Jump to content

Search the Community

Showing results for tags 'TOR'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


  • Talk
    • Everything Else
    • Gaming
    • Questions
    • Business and Enterprise IT
    • Security
    • Hacks & Mods
    • Applications & Coding
    • Trading Post
  • Hak5 Gear
    • Hak5 Cloud C²
    • New USB Rubber Ducky
    • WiFi Pineapple
    • Bash Bunny
    • Key Croc
    • Packet Squirrel
    • Shark Jack
    • Signal Owl
    • LAN Turtle
    • Screen Crab
    • Plunder Bug
    • WiFi Coconut
  • O.MG (Mischief Gadgets)
    • O.MG Cable
    • O.MG DemonSeed EDU
  • Legacy Devices
    • Classic USB Rubber Ducky
    • WiFi Pineapple TETRA
    • WiFi Pineapple NANO
    • WiFi Pineapple Mark V
    • WiFi Pineapple Mark IV
    • Pineapple Modules
    • WiFi Pineapples Mark I, II, III
  • Hak5 Shows
  • Community
    • Forums and Wiki
    • #Hak5
  • Projects
    • SDR - Software Defined Radio
    • Community Projects
    • Interceptor
    • USB Hacks
    • USB Multipass
    • Pandora Timeshifting

Find results in...

Find results that contain...

Date Created

  • Start


Last Updated

  • Start


Filter by number of...


  • Start





Website URL







Enter a five letter word.

Found 11 results

  1. Hi Everybody, I hope this topic is the good one for my problem… I use a raspberry Pi 3B as small wireless router : 1. 'eth0' interface is using 'dhcpcd' for the WAN connection; 2. 'wlan0' interface is running with 'hostapd' and 'dnsmasq' as a hotspot; 3. the rule 'iptables -t nat -A POSTROUTING -o eth0 -j MASQUERADE' allows routing… Everything is ok, but not secure… Next step: I want to use Tor as a tunnel and change the routing rule as 'iptables -t nat -A POSTROUTING -o tun0 -j MASQUERADE'… root@raspberry:~# apt-get update […] root@raspberry:~# apt-get upgrade […] root@raspberry:~# apt-get install tor […] root@raspberry:~# ps xa […] 1064 ? Ss 0:06 /usr/bin/tor --defaults-torrc /usr/share/tor/tor-service-defaults-torrc -f /etc/tor/torrc --RunAsDaemon 0 […] root@raspberry:~# Tor is running… The 'ifconfig' command shows 'eth0', 'lo' and 'wlan0' interfaces but there is no 'tun0' interface on my RPI! I think, Tor is not using a 'tun0' interface because it is not a daemon (client mode) with the option "--Run AsDaemon 0". root@raspberry:~# cat /usr/share/tor/tor-service-defaults-torrc DataDirectory /var/lib/tor PidFile /run/tor/tor.pid RunAsDaemon 1 User debian-tor ControlSocket /run/tor/control GroupWritable RelaxDirModeCheck ControlSocketsGroupWritable 1 SocksPort unix:/run/tor/socks WorldWritable SocksPort 9050 CookieAuthentication 1 CookieAuthFileGroupReadable 1 CookieAuthFile /run/tor/control.authcookie Log notice syslog root@raspberry:~# grep ^[^#] /etc/tor/torrc root@raspberry:~# As all lines in the the '/etc/tor/torrc' are commented, I have uncommented the 'RunAsDaemon 1' line. 
After Tor restarts, nothing has changed : root@raspberry:~# ps xa […] 3223 ? Ss 0:12 /usr/bin/tor --defaults-torrc /usr/share/tor/tor-service-defaults-torrc -f /etc/tor/torrc --RunAsDaemon 0 […] root@raspberry:~# I can't understand where this '--RunAsDaemon 0' is coming from! 
I have not found any information about that, neither on raspbian site, nor on torproject site. Have you an idea?
 Something to read? Regards, Éd. D.
  2. Hey everyone I'm from Argentina. I have a problem, I learn through youtube tutorial or some forums thinks like crack wifi, backdoors, phishing and more but I can't do the next step. In thinks like backdoor avoiding windows defender in windows 10 or somethings like that. I can't find new things to improve my skills (I think that there are tutorial but with old methods and for one reason I don't know why there aren't more as in the past) and I don't know where I have to search. Should I search in Tor forums ? Which ? Please if you reply this help me and not said "learn for yourself" remember everybody have been a noob once time. I'm just asking for where can I learn Thank u
  3. Hi guys, I have read many articles claiming that several Browser types are suited for Kali Linux, but which one do you use and why? Here is a short list of the (apparently) most popular: Tor Browser; QupZilla; Midori; NetSurf; Rekonq; Pale Moon; Firefox ESR, Chromium; and DuckDuckGo!
  4. Having some troubles finding up to date and working onion links. If you could share the links you’ve found that work please share :)
  5. ukdude13

