How to setup your personal tor network3/16/2023 Well, the solution I came up with was to create a transparent Tor proxy using a separate VM to act as a router, the virtual machine(s) used for research will then pass all traffic through Tor (with zero configuration or software, and without even being aware the proxy exists). Do you use your real IP? Do you use 3rd party software such as proxifier to try and force everything through tor, hoping no software leaks your IP to the bad guys? Do you even run your entire system through a VPN while you reverse and have to reconnect all your software afterwards? As most security researchers know there’s always a big decision with analyzing malware or exploits in a VM, most people would prefer to reverse in an offline environment, but if you’re monitoring C&C communications or a live exploit kit, this isn’t viable. Although the methods in this article can be used for proper anonymity outside of the tor browser, the main focus is creating a secure tor based research environment.
0 Comments
Leave a Reply.AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |