Skip to main content

Tor Browser

TOR stands for onion router . It enables online anonymity, composed of client software and a network of servers, which can mask information about user's location and other factors which might identify them. Using this system makes it more difficult to trace Internet traffic to the user, including the visits to websites, online posts, instant messages and other communication forms. It is intended to protect the user's personal freedom, privacy and ability to conduct confidential business by keeping their Internet activities from being monitored. TOR is a freeware and can be downloaded free of cost. The network is also free of charges to use.
HOW TO USE TOR
STEPS:
1. Click here to Download TOR browser bundle. It is self-contained executable file that can be run directly from a pendrive. It comes with a copy of the firefox portable browser preconfigured, and allows the users to establish a secure encrypted connection easily and quickly.
2. After downloading the TOR browser bundle, you need to extract the file. To launch TOR, you need to double click on 'Start Tor Browser'.
3. As soon asyou click on the 'Start TOR Browser' icon, the Vidalia Control Panel opens. As soon as a secure Tor circuit has been established, a new Mozilla Firefox browser window automatically opens.
4. Once Mozilla Firefox launches, it shows that the secure TOR circuit has been established, and you can start browsing the Internet securely and anonymously.
5. Now let's test the TOR circuit by opening www.whatismyipaddress.com to check whether the connection is anonymous or not.
6. The problem with TOR bundle is that it only works with portable Firefox browser. If you simultaneously open both Google Chrome and Mozilla Firefox and connect to  www.whatismyipaddress.com, then you will get two different IP address and two different locations in two different browsers at the same time.
7. If you want to know whether TOR is working or not, you can visit check.torproject.org/ and it will tell you whether TOR is running or not.
Share for more stuffs..!!
Like us on facebook Grey hat hackers


NOTE: This is for educational purpose only we are not responsible for any type of inconvenience caused by reader.

Comments

Popular posts from this blog

Social Engineering Toolkit (SET)

Social Engineering Toolkit  (SET) is an advanced,  multifunctional, and easy-to-use computer-assisted social engineering toolset, created by the founders of  TrustedSec (https://www.trustedsec.com/). It helps you prepare the most effective way to exploit client-side application vulnerabilities and makes a fascinating attempt to capture the target's confidential information (for example, e-mail passwords). Some of the most efficient and useful attack methods employed by SET include targeted phishing e-mails with a malicious file attachment, Java applet attacks, browser-based exploitation, gathering website credentials, creating infectious portable media (USB/ DVD/CD), mass-mailer attacks, and other similar multiattack web vectors. This combination of attack methods provides you with a powerful platform to utilize and select the most persuasive technique that could perform an advanced attack against the human element.

 To start SET, navigate to  Applications  |  Kali Linux  |  Expl…

Cracking Wifi Using :Fern(GUI)

Fern(GUI)

As a part of Kali linux , fern can be directly used from kali linux , i would be recommending the use of kali because while using other linux environments it could be a trouble because while using fern it automatically detects the path of aircrack-ng and python installed , while in other environments it is needed to set it manually...so follow the following steps :-->

1.) Download kali linux iso and make a bootable pendrive .....if you dont know how to make bootable pendrive  then follow the steps given in blog of trinity rescue kit

Kali linux iso (amd64) recommended -->here
Link to trinity rescue kit blog --> here


 2.)Open Kali linux Goto Applications-->Wireless Attack--> Fern

3.)Select Interface card wlan0

4.)Double click any where in GUI

5.)Select enable x-terms ...so that you can view that happening ...while through a automated program...

6.)Click on select network

7.)Choose the type of network that is WEP/WPA

8.)I would recommend to add dictonary file .…

Deep Web - Part 1

What is deep web ?

Deep web Aka Invisible web Aka Hidden web are parts of the world wide web whose contents are not indexed by standard search engines.
LEVELS OF WORLD WIDE WEB :
SURFACE WEBBERGIE WEBDEEP WEBCHARTER WEBMARIANAS WEB SURFACE WEB :
The surface web also known as Visible web , Clearnet , Indexed web or Lightnet is that portion of the world wide web that is readily available to the general public and searchable with standard web search engines. Level of web where vast majority of internet users are connected to and which is accessible in any nation that does not block internet access.E.g: Social media sites like Facebook, informational websites like Wikipedia, general websites, etc

BERGIE WEB :

It is the part of world wide web that is not indexed by search-engines,which is directly accessible and no proxy required. E.g: Google locked results, recently web crawled old content, pirated media, pornography etc
DEEP WEB:
Deep web Aka Invisible web Aka Hidden web are parts of the wo…