Gamertag

sexta-feira, 9 de setembro de 2016

Navegação Anônima com ProxyChains

Anonimato

Este é o segundo texto de uma série que escreverei sobre navegação anônima na internet, o primeiro pode ser lido em http://bit.ly/2bTyHRT.
Para esse artigo o Tor já deverá estar instalado em seu computador.


Proxychains

O proxychains é um software que pega suas requisições e as faz passarem por um conjunto de proxys com o intuito de obscurecer a origem das requisições.

Guia de instalação


$ sudo apt-get install proxychains

O uso é extremamente simples, no terminal digite:

$ proxychains nmap -F 45.33.32.156
ProxyChains-3.1 (http://proxychains.sf.net)

Starting Nmap 6.40 ( http://nmap.org ) at 2016-09-07 17:13 BRT
|S-chain|-<>-127.0.0.1:9050-<><>-45.33.32.156:80-<><>-OK
|S-chain|-<>-127.0.0.1:9050-<><>-45.33.32.156:5900-<--denied
|S-chain|-<>-127.0.0.1:9050-<><>-45.33.32.156:110-<--denied
|S-chain|-<>-127.0.0.1:9050-<><>-45.33.32.156:199-<--denied
|S-chain|-<>-127.0.0.1:9050-<><>-45.33.32.156:53-<--denied
|S-chain|-<>-127.0.0.1:9050-<><>-45.33.32.156:3389-<--denied
|S-chain|-<>-127.0.0.1:9050-<><>-45.33.32.156:139-<--denied
|S-chain|-<>-127.0.0.1:9050-<><>-45.33.32.156:995-<--denied
|S-chain|-<>-127.0.0.1:9050-<><>-45.33.32.156:25-<--timeout
|S-chain|-<>-127.0.0.1:9050-<><>-45.33.32.156:443-<--denied
|S-chain|-<>-127.0.0.1:9050-<><>-45.33.32.156:8888-<--denied
|S-chain|-<>-127.0.0.1:9050-<><>-45.33.32.156:445-<--denied
|S-chain|-<>-127.0.0.1:9050-<><>-45.33.32.156:23-<--denied
|S-chain|-<>-127.0.0.1:9050-<><>-45.33.32.156:587-<--denied
|S-chain|-<>-127.0.0.1:9050-<><>-45.33.32.156:3306-<--denied
|S-chain|-<>-127.0.0.1:9050-<><>-45.33.32.156:1720-<--denied
|S-chain|-<>-127.0.0.1:9050-<><>-45.33.32.156:135-<--denied
|S-chain|-<>-127.0.0.1:9050-<><>-45.33.32.156:8080-<--denied
|S-chain|-<>-127.0.0.1:9050-<><>-45.33.32.156:554-<--denied
|S-chain|-<>-127.0.0.1:9050-<><>-45.33.32.156:1025-<--denied
|S-chain|-<>-127.0.0.1:9050-<><>-45.33.32.156:80-<><>-OK
|S-chain|-<>-127.0.0.1:9050-<><>-45.33.32.156:22-<><>-OK
|S-chain|-<>-127.0.0.1:9050-<><>-45.33.32.156:21-<--denied
|S-chain|-<>-127.0.0.1:9050-<><>-45.33.32.156:113-<--denied
|S-chain|-<>-127.0.0.1:9050-<><>-45.33.32.156:1723-<--denied
|S-chain|-<>-127.0.0.1:9050-<><>-45.33.32.156:143-<--denied
|S-chain|-<>-127.0.0.1:9050-<><>-45.33.32.156:111-<--denied
|S-chain|-<>-127.0.0.1:9050-<><>-45.33.32.156:993-<--denied
|S-chain|-<>-127.0.0.1:9050-<><>-45.33.32.156:873-<--denied
|S-chain|-<>-127.0.0.1:9050-<><>-45.33.32.156:6001-<--denied
|S-chain|-<>-127.0.0.1:9050-<><>-45.33.32.156:26-<--denied
|S-chain|-<>-127.0.0.1:9050-<><>-45.33.32.156:8008-<--denied
|S-chain|-<>-127.0.0.1:9050-<><>-45.33.32.156:49155-<--denied
|S-chain|-<>-127.0.0.1:9050-<><>-45.33.32.156:2000-<--denied
|S-chain|-<>-127.0.0.1:9050-<><>-45.33.32.156:3986-<--denied
|S-chain|-<>-127.0.0.1:9050-<><>-45.33.32.156:5101-<--denied
|S-chain|-<>-127.0.0.1:9050-<><>-45.33.32.156:427-<--denied
|S-chain|-<>-127.0.0.1:9050-<><>-45.33.32.156:5060-<--denied
|S-chain|-<>-127.0.0.1:9050-<><>-45.33.32.156:88-<--denied
|S-chain|-<>-127.0.0.1:9050-<><>-45.33.32.156:144-<--denied
|S-chain|-<>-127.0.0.1:9050-<><>-45.33.32.156:1029-<--denied
|S-chain|-<>-127.0.0.1:9050-<><>-45.33.32.156:5190-<--denied
|S-chain|-<>-127.0.0.1:9050-<><>-45.33.32.156:544-<--denied
|S-chain|-<>-127.0.0.1:9050-<><>-45.33.32.156:119-<--denied
|S-chain|-<>-127.0.0.1:9050-<><>-45.33.32.156:8000-<--denied
|S-chain|-<>-127.0.0.1:9050-<><>-45.33.32.156:49153-<--denied
