How To Become Invisible Online

Learn this awesome way of how to become invisible online! I’m going to show you how can you actually connect your machine to the Tor network, how to use Tor network, how to install all the tools, and how to configure them. Therefore, you can see how can you develop a script that actually hides your machine in Tor network. In the next video, we’re going to actually see how we can start a Dos attack from that Tor network so we are basically invisible.

How To Become Invisible Online


Here, firstly, to install a few things like the Tor itself, I’m using Kali, but the commands are quite the same. If you’re using Windows distribution with order package manager, please see the menu, the documentations for your package manager. Instead of obligate, use your package manager for example. Now, let’s start. I’m using Kali here. The first thing is to open the terminal since you are going to install anything in compute anything from that exact terminal.
In order to hide your machine in Tor network, you actually need to install a few services, which upon running and probably configuring, they grant you proxies. That proxy server actually granting you invisibility, some kind of invisibility and unlimited in web. Your traffic just routes through some kind of proxy. If you’re not familiar, please go and see the menu in the references of Tor Network. See how it works.


Basically, it’s a network of multiple proxies randomly allocated around the world. When you access a server without that in the network view, when you’re accessing a server, you are actually creating a request sending packets. In our case, we are sending directly packets with the quickest path. When you’re using Tor Network, your packets are not directly transmitted to a server. They are redirected to different machines around the world using uthena’s proxies. Therefore, the last machine, for example, you have three hops in Tor network. The last hop is actually send in your packet to the server you want. Therefore, the route is different when the packet is coming back, but it know where to come from the network. It’s really good for hiding yourself.


It’s really good overall for security in order to know what’s Tor network, how it works. It’s just a bunch of proxies and your traffic is going through them. In order to set up that, we first need to install Tor. In my case, I have to get install Tor. Keep in mind that you might need to run sudo because I am root user here. In my case, it does not really mean if I run sudo or not. If you get an error back permissions, please run sudo. It’s the way how Unix work, so nothing special. Now, enter. Now, it’s going to start. As you can see, 12 megabytes. Click “Yes.” Now, it’s downloading from the repository as we’ve spoken before about how it looks is downloading packaging programs. They have bunch repository and databases. When you type the exact program feature, it’s searching database. If it finds a match, it’s downloaded. It’s installed automatically, so it’s really good and nice.


You can download Tor menu from the Tor website. You can find Tor’s website using some search engines. Now, we are finished. Now, we have to install one more tool, which is actually called privoxy. That too actually allow our machine and the actual terminal session to be actually proxy through that Tor network upon right configuration. Here, I’m going to install that tool, so “apt-get install privoxy.” It’s again going to install. This is the combination of two tools, Tor and privoxy, which allows our machine, our terminal session, and every program that is run without terminal session to be actually connected to Tor to be actually processed with that proxies, and to be actually in that proxy. Therefore, this is how you can hide then use programs safe. Here, now, if we install both tools, but we have to configure both of them in order to actually create the proper proxies, the proper configuration.


The first thing we need to actually edit is the torrc. That file is located in /etc/tor. I’m going to open it with vim, so “vim torrc.” Now, here is a big file. Just worth of information here. Now, you have to actually search for a word called “ControlPort.” When you find that word, just remove the hashtag. Therefore, down below, you have the word “CookieAuthentication 0.” Just remove the hashtag again. Now, this is the only thing you have to do about the Tor.
This is the only configuration we need about Tor. We can just right-click that file. Escape, right-click. Now, we’ve configured the torrc profile and upon logging the service Tor, that profile is going to be worded and actually is going to read all the changes we have made. Now, the next thing we have to wait is actually the privoxy config file, which is actually located in /etc/privoxy.


As you can see, the file is called just config. No extension. Just open it with vim again, so vim and config. Now, here, we have to specify some more options. This is the file itself, which actually explains everything and everything about the configuration. If you want to take a look, you can read the whole file. Now, we are interested in setting up our manual proxy. That can be done by navigating in the very, very bottom of the file. In vim, you press Shift and G. This going to navigate us to the very bottom of the file. Now, press E for Insert. Now, it’s time to type our forward proxies, so “forward-socks5/127.0.0.1 and then specify the port, which is 9050 and then space and dot. We have to do this for all the socks, so socks4 and then the same thing, so 127.0.0.1.9050 and then the dot again. Therefore, “forward-socks4a” and the same thing, “0.0.1.”


Now, this is the only thing we have to edit about our setup. Now, here, we can actually save and close the file. Now, we can actually try and test out our DOS connectivity. Now, in order to connect to Tor network, in order to become actually anonymous online, you have to first start both service, so “service tor start.” Therefore, type “service privoxy start.” Now that both services are started, if you go for the status, you’re going to see that they’re running. Yes, active running. Clear that. Now, we have started the services. Now, we have to set up the proxies about every program that we want. For example, here, if I want my terminal to be actually in Tor network, I need to say that it talks about a terminal of my home machine by the Tor network. I can use the network manager, which I don’t personally like. I’m using to make a terminal scripting where I’m going to show you in the future view.


