How To Fully Anonymize Your IP

As a security professional, sometimes you will want to anonymize your web traffic so as not to set alarms off. Today we will be looking at TOR and a tool called Nipe. You can find the Github repository at https://github.com/GouveaHeitor/nipe. 

Tor enables users to surf the internet, chat and send instant messages anonymously, and is used by a wide variety of people for both licit and illicit purposes.

Tor has, for example, been used by criminals enterprises,
hacktivism groups, and law enforcement agencies at cross purposes, sometimes simultaneously.

Nipe is a script to make the Tor network your default gateway.

This Perl script enables you to directly route all your traffic from your computer to the Tor network through which you can surf the internet anonymously without having to worry about being tracked or traced back.

So if you are going to install Nipe, make sure you have Perl installed first. The installation is quite simple, so let’s get into it.

We are using Kali Linux for our operating system, commands may vary depending on the operating system that you are using.

Firstly we will need to clone Nipe to our local directory.

git clone https://github.com/GouveaHeitor/nipe

Once you have that done we just need to move into the Nipe folder.

cd nipe

Next we need to give it permissions to be able to read, write and execute.

chmod +x setup.sh

And now we can run the installer.

./setup.sh

Next we need dependencies.

cpan install Switch JSON LWP::UserAgent Config::Simple

Finally we will install Nipe.

perl nipe.pl install

Your operating system will install Nipe now. That should take a few minutes to complete depending on your internet connection.

Once that is complete let’s start the program.

perl nipe.pl start

Before we go any further let’s make sure we installed everything correctly and that Nipe is working.

perl nipe.pl status

ni1

If you managed to get everything installed correctly then you should get the Status: Activated message as we have.

$299 REGISTERS YOU FOR OUR NEWEST SELF PACED COURSE! LFD201 – INTRODUCTION TO OPEN SOURCE DEVELOPMENT, GIT, AND LINUX!

Notice also the IP that it is showing, this is not our external IP here at LSB, it’s an IP from somewhere on the internet.

Let’s find out where it is coming from. Go to dnsleaktest.com and we see it’s in France, not in our country.

ni2

That IP will change each time you restart the program. To do that we just need to stop the service and restart it.

perl nipe.pl stop

perl nipe.pl restart

The IP will change intermittently also, keeping your connection secure. Your DNS will change also for extra anonymity.

ni3

As we can see it is using Google in Finland for DNS, awesome.

That’s it guys, thanks for visiting LSB. We hope this blog post was informative for you. Please don’t forget to subscribe and drop us a line, we’d love to hear from you.

QuBits 2019-11-20

7 Comments

  1. I would love the publicity. Was going to write a blog about combining proxychains with Tor anyway. Maybe you guys could mirror it. I’ve got a whole archive of binaries and scripts that I prepared to make the use of proxychains in Tails easy and convenient, and was going to upload it here. I basically just copied all the files over from Kali.

    Liked by 2 people

Leave a comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.