Anonymity is one of the most important elements for the penetration tester. Tools can be used in order to hide the user’s identity from being exposed. VPN (Virtual Private Network), Proxyservers and RDP (Remote Desktop Protocol) are some of the tools to guard their identity. In this article, i’ll tell you some best tools to hide yourself completely from the internet and go anonymous using Tor network.
Nipe is a open source tool written in perl language which enables users to make Tor network their default Gateway. The script routes all the system traffic through tor which enables users to surf the internet anonymously. The script is easily available on Github.
This Perl Script enables you to directly route all your traffic from your system to the Tor Network through which you can surf the Internet Anonymously without having to worry about being tracked or traced back.
Usage of Nipe –
perl nipe.pl install perl nipe.pl start perl nipe.pl stop perl nipe.pl restart perl nipe.pl status
Nipe is availale on Github. Download from here
Read more about Nipe - Nipe - Massive Script To Set Tor Network Your Default Gateway
4nonimizer is a powerfull bash script written by Carlos Antonini & Vicente Motos. The script is used for anonymizing the public IP used to browsing Internet, managing the connection to TOR network and to different VPNs providers (OpenVPN). By default, it includes several pre-configured VPN connections to different peers (.ovpn files) and download the credentials (if the corresponding provider support it). Also, it records each used IP that we use every 300 seconds in log files. This script is enabled as a service in systemd systems and uses a default vpn (VPNBook) at system startup.
The script supports many VPN providers like 7Proxies, AirVPN, CryptoStorm, CyberGhost, ExpressVPN, FreeVPN, HideMyAss, IPVanish, NordVPN, PIA, ProtonVPN, SlickVPN, TorGuard, StrongVPN, TunnelBear, VPNBook etc.
Usage of 4nonimizer –
install: Install the script in run services
uninstall: Disable run service and remove app directory
change_provider: Change VPN Provider
change_ip: Change IP from VPN current
vpn_status: Check IP and provider VPN running
update_vpns: Update all ovpn of VPNs
start: Init the 4nonimizer service
stop: Stop the 4nonimizer service
stop_nonet: Stop the 4nonimizer service and shutdown network interfaces
restart: Restart the 4nonimizer service
update_app: Update this program via git
privoxy: Install and configure privoxy with port 8118 (BETA)
proxychains4: Install and configure proxychains4 for default in the system
browser: Fire up a firefox browser with profile privoxy -> tor
test_availability: Check peers availability and delete ovpn file if the IP/service is unreachable
location: Now you can select a specific country or continent of the vpn peer
enableboot: You can enable service in boot
disableboot: You can disable service in boot
enable_dnscrypt: Enable dnscrypt service
disable_dnscrypt: Disable dnscrypt service
4nonimizer is availale on Github. Download from here
Anonsurf is a script which routes your all system traffic through Tor network. It helps in hiding identity by tunneling under TOR proxy through IP tables. The script contains the sources of both the anonsurf and pandora packages from ParrotSec combined into one.
Anonsurf will anonymize the entire system under TOR using IPTables. It will also allow you to start and stop i2p as well.
Usage of Anonsurf –
start – Start system-wide anonymous tunneling under TOR proxy through iptables.
stop – Reset original iptables settings and return to clear navigation.
restart – Combines “stop“ and “start“ options.
change – Changes identity restarting TOR.
status – Check if AnonSurf is working properly.
Anonsurf is availale on Github. Download from here
It is a simple python script that generates random HTTP/DNS traffic noise in the background while you go about your regular web browsing, to make your web traffic data less valuable for selling and for extra obscurity. Noisy is compatible with both Python 2.7 and 3.6.
The tool is also known as simple random DNS, HTTP/S internet traffic noise generator.
Usage of Noisy –
python noisy.py --config config.json
Some Arguments –
–log -l logging level
–config -c config file
–timeout -t for how long the crawler should be running, in seconds
Noisy is availale on Github. Download from here
A tool that forces any TCP connection made by any given application to follow through proxy like TOR or any other SOCKS4, SOCKS5 or HTTP(S) proxy. Proxychains supports any kinds of chaining option methods, like random, which takes a random proxy in the list stored in a configuration file, or chaining proxies in the exact order list, different proxies are separated by a new line in a file. There is also a dynamic option, that lets Proxychains go through the live only proxies, it will exclude the dead or unreachable proxies, the dynamic option often called smart option. Proxychains can handle any TCP client application, i.e Nmap, telnet.
ProxyChain is compatible with Linux, NetBSD, FreeBSD, OpenBSD, DragonFlyBSD or Mac OS X.
Usage of ProxyChains
proxychains nmap 192.168.1.1/24 proxychanins telnet targethost.com
Do you want to write for TheHackerStuff ? If you have an interesting and intelligent topic you think we would like to publish, send it to email@example.com
Disclaimer This article is only for an Educational purpose. Any actions and or activities related to the material contained within this Website is solely your responsibility.The misuse of the information in this website can result in criminal charges brought against the persons in question. The authors and www.thehackerstuff.com will not be held responsible in the event any criminal charges be brought against any individuals misusing the information in this website to break the law.
Akshay Sharma is a Cyber Security Analyst. He is a CCNA certified and owner of TheHackerStuff.