Skip to main content

DEEP WEB – Part 3



TOR – Bridges

When world getting addicted to the new technologies ,The rulers of the world started spying on the world and started limiting resources to the world which the whole world wanted to view

In my last article , i said you “How To Access Dot Onion Sites” using tor
I want to clear one thing here , privacy and Anonymity are two different concepts ,Tor guarantees you in providing Anonymity  and Privacy its all depends on you .
Tor is not responsible for your stupidity in revealing your original identity while using Tor, I remember one researcher said 81% of the tor users are vulnerable , he might be true . Because i admit 81% of the users use tor for day to day internet life using same usernames and passwords and most of them never heard of NoScript and Never knew how to update the browser
In my upcoming articles I will guide through the anonymity and privacy while using Darknets
so for now , will concentrate on TOR BRIDGES
Thank god , Am from a country where using Tor is not a big deal
But there are some countries who block Tor usage and ISP will be tracking your traffic (although it will be encrypted , ISP will come to know that you are using Tor but not for what purpose)
In this scenario , we need to play with the ISP and continue using tor with no restrictions
There are two options to use Bridges , tor by default provides some bridges which you can get it from their official website , but since they are listed publicly there are many chances that censors will block those connections .In this case you need to look for other bridges

Obfuscated Bridges and Pluggable Transports :
censors have found ways to block Tor even when clients are using bridges.They use some special boxes at ISP to detect Tor,when Tor is detected they block the traffic flow.To overcome this Tor introduced pluggable transports . These transports manipulate all tor traffic between client and its first hop such that it is not identifiable as a Tor connection. If the censor can’t decide if the connection is a Tor connectiom , then they are less likely to block it. But pluggable transports are not immune to detection, if a censor is given enough time they can be detected Tor provides  fte , meek-amazon ,meek-azure,obfs3,obfs4,scramblesuit Among all these obfs3 is most recommend , you can get the bridges on the tor offcial sites , for more custom bridges you can visit to BridgeDB

Understanding A Bridge configuration Line:

 
141.201.27.48:443 4352e58420e68f5e40bf7c74faddccd9d1349413
This is how a bridge looks like :
The first element is the IP address of the bridge: '141.201.27.48' The second element is the port number: '443' The third element, the fingerprint (unique identifier of the bridge), is optional: '4352e58420e68f5e40bf7c74faddccd9d1349413'
some bridges tells about the pluggable transport technology as like :


obfs3 141.201.27.48:420 4352e58420e68f5e40bf7c74faddccd9d134941
In this obfs3 tells about the pluggable transport technology

Adding Bridges In Tor Browser When Tor Does not Work :
1) To add a bridge, follow the instructions on screen. Click the “Configure” button.

2) If you must configure a proxy then select “Yes” and enter the details on the following page.
If you do not use a proxy then select “No” and click “Next”.
If you do not know if you must configure a proxy then you likely do not need to do it.


3) After you configure a proxy or skip over that configuration page, the following page asks “Does your Internet Service Provider (ISP) block or otherwise censor connections to the Tor Network?”. Select “Yes” and then click “Next”.

4) Now you have two configuration options. You can use bridges which are preconfigured and provided with Tor Browser, or you can specify your own bridge(s).

5) If you want to use one of the provided bridges, then choose the transport type you want to use. obfs3 is currently the recommend type, but depending on where you are located another type may work better for you.

6) Alternatively, if you want to use a custom bridge, then select “Enter custom bridges” and copy-and-paste the bridge information into the textbox.

7) After you decide which bridges you want to use, click “Connect”. Tor should now be able to load successfully and the browser window should appear.

 
Adding Bridge To Tor Browser When Tor Does Work :
1)  Start Tor Browser:

 

2) To begin using bridges, open Tor Browser’s Network Settings:

 

3) Select “My Internet Service Provider (ISP) blocks connections to the Tor network”:

 

4) Now you have two configuration options. You can use bridges which are preconfigured and provided with Tor Browser, or you can specify your own bridge(s).

5) If you want to use one of the provided bridges, then choose the transport type you want to use. obfs3 is currently the recommend type, but depending on where you are located another type may work better for you.

6) Alternatively, if you want to use a custom bridge, then select “Enter custom bridges” and copy-and-paste the bridge information into the textbox.
In the upcoming articles .. i will continue with other Tor services

Also Read :- DEEP WEB - Part 1

                       DEEP WEB - Part 2


NOTE: This is for educational purpose only we are not responsible for any type of inconvenience caused by reader.

Comments

Popular posts from this blog

Social Engineering Toolkit (SET)

Social Engineering Toolkit  (SET) is an advanced,  multifunctional, and easy-to-use computer-assisted social engineering toolset, created by the founders of  TrustedSec (https://www.trustedsec.com/). It helps you prepare the most effective way to exploit client-side application vulnerabilities and makes a fascinating attempt to capture the target's confidential information (for example, e-mail passwords). Some of the most efficient and useful attack methods employed by SET include targeted phishing e-mails with a malicious file attachment, Java applet attacks, browser-based exploitation, gathering website credentials, creating infectious portable media (USB/ DVD/CD), mass-mailer attacks, and other similar multiattack web vectors. This combination of attack methods provides you with a powerful platform to utilize and select the most persuasive technique that could perform an advanced attack against the human element.

 To start SET, navigate to  Applications  |  Kali Linux  |  Expl…

Cracking Wifi Using :Fern(GUI)

Fern(GUI)

As a part of Kali linux , fern can be directly used from kali linux , i would be recommending the use of kali because while using other linux environments it could be a trouble because while using fern it automatically detects the path of aircrack-ng and python installed , while in other environments it is needed to set it manually...so follow the following steps :-->

1.) Download kali linux iso and make a bootable pendrive .....if you dont know how to make bootable pendrive  then follow the steps given in blog of trinity rescue kit

Kali linux iso (amd64) recommended -->here
Link to trinity rescue kit blog --> here


 2.)Open Kali linux Goto Applications-->Wireless Attack--> Fern

3.)Select Interface card wlan0

4.)Double click any where in GUI

5.)Select enable x-terms ...so that you can view that happening ...while through a automated program...

6.)Click on select network

7.)Choose the type of network that is WEP/WPA

8.)I would recommend to add dictonary file .…

Deep Web - Part 1

What is deep web ?

Deep web Aka Invisible web Aka Hidden web are parts of the world wide web whose contents are not indexed by standard search engines.
LEVELS OF WORLD WIDE WEB :
SURFACE WEBBERGIE WEBDEEP WEBCHARTER WEBMARIANAS WEB SURFACE WEB :
The surface web also known as Visible web , Clearnet , Indexed web or Lightnet is that portion of the world wide web that is readily available to the general public and searchable with standard web search engines. Level of web where vast majority of internet users are connected to and which is accessible in any nation that does not block internet access.E.g: Social media sites like Facebook, informational websites like Wikipedia, general websites, etc

BERGIE WEB :

It is the part of world wide web that is not indexed by search-engines,which is directly accessible and no proxy required. E.g: Google locked results, recently web crawled old content, pirated media, pornography etc
DEEP WEB:
Deep web Aka Invisible web Aka Hidden web are parts of the wo…