tools:tor
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
tools:tor [2024/10/01 02:28] – AspHunter | tools:tor [2024/10/01 03:30] (current) – AspHunter | ||
---|---|---|---|
Line 1: | Line 1: | ||
====== Tor ====== | ====== Tor ====== | ||
- | **Tor** //(short for **"The Onion Router" | + | **Tor** //(short for **"The Onion Router" |
+ | Tor is most often used to anonymously browse the web, somewhat similarly to a [[security: | ||
- | In this article we will cover 2 lessons in onion routing: | ||
- | |||
- | 1. How to setup your own Linux computer to host your own (dot)onion website. | ||
- | 2. How to use Tor to connect to world wide web. | ||
- | |||
- | Then at the end of this paper we will look at the security risks of using tor. | ||
- | |||
- | First and foremost tor is a service. It can be installed and ran on: Linux, UNIX, apple OS, and even Windows. It provides the ability to anonymously run your own private website with an onion address that only people who use a tor browser can reach. You don’t even have to pay for a domain name. If you wanted to set up your own privately hosted website that is not on the clearnet, you would use tor and your favorite web server like Apache, nginx or even python 3. | ||
===== Browsing the Web with Tor ===== | ===== Browsing the Web with Tor ===== | ||
- | **Tor Browser** is a Mozilla based browser that is able to navigate both the dark web and the clearnet. For instance if you were to put the address //(ie: s2zybriihvvjq4g55ckgfpdjwh2or3gg7dfosdz3sd4hrt5hvd5g2eqd.onion)// for our Tor website | + | [[https:// |
Tor Browser works by establishing randomized links to **entry, middle and exit nodes** for the clearnet. When you first open Tor it will randomly connect to these. You can always reconnect and grab new nodes. | Tor Browser works by establishing randomized links to **entry, middle and exit nodes** for the clearnet. When you first open Tor it will randomly connect to these. You can always reconnect and grab new nodes. | ||
+ | |||
==== Testing Your Connection ==== | ==== Testing Your Connection ==== | ||
- | First open your regular browser window and go to [[https:// | + | First open your regular browser window and go to [[https:// |
- | == So what is going on here? == | + | |
+ | ==== How It Works ==== | ||
When you visit [[https:// | When you visit [[https:// | ||
Line 29: | Line 24: | ||
It then forwards the data onto a middle node which only acts a relay between nodes. It doesn’t know the final destination nor does it know where the data came from. It only knows the entry node and the exit node. This is vital for making sure you stay anonymous. The Middle node or relay, only moves your encrypted data back and forth between entry and exit nodes. | It then forwards the data onto a middle node which only acts a relay between nodes. It doesn’t know the final destination nor does it know where the data came from. It only knows the entry node and the exit node. This is vital for making sure you stay anonymous. The Middle node or relay, only moves your encrypted data back and forth between entry and exit nodes. | ||
- | When the exit node gets your data from the middle relay, it decrypts the URL that you are wanting to go to and forwards just that information onto a dns server which sends back the webpage you are looking for. This then enters the exit node, is encrypted and sent through the middle relay, which in turn moves the data back to the entry node and then to you. | + | When the exit node gets your data from the middle relay, it decrypts the URL that you are wanting to go to and forwards just that information onto a DNS server which sends back the webpage you are looking for. This then enters the exit node, is encrypted and sent through the middle relay, which in turn moves the data back to the entry node and then to you. |
+ | ===== Hosting Your Own .onion Website ===== | ||
- | This lesson will briefly cover the aspects of using tor and python3 | + | This lesson will briefly cover the aspects of using Tor and Python 3 to host your own site. |
- | Open a terminal | + | In your [[tools: |
- | mkdir my_tor | + | |
+ | cd my_tor | ||
- | Now change directories into that folder. | + | Because I am using Python 3 as my web server, now is the time I will launch it: |
- | cd my_tor | + | python3 -m http.server –bind 127.0.0.1 8080 |
- | Because I am using python3 as my web server, now is the time I will launch it. | + | Now open open a new terminal in the same folder. |
- | python3 -m http.server –bind 127.0.0.1 8080 | + | The first thing we need to do is create an index file for our onion website. In this lesson we will use nano, but you can use any text editor that you like. |
- | Now open open a new terminal in the same folder. | + | |
- | + | ||
- | The first thing we need to do is create an index file for our onion website. This paper will use nano but you can use any cmd line text editor that you like | + | |
- | + | ||
- | nano index.html | + | |
Once that is open type the following: | Once that is open type the following: | ||
- | < | + | |
- | Now save and close your file. | + | Now save and close your file. |
- | It’s time to test. Open your browser and type in localhost: | + | It’s time to test. Open your browser and visit **localhost: |
- | Next we need to configure Tor. Change directories to /etc/tor | + | |
- | cd /etc/tor | + | Next we need to configure Tor. Change directories to '' |
- | now | + | cd /etc/tor |
+ | ls | ||
- | ls | + | You will see a file called '' |
- | You will see a file called | + | nano torrc |
- | nano torrc | + | Once the file is open you need to scroll down to the section that says //“This section is just for location-hidden services."// |
- | Once the file is open you need to scroll down to the section that says “This section is just for location-hidden services” | + | Next, start Tor with the following command: |
- | Uncomment the lines for hiddenservicedir and hiddenserviceport. Change the port address from 80 to 8080 save and close. | + | sudo tor |
- | Next start tor with the following command. | + | Open another terminal and become super user, navigate to the '' |
- | sudo tor | + | |
+ | cd /var/lib/tor/ | ||
+ | ls | ||
- | Open another terminal and become super user. | + | You will see a file there called '' |
- | Sudo su | + | cat hostname |
- | now navigate to | + | You will get an output like this: '' |
- | cd / | + | |
- | and type | + | Open your favorite |
- | + | ||
- | ls | + | |
- | + | ||
- | you will see a file there called hostname. | + | |
- | + | ||
- | You can either use your favorite editor to open it and see your hostname or you can cat the file. | + | |
- | + | ||
- | Cat hostname | + | |
- | + | ||
- | you will get an output like this s2zybriihvvjq4g55ckgfpdjwh2or3gg7dfosdz3sd4hrt5hvd5g2eqd.onion | + | |
- | + | ||
- | Open your favorite | + | |
- | + | ||
- | + | ||
- | You now have a working website that is on the dark web. | + | |
- | + | ||
- | type exit in the terminal | + | |
===== Security Caveats ===== | ===== Security Caveats ===== | ||
- | It is very important to know that this is not the most secure way of moving data. While highly anonymous, you can still be tracked by users running their own entry and exit nodes. **It is very important to note that Google, Amazon, most major ISPs, various US federal & law enforcement agencies, and many other governments as well, all run a sizable amount of the entry and exit nodes on Tor** // | + | It is very important to know that this is not the most secure way of moving data. While highly anonymous, you can still be tracked by users running their own entry and exit nodes. **It is very important to note that Google, Amazon, most major ISPs, various US federal & law enforcement agencies, and many other governments as well, all run a sizable amount of the entry and exit nodes on Tor.** For more information, |
- | Since entry nodes know your IP and exit nodes know where you’re going on the clearnet, if you get an entry and exit node ran by someone harvesting data, your movements can then be tracked. Also Tor is illegal in some countries so make sure it’s legal to use in your area. | + | Since entry nodes know your IP and exit nodes know where you’re going, |
{{tag> | {{tag> | ||
+ |
tools/tor.1727749687.txt.gz · Last modified: 2024/10/01 02:28 by AspHunter
Find this page online at: https://bestpoint.institute/tools/tor
Find this page online at: https://bestpoint.institute/tools/tor