The following configuration will be the basic and most important for most of the white hacking methods presented. I recommend that you pay special attention when setting up your system according to my recommendations.
Hacking from our computer (host) without any form of proxy is reckless for a hacker, and in a penetrating context can lead to the target quickly blacklisting a valid IP address. By redirecting all traffic through Tor and reducing the threat of malicious input and output nodes using a VPN, we can configure Kali to become completely private and anonymous
Proper configuration of virtual machines, using TOR with VPN is a way to anonymous penetration activities. This is because both VPN and TOR encrypt our connection. To be fully hidden, remember to purchase the VPNa yourself anonymously – preferably by purchasing it from an anonymous network using pure monero.
Preparing the system according to the initial requirements
VirtualBox is used for all virtualization in this tutorial. It runs on Windows OS X and is available in repositories for most Linux distributions. You can downloa it from here or install it in a Debian-based Linux distribution, such as Kali, using the following command.
sudo apt-get install virtualbox
To virtualize Kali, we’ll need a Kali disk image. We can download it here, remembering to choose the right architecture (32- or 64-bit) and match the VirtualBox to the desktop environment we use. For most users, “Kali 64-bit” should work.
We will need equally Whonix Linux image in OVA format, which can be opened and configured in VirtualBox. Just picture the gateway (Whonix Gateway) itself, because we will use Kali as our workstation, not the Whonix Workstation environment.
Then you’ll need a vpn (purchased anonymously) to be able to route traffic through the VPN before entering the Tor network. I personally recommend NordVPN and SurfShark, however there are many other free and paid VPN services available online.
When choosing a VPN, it’s best to consider the overall reliability of the service, the location of its servers, as well as specific rules for logging data and keeping logs. NordVPN and SurfShark have a specific policy of not keeping logs, but keep in mind that 100% sure that the VPN doesn’t actually hold the logs we can only have by running the VPN service our own. After preparing all the prerequisites, we can start configuring our virtualized environment.
Images of Whonix operating systems can be downloaded from the Internet, but we will not install them on the disk of our computer to run them we will need a free virtual machine VirtualBox.Downloading and running the entire system is completely free and I present step by step how to do it.
Screen of the Whonix Workstation in VirtualBox
1. Download and install VirtualBox on our Windows operating host system (here)
2. Download the Whonix Linux Gateway (here)
.3. It is important to choose a version with the XFCE desktop environment.
4 . Import and install the Whonix Gateway
Instructions with photos:
- Download and install VirtualBox on our Windows operating system (here)
2. Download Whonix Gateway with images for VirtualBox. (here). It is important to choose a version with the XFCE desktop environment.
3. Import Whonix VMs into VirtualBox
4.Starting the Whonix gateway
In the same way we install Kali Linux image in VirtualBox.
After installing and starting the Kali virtual machine, we move on to the following steps that will allow us to configure it to work with Whonix.
When you start our Kali virtual machine, our first step should be to open the terminal window and update your system. We’ll update the package registry and upgrade outdated packages.
sudo apt-get update && sudo apt-get upgrade
Once the update of our system is complete, we should reset it.
Directing all traffic in Kalim through the Whonix Gateway
In order to run our virtual Machine Whonix we perform the same actions as when you start the Whonix gateway – by pressing the “Start” button in the upper left corner of the VirtualBox window. After the initial configuration and potentially required virtual machine restart, we should see the image to a similar following:
Then we leave the Whonix and Kali system open, because all Kali traffic will be passed through Whonix and through Whonix via Tor. This Tor gateway will only work when it is running and running.
Then we will return to the VirtualBox manager, right-click the Kali virtual machine and then click “Settings”. In the window, select the “Network” option in the left panel and change the connection to “Whonix Internal Network”
At first, the network in Kali will not work. Before Kali‘s traffic can be directed through Whonix, you will need to make several changes to Kali’s network configuration. First, let’s turn off the network adapter with ifconfig.
ifdown eth0 ifconfig etho0 down
Now the /etc/resolv.conf file will be updated with the correct from Whonix name server. We will edit it using the nano command. To open the nano window, type the following command:
Then type the appropriate name server into the file, compatible with the Whonix gateway:
Save the file with Ctrl + O, and then to exit Ctrl + X.
The next file we will edit is /etc/network/interfaces. You can do this by typing the following command:
We type the following information into the file to define what network parameters the virtual network adapter should use:
iface eth0 inet static address 10.152.152.11 netmask 255.255.192.0 gateway 10.152.152.10
The file is saved again Ctrl + O, and close Ctrl + X.
Finally, we’re simply bringing our virtual network adapter back online, and TOR traffic should be routed correctly:
It’s over! Now we can see if our traffic is routed through Tor by going to a site like this Tor test site. If the site confirms that you are using Tor, we have managed to redirect all of our Kali traffic through Tor!
Important information is that traffic from Tor is detected by most firewalls of hosting providers (web servers), so we should mask it using VPN. The installation of VPNs on Windows and Linux is described in the documentation of their suppliers and often looks different for different VPNs.
To sum up, our network layout will look like this:VPN
-> Whonx Gateaway -> Kali Linux -> VPN