Jump to content

Used as a TOR type router?


AArch64

Recommended Posts

On 10/21/2017 at 7:16 PM, Darren Kitchen said:

Absolutely. Seb and I will soon be hosting a live payload hackathon and it's one of the top on my list to write. Should be pretty straight forward. 

Ooh do keep us up-to-date on this.. Would love to join 

 

Link to comment
Share on other sites

On 10/21/2017 at 7:16 PM, Darren Kitchen said:

Absolutely. Seb and I will soon be hosting a live payload hackathon and it's one of the top on my list to write. Should be pretty straight forward. 

Would it be in CA or could some of us participate virtually? 

Link to comment
Share on other sites

On 10/22/2017 at 10:16 AM, Darren Kitchen said:

Absolutely. Seb and I will soon be hosting a live payload hackathon and it's one of the top on my list to write. Should be pretty straight forward. 

4 hours ago, Foxtrot said:

Highly likely that it will be live.

I would think so, based on what Darren has said.

Link to comment
Share on other sites

2 hours ago, Sebkinne said:

It will be live-streamed and we will be taking questions. We might even have people be able to join in on the call.

So, by a live-streamed 'hackathon', do you mean live-streaming you guys creating payloads and working on projects while answering questions?

Link to comment
Share on other sites

On 10/21/2017 at 1:04 PM, AArch64 said:

I saw that this could be used as a hardware based VPN, could it be used as a hardware based TOR transparent proxy?

works for me did the following:

arming mode (switch 4)

opkg install tor

vi /etc/tor/torrc (proxy + hidden ssh service)

Quote

SOCKSPort 172.16.32.1:9050

SOCKSPolicy accept 172.16.32.0/24

Log notice file /mnt/tor/notices.log
Log debug file /mnt/tor/debug.log

RunAsDaemon 1

DataDirectory /var/lib/tor

HiddenServiceDir /mnt/tor/hidden_service/
HiddenServicePort 22 127.0.0.1:22

User tor

vi /root/payloads/switch1/payload.sh

Quote

#!/bin/bash
# tor payload copied from tcpdump

function finish() {
    sync

    # Indicate successful shutdown
    LED R SUCCESS
    sleep 1

    # Halt the system
    LED OFF
    halt
}

function run() {
    # Set networking to TRANSPARENT mode and wait five seconds
    NETMODE NAT
    sleep 5
    
    /etc/init.d/sshd start
    /etc/init.d/tor start

    # Wait for button to be pressed (disable button LED)
    NO_LED=true BUTTON
    finish
}


# This payload will only run if we have USB storage
[[ ! -f /mnt/NO_MOUNT ]] && {
    LED ATTACK
    run &
} || {
    LED FAIL

 

 

 

move to switch1, reboot and you got tor as a proxy and hidden service on 172.16.32.1

Link to comment
Share on other sites

Archived

This topic is now archived and is closed to further replies.

  • Recently Browsing   0 members

    • No registered users viewing this page.
×
×
  • Create New...