HACKLOG 1×10 – Tor Browser, Relay, P.T. e Tor Chat


Once TOR is active inside
of our OS we can
use it in different ways. Let’s see what
They are the services and the most common uses.
The Tor Browser Bundle is perhaps the project
most famous TOR Project. It’s a
browser based on Firefox ESR preconfigured
to connect to proxyserver SOCKS
interior of TOR at 127.0.0.1:9150.
Together with the browser are provided:
TorLauncher that takes care of starting the connection
the TOR network
ghost mode;
TorButton that allows you to check the identities
and client settings
TOR;
NoScript that prevents code execution
Javascript;
HTTPS Everywhere that power connections
web using the protocol
HTTPS.
The client is available in Windows versions,
MacOS and Linux from web
Official Tor Browser; you can download
three versions:
The Stable, the stable version
Experimental, the latest nightly version
(But not tested)
and Hardened, the alpha version of the project
only available for Linux x64
Unlike the core version of the Tor Browser
integrates an auto-update that
It allows you to be more relaxed about
upgrades, partly because at the time
seems to be no official repositories
which keep it.
Procuriamoci the desired version (Italian
will do) and architecture
available, downloading it from the official website.
If for some reason there are doubts
on which to download, always we prefer the 32-bit.
Once the file is downloaded open the terminal
and let us go in the file folder
downloaded:
cd $ HOME / Downloads
In our case the file is called “tor-browser-linux32-6.5a3_it.tar.xz”.
this makes
we know why we got the list
the present launching the file
command:
ls
Now proceed to the extraction of compressed files:
tar -xvjf [nomedelfile]
A tip: It may be tedious every
Once hand write the name of a
file or a folder. Using a terminal
based UNIX is available
autocompletion of a file: to do
you type part of the name (eg Tor-) and
then complete with the [TAB] key. A.D
example:
tar -xvjf Tor- [TAB]
In this way, the auto-complete terminal
the file name. It will be extracted
folder containing the executable: it
You will be called tor-browser_it /. Enter it
with the command:
cd tor-browser_it
To launch the executable is one
script called start-torbrowser.
desktop. Start it with the command:
./start-tor-browser.desktop
The Tor Browser Bundle can be used
Clearnet both in deepweb. There
comfort that resides in this software,
in addition to the portability that allows you to
use it even from external media such as
USB sticks or SD, is having
preinstalled core TOR and that TorButton
It allows you to maneuver
connections without an external GUI (as it happened
however with the old version).
The entire Tor network is handled by
TorButton clicking on the green onion
top left as in the image.
In the Security Settings item and Privacy
We can choose to operate on
four characteristics already present in
Firefox Preferences and thanks to Levels
of
Safety use four user profiles
that determine the level of
“paranoia”.
Services such as Gmail, Hotmail, Skype, Facebook
Messenger as well as old
Yahoo! Messenger and MSN and any other form
communication on the Internet
It can be monitored and stored for Rates
really long, even for more than
5 years. More forward even we talk about
how to encrypt messages in the
network but until then only introduce the
TorChat software.
TorChat is an instant messenger program
decentralized and anonymous
that makes use of the Tor network to communicate on
Internet through metaprotocollo
.onion. This allows the exchange of messages
and multimedia data
encrypted end-to-end. TorChat has the advantage of
be available natively for
Windows, Linux and the latest smartphone
generation. There is also a version
Unofficial for MacOS systems, to use
at your own risk.
If we have integrated the TOR repository
Project to install TOR then
we will also have available the installation
TorChat. First of all, however, we perform
a system update:
on
apt-get update && apt-get upgrade
We note how, for the first time, we evoke
the concatenation symbol &&.
This allows us to run two commands
distinct that need not communicate
between them – in contrast to what was seen
with the symbol | (Pipe). The two commands apt
get
update and apt-get upgrade serve respectively
to update the repository
and software in our system.
Reached this stage install
quietly TorChat:
apt-get install TorChat
To finished installation, we can start it
directly from the terminal by typing:
exit
TorChat
In TorChat each user has a unique alphanumeric ID
It consists of 16 characters.
This ID is created randomly by Tor
when the client is started for the
first time and basically presents
as a .onion address. To this
Now you will get a code such as
… Then your
ID will for example … This will be
communicated to other users
take messages with you.
As for Proxy, and unlike the tunnel
VPN, you need to configure
own tool to operate in the TOR network.
Once we TOR is active
Available a SOCKS proxy in effect
within our computer.
At this point you can perform
Our proxati software
Proxychains or ProxyCap (see chapter on
Proxy Server) by connecting
address 127.0.0.1 (or localhost) through
