KaliTorify : Transparent Proxy Through Tor For Kali Linux OS

Kalitorify is a shell script for Kali Linux which use iptables settings to create a Transparent Proxy through the Tor Network, the program also allows you to perform various checks like checking the Tor Exit Node (i.e. your public IP when you are under Tor proxy), or if Tor has been configured correctly checking service and network settings.

In simple terms, with kalitorify you can redirect all traffic of your Kali Linux operating system through the Tor Network.

Also Read: RecScanSec – Reconnaisance Scanner Security

What is Transparent Proxy through Tor?

Transparent proxy is an intermediary system that sit between a user and a content provider.

When a user makes a request to a web server, the transparent proxy intercepts the request to perform various actions including caching, redirection and authentication.

Transparent proxy via Tor means that every network application will make its TCP connections through Tor; no application will be able to reveal your IP address by connecting directly.

In the Tor project wiki you find an explanation of what is the “Transparent Proxy through Tor” and related settings. Please read it if you want to use kalitorify safely.

Installation

Install Dependencies:

sudo apt update && sudo apt full-upgrade -y
sudo apt install tor -y

Install Kalitorify & Reboot:

git clone https://github.com/brainfucksec/kalitorify
cd kalitorify/
sudo make install
sudo reboot


Usage

Options

-t, –tor

start transparent proxy through tor

-c, –clearnet

reset iptables and return to clearnet navigation

-s, –status

check status of program and services

-i, –ipinfo

show public IP

-r, –restart

restart tor service and change IP

Security

kalitorify is produced independently from the Tor anonimity software and carries no guarantee from the Tor Project about quality, suitability or anything else, please read these documents to know how to use the Tor network safely:

Tor General FAQ

Whonix Do Not recommendations

kalitorify provides transparent proxy management on Tor but does not provide 100% anonymity.

From Arch Linux Wiki about Transparent Torification: Using iptables to transparently torify a system affords comparatively strong leak protection, but it is not a substitute for virtualized torification applications such as Whonix, or TorVM. Applications can still learn your computer’s hostname, MAC address, serial number, timezone, etc. and those with root privileges can disable the firewall entirely. In other words, transparent torification with iptables protects against accidental connections and DNS leaks by misconfigured software, it is not sufficient to protect against malware or software with serious security vulnerabilities.

For this, you should change at least the hostname and the MAC address:

Setting the Hostname on Debian

Changing MAC Address on Linux

Checking for leaks:

After starting kalitorify you can use tcpdump to check if there are any internet activity other the Tor:

First, get your network interface:

ip -o addr
or
tcpdump -D

We’ll assume its eth0.

Next you need to identify the Tor guard IP, you can use ssnetstat or GETINFO entry-guards through the tor controller to identify the guard IP.

Example with ss:

ss -ntp | grep $(cat /var/run/tor/tor.pid)

With the interface and guard IP at hand, we can now use tcpdump to check for possible non-tor leaks. Replace IP.TO.TOR.GUARD with the IP you got from the ss output.

tcpdump -n -f -p -i eth0 not arp and not host IP.TO.TOR.GUARD

You are not supposed to see any output other than the first two header lines. You can remove and not host IP to see how it would look like otherwise.

R K

Recent Posts

How AI Puts Data Security at Risk

Artificial Intelligence (AI) is changing how industries operate, automating processes, and driving new innovations. However,…

2 hours ago

The Evolution of Cloud Technology: Where We Started and Where We’re Headed

Image credit:pexels.com If you think back to the early days of personal computing, you probably…

4 days ago

The Evolution of Online Finance Tools In a Tech-Driven World

In an era defined by technological innovation, the way people handle and understand money has…

4 days ago

A Complete Guide to Lenso.ai and Its Reverse Image Search Capabilities

The online world becomes more visually driven with every passing year. Images spread across websites,…

5 days ago

How Web Application Firewalls (WAFs) Work

General Working of a Web Application Firewall (WAF) A Web Application Firewall (WAF) acts as…

1 month ago

How to Send POST Requests Using curl in Linux

How to Send POST Requests Using curl in Linux If you work with APIs, servers,…

1 month ago