Hacklog Volume 1 Anonymity: it security & Ethical Hacking Handbook



Download 2,32 Mb.
Pdf ko'rish
bet15/57
Sana01.01.2022
Hajmi2,32 Mb.
#289651
1   ...   11   12   13   14   15   16   17   18   ...   57
Bog'liq
Hacklog Volume 1 Anonymity IT Security Ethical Hacking Handbook

->  VPN  and  so  on).  Currently,  the  only  VPN  providers  (that  I  found)  offering
this kind of solution are:
-
NordVPN (
https://nordvpn.com
)
-
IVPN (
https://www.ivpn.net
)
-
Perfect Privacy (
https://www.perfect-privacy.com
)


3.1.5 Using the VPN
Using  a  VPN  on  any  given  Operating  System  is  an  extremely  easy  task,
considering that all the major producers offer ready-to-use configurations to be
passed  to  tunneling  clients  or,  better,  offer  pre-made  VPNs  you  can  activate  in
one  click.  This  applies  to  all  Operating  Systems,  except  the  GNU/Linux
scenario:  the  difficulties  developing  a  single  tool  for  the  fragmented  Penguin
brand  market  convinced  the  producer  to  ignore  it,  only  providing  protocols
connectivity. However, this problem offers an advantage: the Linux community
can  rely  on  a  single  client  to  manage  all  VPN  connections,  so  we  will  have  a
single path to follow. In the test configuration, we are going to use NordVPN as
the provider together with the OpenVPN protocol.
From the terminal, download and install the OpenVPN client:
$ su
$ apt-get install openvpn
Go to the program installation folder:
$ cd /etc/openvpn
Each provider offers a list of VPNs you can immediately pass to the client.
Download this file:
$ wget https://nordvpn.com/api/files/zip
You have just downloaded a zip file (with no extension). Extract it using the
unzip command:
$ unzip zip
Now all the files are extracted. View them using the ls command
$ ls -al
Once you chose the server to connect to, launch the openvpn command:
$ openvpn [filename]


for example:
$ openvpn it3.nordvpn.com.udp1194.ovpn
Enter  the  Username  and  Password  Now  you  are  connected  to  the  VPN  and
ready  to  use  the  network  tunnel.  You  can  verify  it  downloading  your  IP  in  the
network:
$ wget
http://ipinfo.io/ip
-qO -
To  close  the  VPN  connection,  use  the  CTRL+C  key  combination.  Then,
verify your IP again.


3.1.6 Testing the quality of a VPN
Finally,  you  rented  your  VPN  –  or  still  using  the  free  trial  –  but  you’re
uncertain  about  your  choice,  aren’t  you?  Well,  you  are  can’t  be  blamed,
especially  because  you  know  there  are  very  complex  dynamics  behind  the
Internet.  For  example,  in  case  of  a  VPN  misconfiguration,  you  will  still  hide
your IP from the final site, but DNS resolution may be not encrypted, allowing
your ISP to log your domain requests, compromising any encryption in place.
On  the  Testers  we  are  going  to  introduce  shortly,  you  will  see  some  alerts
related  to  JavaScript,  Apple-X,  Cookies,  WebRTC,  Java...  all  these
vulnerabilities will be covered in a separate chapter, “Local Resources”.
3.1.6.1 Torrent Test
The tests we are going to run will check if VPN is working correctly, even
with P2P protocols (especially Torrent). Unfortunately, you just cannot visit the
usual “what is my ip address”; instead, you have to use the same Torrent client
and a set of mini-hacks. Let’s drill down; firstly I wish to introduce you to other
three web services offering that check:
-
TorGuard (
https://torguard.net/checkmytorrentipaddress.php
)
-
IPLeak.net
-
ipMagnet (
ipmagnet.services.cbcdn.com
)
How to run the VPN test on Torrent
Get  your  preferred  Torrent  client  first,  then  download  a  special  .torrent  file
(or use a magnet link) and open it in the Torrent client (Figure 11).

Download 2,32 Mb.

Do'stlaringiz bilan baham:
1   ...   11   12   13   14   15   16   17   18   ...   57




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish