As a security professional, sometimes you will want to anonymize your web traffic so as not to set alarms off. Today we will be looking at TOR and a tool called Nipe. You can find the Github repository at https://github.com/GouveaHeitor/nipe.
Tor enables users to surf the internet, chat and send instant messages anonymously, and is used by a wide variety of people for both licit and illicit purposes.
Tor has, for example, been used by criminals enterprises,
hacktivism groups, and law enforcement agencies at cross purposes, sometimes simultaneously.
Nipe is a script to make the Tor network your default gateway.
This Perl script enables you to directly route all your traffic from your computer to the Tor network through which you can surf the internet anonymously without having to worry about being tracked or traced back.
So if you are going to install Nipe, make sure you have Perl installed first. The installation is quite simple, so let’s get into it.
We are using Kali Linux for our operating system, commands may vary depending on the operating system that you are using.
Firstly we will need to clone Nipe to our local directory.
git clone https://github.com/GouveaHeitor/nipe
Once you have that done we just need to move into the Nipe folder.
cd nipe
Next we need to give it permissions to be able to read, write and execute.
chmod +x setup.sh
And now we can run the installer.
./setup.sh
Next we need dependencies.
cpan install Switch JSON LWP::UserAgent Config::Simple
Finally we will install Nipe.
perl nipe.pl install
Your operating system will install Nipe now. That should take a few minutes to complete depending on your internet connection.
Once that is complete let’s start the program.
perl nipe.pl start
Before we go any further let’s make sure we installed everything correctly and that Nipe is working.
perl nipe.pl status
If you managed to get everything installed correctly then you should get the Status: Activated message as we have.
Notice also the IP that it is showing, this is not our external IP here at LSB, it’s an IP from somewhere on the internet.
Let’s find out where it is coming from. Go to dnsleaktest.com and we see it’s in France, not in our country.
That IP will change each time you restart the program. To do that we just need to stop the service and restart it.
perl nipe.pl stop perl nipe.pl restart
The IP will change intermittently also, keeping your connection secure. Your DNS will change also for extra anonymity.
As we can see it is using Google in Finland for DNS, awesome.
That’s it guys, thanks for visiting LSB. We hope this blog post was informative for you. Please don’t forget to subscribe and drop us a line, we’d love to hear from you.
QuBits 2019-11-20
Put it all in a Word or Open Office file and we can take it from there.
LikeLike
I would love the publicity. Was going to write a blog about combining proxychains with Tor anyway. Maybe you guys could mirror it. I’ve got a whole archive of binaries and scripts that I prepared to make the use of proxychains in Tails easy and convenient, and was going to upload it here. I basically just copied all the files over from Kali.
LikeLiked by 2 people
Agreed!
LikeLike
How would you like to write that up and we will post it on the site? Psychocoder could be a guest writer.
LikeLiked by 1 person
You’ve got it locked down bro 😀
LikeLike
I use Tails, route my Tor traffic through a chain of SOCKS proxies via proxychains, and change my DNS server to OpenDNS. Think that’ll work?
LikeLiked by 1 person