Fully anonymous Kali using TOR and VPNa

Spread the love

The following configuration will be the basic and most important for most of the white hacking methods presented. I recommend that you pay special attention when setting up your system according to my recommendations.

Hacking from our computer (host) without any form of proxy is reckless for a hacker, and in a penetrating context can lead to the target quickly blacklisting a valid IP address. By redirecting all traffic through Tor and reducing the threat of malicious input and output nodes using a VPN, we can configure Kali to become completely private and anonymous

Proper configuration of virtual machines, using TOR with VPN is a way to anonymous penetration activities. This is because both VPN and TOR encrypt our connection. To be fully hidden, remember to purchase the VPNa yourself anonymously – preferably by purchasing it from an anonymous network using pure monero.

Preparing the system according to the initial requirements

VirtualBox is used for all virtualization in this tutorial. It runs on Windows OS X and is available in repositories for most Linux distributions. You can downloa it from here or install it in a Debian-based Linux distribution, such as Kali, using the following command.

 sudo apt-get install virtualbox

To virtualize Kali, we’ll need a Kali disk image. We can download it here, remembering to choose the right architecture (32- or 64-bit) and match the VirtualBox to the desktop environment we use. For most users, “Kali 64-bit” should work.

We will need equally Whonix Linux image in OVA format, which can be opened and configured in VirtualBox. Just picture the gateway (Whonix Gateway) itself, because we will use Kali as our workstation, not the Whonix Workstation environment.

Then you’ll need a vpn (purchased anonymously) to be able to route traffic through the VPN before entering the Tor network. I personally recommend NordVPN and SurfShark, however there are many other free and paid VPN services available online.

When choosing a VPN, it’s best to consider the overall reliability of the service, the location of its servers, as well as specific rules for logging data and keeping logs. NordVPN and SurfShark have a specific policy of not keeping logs, but keep in mind that 100% sure that the VPN doesn’t actually hold the logs we can only have by running the VPN service our own. After preparing all the prerequisites, we can start configuring our virtualized environment.

Images of Whonix operating systems can be downloaded from the Internet, but we will not install them on the disk of our computer to run them we will need a free virtual machine VirtualBox.Downloading and running the entire system is completely free and I present step by step how to do it.

Screen of the Whonix Workstation in VirtualBox

Necessary steps:

1. Download and install VirtualBox on our Windows operating host system (here)
2. Download the Whonix Linux Gateway (here)
.3. It is important to choose a version with the XFCE desktop environment.
4 . Import and install the Whonix Gateway

Instructions with photos:

  1. Download and install VirtualBox on our Windows operating system (here)
download virtualbox for windows
Download Virtualbox for our Windows …

2. Download Whonix Gateway with images for VirtualBox. (here). It is important to choose a version with the XFCE desktop environment.

download whonix for virtualbox
Download Whonix for Virtualbox …

3. Import Whonix VMs into VirtualBox

Import Whonix into VirtualBox First Steep
Import Whonix
Import Whonix
Import Whonix
Import Whonix

4.Starting the Whonix gateway

launch escape whonix
Brama Whonix starts working at VirtualBox…
staring at whonix escape in virtualbox
Brama Whonix starts working at VirtualBox…
runing whonix escape

In the same way we install Kali Linux image in VirtualBox.

After installing and starting the Kali virtual machine, we move on to the following steps that will allow us to configure it to work with Whonix.

When you start our Kali virtual machine, our first step should be to open the terminal window and update your system. We’ll update the package registry and upgrade outdated packages.

 sudo apt-get update && sudo apt-get upgrade

Once the update of our system is complete, we should reset it.

Directing all traffic in Kalim through the Whonix Gateway

In order to run our virtual Machine Whonix we perform the same actions as when you start the Whonix gateway – by pressing the “Start” button in the upper left corner of the VirtualBox window. After the initial configuration and potentially required virtual machine restart, we should see the image to a similar following:

Then we leave the Whonix and Kali system open, because all Kali traffic will be passed through Whonix and through Whonix via Tor. This Tor gateway will only work when it is running and running.

Then we will return to the VirtualBox manager, right-click the Kali virtual machine and then click “Settings”. In the window, select the “Network” option in the left panel and change the connection to “Whonix Internal Network”

At first, the network in Kali will not work. Before Kali‘s traffic can be directed through Whonix, you will need to make several changes to Kali’s network configuration. First, let’s turn off the network adapter with ifconfig.

 ifdown eth0
 ifconfig etho0 down

Now the /etc/resolv.conf file will be updated with the correct from Whonix name server. We will edit it using the nano command. To open the nano window, type the following command:

 nano /etc/resolv.conf

Then type the appropriate name server into the file, compatible with the Whonix gateway:


Save the file with Ctrl + O, and then to exit Ctrl + X.

The next file we will edit is /etc/network/interfaces. You can do this by typing the following command:

 nano /etc/network/interfaces

We type the following information into the file to define what network parameters the virtual network adapter should use:

 iface eth0 inet static

The file is saved again Ctrl + O, and close Ctrl + X.

Finally, we’re simply bringing our virtual network adapter back online, and TOR traffic should be routed correctly:

 ifup eth0

It’s over! Now we can see if our traffic is routed through Tor by going to a site like this Tor test site. If the site confirms that you are using Tor, we have managed to redirect all of our Kali traffic through Tor!

Important information is that traffic from Tor is detected by most firewalls of hosting providers (web servers), so we should mask it using VPN. The installation of VPNs on Windows and Linux is described in the documentation of their suppliers and often looks different for different VPNs.

To sum up, our network layout will look like this:VPN

-> Whonx Gateaway -> Kali Linux -> VPN

4 thoughts on “Fully anonymous Kali using TOR and VPNa

  1. rufus download for windows xp

    Hey would you mind sharing which blog platform you’re working
    with? I’m looking to start my own blog soon but I’m
    having a tough time selecting between BlogEngine/Wordpress/B2evolution and Drupal.

    The reason I ask is because your design and style seems
    different then most blogs and I’m looking for something completely
    unique. P.S Apologies for getting off-topic but I had to ask!

  2. 头灯

    This is a good tip particularly to those fresh to the blogosphere.
    Brief but very precise info… Appreciate your sharing this one.
    A must read article!

  3. One Nine Elms Official

    Thanks for the sharing your expertise as well as information its extremely helpful
    and easy to understand.

Leave a Reply