Anonsurf IP spoofing
Browse anonymously in Kali Linux with Anonsurf
Anonsurf
Anonsurf will anonymize the entire system under TOR using IPTables. It will also allow you to start and stop i2p as well.
Download Anonsurf
Clone anonsurf from GIT
root@kali:~# git clone https://github.com/Cyber-MA/kali-anonsurf.git
Cloning into 'kali-anonsurf'...
remote: Counting objects: 275, done.
remote: Total 275 (delta 0), reused 0 (delta 0), pack-reused 275
Receiving objects: 100% (275/275), 163.44 KiB | 75.00 KiB/s, done.
Resolving deltas: 100% (79/79), done.
Checking connectivity... done.
root@kali:~#
It also changes your resolver configuration to the following:
root@kali:~# cat /etc/resolv.conf
nameserver 127.0.0.1
nameserver 209.222.18.222
nameserver 209.222.18.218
If you don’t like using Private Internet Access DNS, simply the change DNS in the following lines in /etc/init.d/anonsurf
script:
echo -e 'nameserver 127.0.0.1\nnameserver 209.222.18.222\nnameserver 209.222.18.218' > /etc/resolv.conf
echo -e " $GREEN*$BLUE Modified resolv.conf to use Tor and Private Internet Access DNS"
Start anonsurf
root@kali:~# anonsurf start
* killing dangerous applications
* cleaning some dangerous cache elements
[ i ] Stopping IPv6 services:
[ i ] Starting anonymous mode:
* Tor is not running! starting it for you
* Saved iptables rules
* Modified resolv.conf to use Tor and Private Internet Access DNS
* All traffic was redirected throught Tor
[ i ] You are under AnonSurf tunnel
root@kali:~#
Find your new Public IP
root@kali:~# anonsurf myip
My ip is:
1xx.1xx.2xx.1xx
Restart anonsurf
root@kali:~# anonsurf restart
* killing dangerous applications
* cleaning some dangerous cache elements
[ i ] Stopping anonymous mode:
* Deleted all iptables rules
* Iptables rules restored
[ i ] Reenabling IPv6 services:
* Anonymous mode stopped
* killing dangerous applications
* cleaning some dangerous cache elements
[ i ] Stopping IPv6 services:
[ i ] Starting anonymous mode:
* Tor is not running! starting it for you
* Saved iptables rules
* Modified resolv.conf to use Tor and Private Internet Access DNS
* All traffic was redirected throught Tor
[ i ] You are under AnonSurf tunnel
Stop anonsurf
root@kali:~# anonsurf stop
* killing dangerous applications
* cleaning some dangerous cache elements
[ i ] Stopping anonymous mode:
* Deleted all iptables rules
* Iptables rules restored
[ i ] Reenabling IPv6 services:
* Anonymous mode stopped
Testing anonymity
The not so obvious thing people doesn’t check is if they are leaking DNS. I usually do it from http://dnsleak.com/ as shown on my post from setting up VPN. However, I did not get any results back, so I used https://www.perfect-privacy.com/ and https://torguard.net/ and they seems to think I am in Netherlands or Belgium … so all good.
You can also check if you’re leaking IPv6 in here: http://ipv6leak.com/.
Font: blackMORE Ops