edge or Firefox, you would get a 404 error returned back as none of those browsers can navigate the dark web with out addons. | + | ===== Security Caveats ===== |
- | TOR Browser works by establishing randomized links to entry, middle | + | It is very important |
- | First open your regular browser window | + | Since entry nodes know your IP and exit nodes know where you’re going, your movements can be tracked if you get an entry and exit node run by someone harvesting data. This means it is a very good idea to [[https://www.independent.co.uk/ |
- | So what is going on here? | + | {{tag> |
- | When you put in your domain name www.dnsleaktest.com into TOR all of your information is encrypted and sent to the entry node. | ||
- | |||
- | The Entry node only sees the ip that you are coming from. The rest of the information that you send along with that remains encrypted. It then forwards the data onto a middle node which only acts a relay between nodes. It doesn’t know the final destination nor does it know where the data came from. It only knows the entry node and the exit node. This is vital for making sure you stay anonymous. The Middle node or relay, only moves your encrypted data back and forth between entry and exit nodes. When the exit node gets your data from the middle relay, it decrypts the URL that you are wanting to go to and forwards just that information onto a dns server which sends back the webpage you are looking for. This then enters the exit node, is encrypted and sent to the middle relay which moves the data to the entry node and then back to you. | ||
- | |||
- | Finally | ||
- | |||
- | It is very important to know that this is not the most secure way of moving data. While highly anonymous you can be tracked by users running their own entry and exit nodes. It is very important to note that Google… Amazon and most major ISPs all run exit nodes (https:// | ||
- | |||
- | {{tag> |
tools/tor.1727748297.txt.gz · Last modified: 2024/10/01 02:04 by AspHunter
Find this page online at: https://bestpoint.institute/tools/tor
Find this page online at: https://bestpoint.institute/tools/tor