![]() ![]() Adding new user `tor' (1001) with group `tor'. ![]() For the same reason you would never want to run this as root. If for any reason the browser is compromised by some vulnerability or dodgy download, you want to limit the attack surface as much as possible on your system. The Tor browser requires a dedicated non-root user to run and there is a good reason for this. sudo apt-get update -y & sudo apt-get upgrade -y sudo apt-get install tor -y It is not installed by default with Kali. Tor BrowserĪ Tor Browser allows you to access the “ Dark Web”, “ Deep Web” or “ Hidden Web”. In Google Chrome for Android, you can manually block WebRTC using a Chrome Flag (experimental setting): Type chrome://flags/#disable-webrtc in the address bar and press Enter, then press Enable. Activate the extension and it’ll disable WebRTC in your Chrome browser. Click Add to Chrome and confirm installation by pressing Add extension.ģ.Open the Chrome Web Store and search for the required extension: WebRTC Leak Prevent, WebRTC Control, or Easy WebRTC Block.Double click the entry, the column “ Value” should now be “ false”.Press the button “ I’ll be careful, I promise!”.Enter “ about:config” in the Firefox address bar and press Enter.You can test for a WebRTC leak on your VPN using this link: You will want to carry out this step before working through the VPN section below. It is strongly advised to disable WebRTC to protect yourself from vulnerability. VPN users beware: Firefox and Chrome have a security vulnerability that may leak your IP address. ![]() “ macchanger” for spoofing your MAC and bypassing filtering.“ Virtual Private Networks (VPNs)” for anonymised connectivity.“ Prox圜hains” for anonymised connectivity.“ Disable WebRTC” to prevent VPN information leaks.I’m going to split this article into five sections: It’s not actually illegal to be anonymised as there are legitimate uses for it but just don’t do anything illegal with it! I’m going to cover anonymisation off in this article but it is for informational purposes only. Now this may be a bit of a “ taboo topic” as this series is on “ Ethical Hacking” so why would there be a need to be anonymised? I’m of the opinion that if you are working in the security field you should know what you are defending against. ![]()
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. Archives
December 2022
Categories |