    VPN to Tor

    Hi, I haven't posted in a while, but i've always found the people on this forum to be very helpful and supportive. I have an OpenVpn server which also has Tor installed. I am wondering, just for curiosity purposes is there any way to route all the traffic coming to the server through the VPN over Tor so it would look like this Client ---> OpenVpn Server -----> Tor ------> internet. I assume this is possible but im only just learning about ip routes so was looking for a bit of guidance. If anyone could help that would be great. I've found a few similar things on other forums but im not sure they are achieving exactly what i want, and i don't understand the routing commands enough to change it to suit my needs. Many Thanks David
  6. i am setting up a computer dedicated as a learning resource and tool. People get caught out by stating without security from the beginning. There are also setting in tor that secure you even further but im not sure on what that is, i remember hearing about it in a defcon video. But basically this post is just asking how i can keep myself safe on the dark web and learning and using these resources to work my way into becoming an intelligence worker for my county. All help is greatly appreciated. Thank you
  7. hello reader, i am trying to follow the link here below to make a portable tor/vpn router-ish. so far i have been able to get to the 4th and 5ft step. for some reason (pretty sure it has to be the drivers because at 1 point you can download a file for drivers-ish) it wil not send anything receive anything, i am thinking it is because of the driver file. i have tried looking into the files but its not making sense to me since im a noob to it i am using 2 Alfa Network USB card AWUS036H. and i am using a rpi 3 is there anyone who can help me or can tell me what i am doing wrong? http://makezine.com/projects/browse-anonymously-with-a-diy-raspberry-pi-vpntor-router/ im sorry if i am not aloud to post links from competitive sites (because im not sure if this is one)
  8. Dear Hak5ers, Apologies if this has been discussed, I only went a few pages in to see. So what I'm goofing with is the whole isolation proxy thing, using whonix-gateway in a VM (couldn't build successfully on my extra physical box). I followed the basic guide provided by them just to get er up and running. I'm a vmware man myself, but some extra work involved so went with the suggest virtualbox. So the guide suggest the following (actually a mix of two) vm #1 - the Whonix gateway. It has 2 NIC's : one is NAT so we can reach out on the net to TOR, second is an internal (called whonix) running on by default vm#2 - kali (not whonix-workstation) with one NIC (the internal one called whonix) running on So what's my beef? Well, a lot works in terms of tunneling everything through the whonix gateway, which is essentially the goold ole' "how to route everything through tor" debate. But the one item I'm trying to tinker with is getting metasploit to behave. Which it doesn't by default. What happens is (bear in mind this is through Armitage) regardless of the IP(s) you enter for testing, they all A) basically say every bloody port is open, and B) just to get things moving, I used a known vulnerable VM to see how exploits got handled in all this routing. Well, not to smooth. Basically they EOF over and over, so you'll see the box pop (turn red and lightning) then just die (End of File). Before I start pulling hair and messing with routing tables, and most importantly, mucking the whonix gateway which I shouldn't really touch to mouch, wanted to run this scenario buy you guys. See if anyone has tried this out, worked/not worked etc etc. Would love to work this one out with some discussion. Thoughts?
  9. So I have had the issue recently of wanting TOR on all my computers in the home... 5 computers later I realized not all programs utilized TOR for the internet connection such as program updates etc. I would like everything via TOR. Then I had a hell of a time trying to figure out how to rout EVERYTHING through TOR. Then It hit me. A dedicated TOR router. Idea: I have an extra desktop. Two network cards and a base knowledge of Linux, you guys, and Google. Then I hit a snag. I'm not actually sure how to do this and I'm not sure where to start my research. I would like to turn this computer into a dedicated router and firewall. The firewall will be for another day and I don't see an issue getting that going. I would like all traffic to come into eth0 -> TOR -> eth1 -> Internet- on TOR network Please correct me but I was thinking of setting my other computers default gateway to the router. Then I had no idea what to do from there. Any help or ideas would be greatly appreciated!!!
  10. Well i just recently got back into using tor and it had been working fairly well for me (with the usual bothersome slowness). Now whenever i try to connect to a specific website (apparently not down) and login it tells me that it timed out, howevver this seems to be the only webiste that it does it for. Any suggestions or ideas would be muchly appreciated! Or if anyone has had a similar experience! (yes I've done all the usual crud to try and fix it including reinstalling, restarting my computer, restarting the router, using a different wifi etc.)
  11. First let me introduce myself, I am known by unixmito (fork() anyone?). I have both an intellectual and professional interest in programming, networking, auditing, etc. Recently, I purchased the Mark IV, and am waiting to receive it today. In lieu of the 4-6 hours I will have to wait for it to arrive I'm doing a variety of research ahead of time. First question: Second Question: Third question: I appreciate those that have gone through and read this entire post. I only resort to such a long winded approach since using the search function doesn't produce any results for: "solar panels," "solar," "entropy," "fuzzing," or "TOR." Bibliography http://www.math.uni-...ropy/algor.html (Descriptiona Entropy in Logicl) https://blog.torproj...ne-cell-enough/ (One node enough to break TOR) http://docencia.izt..../miscelanea.pdf (Quantified Harmonic Wave Theory)
  • Create New...