9050. We faced the door
this when we installed
TOR and tested (and not TOR Browser)
then back to some previous chapter
to know how to do.
In the universe of the TOR, the Relay dealing
to give bandwidth to the network users
so they can use them for free.
The torporject recommends users
TOR to activate the relay function in the case
in which they have more than 250kb / s in both
upload and download.
In the diagram that shows the list of items
TOR, are part of the Relay
category Middleman and Exit Node: anyone
You may decide to perform a Relay
in your network and specify whether it be
a Middleman, an Exit Node or
both. For the purposes of this guide the setup
a relay is not essential, however,
if you want to contribute to the development of the network
TOR can do so by creating your own relay
staff.
The bridge of TOR – called bridge relays – are
of the TOR network nodes
allow to bypass the filtering by
ISP and Web sites about the use of
TOR network. To make sure that the system functions
effectively, it is not available
a complete list of bridge relays otherwise
ISP and any honeypot sites
web would recognize them immediately and would block them.
However, you can give to the client
of the order to use the TOR Browser
bridge using the option “My supplier
Internet (ISP) services blocks
grid connections TOR “, voice activated
in the TOR network settings (in
If you use the TOR Browser click
green onion icon at the top
left).
In case you want to manually set
its bridge, for example if you
Expert wants to use Tor Bundle, distributions
TOR as Linux-based or Tails
with TOR Browser through configuration
advanced, first you need
reach the Bridge of Torproject page
skip to step 2, fill (the impossible)
captcha up and get
so a value of this type.
As an example we can start Tor Browser
and feed it new bridge obtained.
Consider, however, that even the bridges can
be blacklisted because their
Access can be made by anyone,
including censors. To work around this
Control the TOR developers have introduced
a new feature
called pluggable transports. The PT has
the task of transforming the flow of
TOR traffic traffic “clean” in
the client and the bridge that might otherwise
It is intercepted by the ISP with a technical
called Deep Packet Inspection (DPI)
which it consists in classifying the flows of
IP traffic and, once compared the pattern,
blocked upstream.
At the moment the PT technology is in the process of
Active and requires development of
operators and developers to integrate the
better in the TOR Project. for more
information visit the official site.
The most common are currently PT
defined bridge blurred: by definition,
these bridge dealing with tarnish
Traffic difficult to interpret for
ISPs. Their technology uses
algorithms that mix the incoming packets
and output; such algorithms are
identified by the protocols. The protocols
of this type are three: obfs 2 – 3 -4.
Obfs2 (also the two version, called “Twobfuscator”)
It is the simplest of
Two: its technology is concerned to take
the incoming and outgoing data traffic and
rearrange them randomly. As it emerged in
recent studies, this protocol can
be cracked by intercepting the handshake
Initial (a little ‘as with the
WEP security of WiFi networks) thus revealing
the information it contains. It’s a
deprecated version no longer under development nor
supported by the TOR development.
Obfs3 (the “Threebfuscator”) is very similar
the previous protocol, but uses
Diffie Hellman method for the exchange of
keys in phase handshake
(A topic that will be explained in the “Encryption”).
Obfs4 is the fourth version of this protocol,
although how he says
same developer “is closer to ScrambleSuite
that obfs2 / obfs3 “. The last
version of this protocol seems to be
the most secure and currently
This default of Tor Browser. Information
Additional to this protocol
They are present in the official Github. It’s possible
get a list of the Obfs4
Official page of Tor Project.
The protocols of meek- family were *
created in 2014 to allow
make an HTTPS tunneling in a circuit.
It is also used a technique
called “domain fronting” which deals
ISP to hide the fact that you are
communicating with a TOR bridge. As you can see
next to the acronym meek you will find
the name of a well-known web service: if
Choose Amazon, for example
the ISP will believe that we are communicating with
the well-known e-commerce site (or better with
the cloud AWS), Azure with Microsoft cloud
and Google … well, with Google services.
As implied by the TOR Project protocols
based meek- * are slower various obfs- *
and they should be used only in case
See to the ISP to block
the latter. If the situation so requires
you can follow the official directory of
TOR Project which explains how to configure the
client to use this meek; in case
not sure you can safely skip this
type of protocol (or at most
run tests). At the moment they seem to be
the only viable alternative in case
Advanced censorship, as occurred in China
at the end of 2015, however, it is still
unripe and over the years the situation
It could evolve.

Leave a Reply

Your email address will not be published. Required fields are marked *