Now, every program that I want to be inside Tor, I manually export and configure all the proxies for that. You can do it with the network manager, but I personally don’t like that. In my case, it doesn’t really matter. Now, for the actual terminal to become the Tor network, in order to become a part of the Tor network, we have to actually export proxy configuration. You have to export the HTTP, the HTTPS, and SOCKS proxy. When we are using HTTP, we are connected to Tor. Let’s just start by typing “export.” Export some environmental variables to the terminal. Therefore, you can actually configure it. Our terminal environment having own variables, having own programming language. For example, if I type “kj=5,” and therefore, I specified that variable kj. I got five. Okay, so “echo kj, 5.”


As you can see, I can specify variables, I can do forwards, I can do programming to that terminal in that language. Think of it as its own environment with own variables, so clear that. You can run commands and write codes at the same time. Just amazing. Here, I need to export “HTTP_PROXY=127.0.0.1.” Therefore, the port is 1881. Therefore, export “HTTPS_PROXY” equals the same port. Therefore, we have to export the SOCKS one, so “SOCK_PROXY=127.0.0.1.” Now, the port is 9050. The port we’ve configured privoxy is now here and then we type that. Our terminal is now in a Tor’s network. To actually see that, let’s check our IP address to a terminal. If I type, “whatismyip,” I guess different from my IP address, which I’m going to show you now. My IP address has changed because I changed my proxy. Now, my traffic routes to some proxies. If you type, “whatsmyip,” you won’t get any result because this is alias I’ve developed. This is basically covering a specific website. For example, if you go, “curl,” and therefore, specify the website, which was “https://,” if I’m not wrong, “ipinfo.io/ip,” there’s the side I’m not quite sure. Press Enter. Yes, so we get the IP again. Okay. When you go here, “alias whatismyip=”curl https://ipinfo.io/ip.” Now, go, “whatismyip,” and you get the same result.


This will be temporary. When you close the terminal session, that alias is going to fall. If you want to make it permanent, you can just edit the bashrc file, which is located in your home directory. It’s a hidden file, so “.bashrc.” Here, you can type for, “alias–” Oops, sorry, “alias,” and therefore, you can specify as much as you want. Here’s my alias. It’s the same thing, so “alias whatismyip,” equals the command. That command is going to give us our external IP address. This is a quite actually useful and easy thing to do because whenever you need to check your Tor connectivity, to check any other stuff, you just need to actually type, “whatismyip,” go into browser, and type in, “whatismyip.” That’s the point because we need to check if our terminal is in the Tor’s network, not only the browser. Close that actually.
Now, if you actually go and see– This is my external IP now from Tor’s network. Now, if I go and see my external IP from the Firefox, I’m sure that I’m going to get completely different IP address, which is my real one. Here, just wait it to out. Now, type– Come on. Now, type, “whatismyip,” so here, “what is my ip.” Go here. Now, you can see that my IP is different from that we saw in the terminal.


It started with 92. Back in the terminal, it started with– Sorry. Back in the terminal, it started with 109. You see, the IPs are quite different. If I go and actually set up the proxy for Firefox, I would get the exact same IP as my terminal or other IP. This is my real IP. Now, it’s time to actually set up the proxy now with Firefox, so our Firefox has become in Tor’s network again. Here, if I open a new browser and type, “torcheck,” this is a website that actually checks if your browser is connected to Tor, if you’re browsing anonymously, if not. Here, go for TorChecks. As you can see, your IP is not identified to be a Tor-EXIT. We are not allowed using Tor to reach that website and then we have the IP again. This is our real IP. “Probably your Home-IP,” it says.


We have the geolocation, so we are not going to take the Tor for now. Now, we have to open up Preferences. Go down to the bottom and Network Proxy Settings. Now, we have to be in the exact same proxies as we did before. As you can see, I’ve already set up mine, but it’s quite the same thing. HTTP Proxy, get the IP protocols, which is 127.0.0.1 and the Port 8118. Therefore, the SSL proxy, which means HTTPS, the same thing. Therefore, the SOCKS Host. We have the same thing like the same IP, but the port, 9050.When you click Okay, go that page, refresh. Now, you see that we are connected to Tor. You will have your real IP. It’s not that. Your current IP is not that. Now, as you can see, we are connected to Tor. Now, we are browsing anonymous. This is how connected to Tor is working. This is how you can hide yourself, hide your terminal session in actually Tor network.