|S-chain|-<>-127.0.0.1:9050-<><>-45.33.32.156:2001-<--denied
|S-chain|-<>-127.0.0.1:9050-<><>-45.33.32.156:2717-<--denied
|S-chain|-<>-127.0.0.1:9050-<><>-45.33.32.156:389-<--denied
|S-chain|-<>-127.0.0.1:9050-<><>-45.33.32.156:515-<--denied
|S-chain|-<>-127.0.0.1:9050-<><>-45.33.32.156:543-<--denied
|S-chain|-<>-127.0.0.1:9050-<><>-45.33.32.156:1900-<--denied
|S-chain|-<>-127.0.0.1:9050-<><>-45.33.32.156:5009-<--denied
|S-chain|-<>-127.0.0.1:9050-<><>-45.33.32.156:49152-<--denied
|S-chain|-<>-127.0.0.1:9050-<><>-45.33.32.156:9-<--denied
|S-chain|-<>-127.0.0.1:9050-<><>-45.33.32.156:6000-<--denied
|S-chain|-<>-127.0.0.1:9050-<><>-45.33.32.156:179-<--denied
|S-chain|-<>-127.0.0.1:9050-<><>-45.33.32.156:1027-<--denied
|S-chain|-<>-127.0.0.1:9050-<><>-45.33.32.156:49157-<--denied
|S-chain|-<>-127.0.0.1:9050-<><>-45.33.32.156:3000-<--denied
|S-chain|-<>-127.0.0.1:9050-<><>-45.33.32.156:13-<--denied
|S-chain|-<>-127.0.0.1:9050-<><>-45.33.32.156:5800-<--denied
|S-chain|-<>-127.0.0.1:9050-<><>-45.33.32.156:444-<--denied
|S-chain|-<>-127.0.0.1:9050-<><>-45.33.32.156:32768-<--denied
|S-chain|-<>-127.0.0.1:9050-<><>-45.33.32.156:8443-<--denied
|S-chain|-<>-127.0.0.1:9050-<><>-45.33.32.156:4899-<--denied
|S-chain|-<>-127.0.0.1:9050-<><>-45.33.32.156:6646-<--denied
|S-chain|-<>-127.0.0.1:9050-<><>-45.33.32.156:9100-<--denied
|S-chain|-<>-127.0.0.1:9050-<><>-45.33.32.156:1433-<--denied
|S-chain|-<>-127.0.0.1:9050-<><>-45.33.32.156:106-<--denied
|S-chain|-<>-127.0.0.1:9050-<><>-45.33.32.156:5357-<--denied
|S-chain|-<>-127.0.0.1:9050-<><>-45.33.32.156:9999-<--denied
|S-chain|-<>-127.0.0.1:9050-<><>-45.33.32.156:1026-<--denied
|S-chain|-<>-127.0.0.1:9050-<><>-45.33.32.156:631-<--denied
|S-chain|-<>-127.0.0.1:9050-<><>-45.33.32.156:7-<--denied
|S-chain|-<>-127.0.0.1:9050-<><>-45.33.32.156:79-<--denied
|S-chain|-<>-127.0.0.1:9050-<><>-45.33.32.156:2121-<--denied
|S-chain|-<>-127.0.0.1:9050-<><>-45.33.32.156:1755-<--denied
|S-chain|-<>-127.0.0.1:9050-<><>-45.33.32.156:2049-<--denied
|S-chain|-<>-127.0.0.1:9050-<><>-45.33.32.156:5631-<--denied
|S-chain|-<>-127.0.0.1:9050-<><>-45.33.32.156:7070-<--denied
|S-chain|-<>-127.0.0.1:9050-<><>-45.33.32.156:3128-<--denied
|S-chain|-<>-127.0.0.1:9050-<><>-45.33.32.156:1028-<--denied
|S-chain|-<>-127.0.0.1:9050-<><>-45.33.32.156:37-<--denied
|S-chain|-<>-127.0.0.1:9050-<><>-45.33.32.156:5666-<--denied
|S-chain|-<>-127.0.0.1:9050-<><>-45.33.32.156:8081-<--denied
|S-chain|-<>-127.0.0.1:9050-<><>-45.33.32.156:5432-<--denied
|S-chain|-<>-127.0.0.1:9050-<><>-45.33.32.156:513-<--denied
|S-chain|-<>-127.0.0.1:9050-<><>-45.33.32.156:10000-<--denied
|S-chain|-<>-127.0.0.1:9050-<><>-45.33.32.156:646-<--denied
|S-chain|-<>-127.0.0.1:9050-<><>-45.33.32.156:81-<--denied
|S-chain|-<>-127.0.0.1:9050-<><>-45.33.32.156:49154-<--denied
|S-chain|-<>-127.0.0.1:9050-<><>-45.33.32.156:990-<--denied
|S-chain|-<>-127.0.0.1:9050-<><>-45.33.32.156:8009-<--denied
|S-chain|-<>-127.0.0.1:9050-<><>-45.33.32.156:1110-<--denied
|S-chain|-<>-127.0.0.1:9050-<><>-45.33.32.156:548-<--denied
|S-chain|-<>-127.0.0.1:9050-<><>-45.33.32.156:465-<--denied
|S-chain|-<>-127.0.0.1:9050-<><>-45.33.32.156:49156-<--denied
|S-chain|-<>-127.0.0.1:9050-<><>-45.33.32.156:5000-<--denied
|S-chain|-<>-127.0.0.1:9050-<><>-45.33.32.156:5051-<--denied
|S-chain|-<>-127.0.0.1:9050-<><>-45.33.32.156:514-<--denied
Nmap scan report for scanme.nmap.org (45.33.32.156)
Host is up (1.6s latency).
Not shown: 98 closed ports
PORT   STATE SERVICE
22/tcp open  ssh
80/tcp open  http

