Stay Anonymous on internet using Anonsurf in kali linux - Hacker Tune

Latest

Stay updated with bleeding edge technology

Tuesday, 14 November 2017

Stay Anonymous on internet using Anonsurf in kali linux



AnonSurf will anonymize the entire system under TOR using IPtables. It’s very easy to configure and possibly less hassle than setting up a VPN. Of course you will have slower connection speed than VPN as you are using TOR network.
Anonsurf works in the background (you can close the terminal), and changes ip address automatically every few minutes.


 NOTE: DO NOT run this as service anonsurf $COMMAND
 Run this as anonsurf $COMMAND

 Browse-anonymously-with-Anonsurf-in-Kali-Linux-blackMORE-Ops-10
     

Download Anonsurf:

Clone anonsurf  from GIT


root@kali:~# git clone https://github.com/Und3rf10w/kali-anonsurf
Cloning into 'kali-anonsurf'...
remote: Counting objects: 275, done.
remote: Total 275 (delta 0), reused 0 (delta 0), pack-reused 275
Receiving objects: 100% (275/275), 163.44 KiB | 75.00 KiB/s, done.
Resolving deltas: 100% (79/79), done.
Checking connectivity... done.
root@kali:~# cd anonsurf/
root@kali:~/anonsurf# 
root@kali:~/anonsurf# ls
installer.sh  anonsurf-deb-src  LICENSE  README.md
root@kali:~/anonsurf#

 

Install anonsurf:

With the installer script, it’s very straight forward to install anonsurf in Kali Linux.

root@kali:~/kali-anonsurf# ./installer.sh
--2016-10-13 12:36:53--  https://geti2p.net/
Resolving geti2p.net (geti2p.net)... 2a02:180:a:65
Connecting to geti2p.net (geti2p.net)|2a02:180:a:65 connected.
HTTP request sent, awaiting response... 200 OK
Length: 14455 (14K) [text/plain]
Saving to: ‘/tmp/i2p-debian-repo.key.asc’

/tmp/i2p-debian-rep 100%[===================>]  14.12K  21.6KB/s  in 0.7s
<--------output-----truncated------->

It also changes your resolver configuration to the following: 

root@kali:~# cat /etc/resolv.conf
nameserver 127.0.0.1
nameserver 209.222.18.222
nameserver 209.222.18.218

Start anonsurf:

To start anonsurf, and pass all under TOR, simply start anonsurf. It will also start TOR if that already been started: 

root@kali:~# anonsurf start
 * killing dangerous applications
 * cleaning some dangerous cache elements
[ i ] Stopping IPv6 services:
[ i ] Starting anonymous mode:
 * Tor is not running!  starting it  for you
 * Saved iptables rules
 * Modified resolv.conf to use Tor and Private Internet Access DNS
 * All traffic was redirected throught Tor
[ i ] You are under AnonSurf tunnel

Find your new Public IP:

You can issue the following command to find out your IP adderss 
 
root@kali:~# anonsurf myip
My ip is:
1xx.1xx.2xx.1xx

Restart anonsurf:

If you want a new IP address, simply restart anonsurf: 
 
root@kali:~# anonsurf restart
 * killing dangerous applications
 * cleaning some dangerous cache elements
[ i ] Stopping anonymous mode:
 * Deleted all iptables rules
 * Iptables rules restored
[ i ] Reenabling IPv6 services:
 * Anonymous mode stopped
 * killing dangerous applications
 * cleaning some dangerous cache elements
[ i ] Stopping IPv6 services:
[ i ] Starting anonymous mode:
 * Tor is not running!  starting it  for you
 * Saved iptables rules
 * Modified resolv.conf to use Tor and Private Internet Access DNS
 * All traffic was redirected throught Tor
[ i ] You are under AnonSurf tunnel

Stop anonsurf :

To stop anonsurf,
 
root@kali:~# anonsurf stop
 * killing dangerous applications
 * cleaning some dangerous cache elements
[ i ] Stopping anonymous mode:
 * Deleted all iptables rules
 * Iptables rules restored
[ i ] Reenabling IPv6 services:
 * Anonymous mode stopped

Conclusion:


Those who doesn’t know what ParrotSec OS is, it is another Security OS similar to Kali Linux developed by Parrot Security. 

In case ip spoofing in Kali Linux is a requirement for you, try torsocks. It uses SOCKS proxy which is not commonly used, so chances are you will have fast browsing experiences compared to standard TOR settings.

Stay tuned for more info....

No comments:

Post a Comment