Now, keep in mind that when you run that script or when you exported variables, you export that variables for only the terminal session itself. If you open a new terminal session, you’re going to get a different IP address. For example, if I open a new terminal session, place it here and type, “whatismyip.” You see I get my real IP address starting with 92. Now, here, I need to actually export that proxies again in order to connect to our Tor’s network. In the future video, I’m going to show you how you can develop yourself a script that hides your terminal session in Tor’s network. This is the basics of how can you connect to Tor’s network, what tools to use, how to configure them. As you can see now, we’ve successfully connected to Tor using that services and using that commands. If you see now, we connected Firefox with the same proxies.


We just need the servers to be running. We just need them to actually be configured to the specified ports and, therefore, just run the services and export that proxies. By defining the proxy in the preferences, we are doing quite the same thing just defining and exporting the proxies to Firefox. When we go for the command export, we do quite the same thing in the terminal. That’s why in the future views, I’m going to use actual script. I’m going to show you how to develop a script to actually run that for you. One more thing I want to say is that every program that is run from here is actually to Tor’s network. Because every program that’s run from the console is actually creating a child process actually from that console. That child process is connected to Tor as well because the console itself is connected to Tor. Every terminal from here, every program from here, every child process you create from the console is actually going to be connected to Tor as well.


This is about today’s video, guys. I really appreciate you for watching and see you in the next video where we’re going to develop a script of basically hiding our machine, hiding our terminal station in basically Tor’s network. Thank you, guys, for watching. I really hope that was useful. This can be used for securing yourself. This can be used for staying anonymous online. These are very much benefits about the tools and techniques I showed you today. I hope it was useful for you and see you in the next video, guys.

A few closing thoughts from Jerry.


Thank you very much for watching this video tutorial. What you’ve just seen is a part of the Pass the Certified Ethical Hacking Exam, CEH Version 10 course that we have on uthena.com. This course has all the rest of the videos that you might love and enjoy related to the one you just saw. Will you please use this link to enroll in the course because I imagine since you finished this video, you will love taking the full course. You can see the full course.


It starts with module one and it’s organized by modules matching the Certified Ethical Hacking Exam exactly by section module 2, Foot printing and Reconnaissance. Section 3, Networks. Section 4, Enumeration. We’ve got module 11. Right now, we’re filming the course. When you take a look at the landing page, we will finish this course and get it up to a full 20 modules for you and include anything else necessary at the end. In addition to just the videos in this course, you’ll also get access to our Facebook group and Discord server where you can ask certified ethical hackers questions and get answers which, that to me, is the best value of the course above and beyond the videos. If you just love learning ethical hacking and you want to always stay up to date and you don’t ever want to have to buy another course again, we’ve got an Ethical Hacking Forever Course Bundle, I imagine, you will love because this one bundle includes six ethical hacking courses.

Currently, over 50 hours of video today in all of these courses. With a forever bundle, you get all of the courses we add to this forever without having to pay again. I intend to make new ethical hacking courses every year. At least a new course or two every year. Definitely, all of those get added to the bundle without you needing to buy any of the additional courses again. This course, in addition to the six here, you get all that are added for life to this bundle.

We appreciate the chance to serve you today. You also help pay for these new courses to be produced when you buy the bundle. We’re very grateful for that. If you just can’t get enough Jerry Banfield, you can also get the Jerry Banfield Forever Bundle. This includes all the courses I make forever on any subject. I get really excited every time I see these purchases. I had just went to the bathroom the other day and I saw a notification on PayPal that you sold the bundle. I got really excited. I even sent the student that bought it an email saying, “Thank you very much for purchasing this bundle. I get so excited seeing these forever bundle sales.” Thank you for giving me the chance to serve you today. I imagine you will love watching more videos with me, maybe taking some courses.

You can watch on Facebook and YouTube, it is a great way to keep up. If you like watching on YouTube, will you please subscribe on YouTube. If you’d like to also have the option to watch these videos on Facebook, will you please go to facebook.com/jbanfield because you might love and enjoy seeing these videos there in addition to my gaming live videos. If you want to see everything, Twitter.com is a great place to follow where you can see all the new podcast episodes, everything I make all in one spot.

Jerrybanfield.com has links to all my courses, books, and anything else you could possibly want from me. I love that you’re awesome. I imagine you’ll leave a like on this video if you found it helpful. I expect since you’ve got to the very last part of it. I’ll see you again soon. Thank you very much for getting to the end of this video. Will you please leave a like on it because you will feel great doing that. Every like helps the video immensely to get out there to other people. Thank you very much for helping us. Share this video by leaving a like.

Get private label rights to sell this course yourself as a partner!

Thank you for making it to the end of this post.

I love you.

You are awesome.

Love,

Jerry Banfield