Nmap done: 1 IP address (1 host up) scanned in 150.98 seconds


Com esta ferramenta você consegue testar sua rede e seu perímetro vindo externamente, muito bom para testar firewalls e afins.

quarta-feira, 7 de setembro de 2016

Usando torify no ubuntu

Usando o Tor, Torify e torsocks para testar serviços públicos

Tor é uma ótima ferramenta para proteger seu tráfego de rede por manter-se anônimo. Ferramentas fornecidas pelo projeto Tor também pode ser realmente úteis para testar sua própria rede.
Além do pacote Tor, você pode instalar o software Torify. Que é um programa que permite configurar os aplicativos para uso com a rede Tor, muito útil para aplicativos que não tem suporte nativo.


Guia de instalação

Instalar e configurar o Tor

$ sudo apt-get install tor $ sudo vi /etc/tor/torrc 
 
Descomente as linhas
 
ControlPort 9051
CookieAuthentication 1
   
Modifique a linha

CookieAuthentication 1

Para

CookieAuthentication0

Restart


$ sudo /etc/init.d/tor restart 

Testando Torify
No primeiro teste será exibido seu IP público


$ curl ifconfig.me 

No segundo teste aparecerá um IP completamente diferente


$ torify curl ifconfig.me 2> /dev/null
 
Testando Torsocks
Assim como no exemplo acima o primeiro teste mostrará o IP real enquanto o segundo mostrará um IP completamente diferente. 


$ wget -qO- http://ipecho.net/plain ; echo 
 
$ torsocks wget -qO- http://ipecho.net/plain 2> /dev/null ; echo
 
 
Conclusão

Com o pacote Tor, testar sites de sua própria rede à partir de IPs externos torna-se muito simples. Enquanto Torify e torsocks podem melhorar estes testes, permitindo a você executar scripts anonimamente aos olhos de sua rede!

terça-feira, 6 de setembro de 2016

Back from the grave!

Voltando à escrever depois de muito tempo longe deste blog.
Muitas mudanças me influenciaram nos últimos anos, vida nova, trabalho novo, cidade nova, muitos estudos, porém a mesma vontade de disseminar conhecimento.


"Nenhum conhecimento tem valor se não puder ser dividido."

E como já disse o Rei do Pop: "It's close to midnight and something evil's lurking in the dark..."