Amazon Web Services is currently experiencing an outage that may impact your experience on the Cybrary application. We apologize for any inconvenience and will be monitoring this situation closely
How to Use TOR (BSWJ)
Find your way around the dark web with this “How to Use Tor (BSWJ)” course. If you are interested in ethical hacking, learn about this tool that will allow you to surf the web anonymously and access sites outside the “clear net.” Joe Perry will show you how in this installment of “Breaking Stuff with Joe” (BSWJ).
Welcome to Breaking Stuff with Joe, where we review some of the most powerful cybersecurity tools available for use in Kali Linux. In this section, we will be discussing TOR, a freely available means of using the internet anonymously and accessing sites outside the “clear net”. TOR is extremely versatile, and has been used by government officials, hackers, and criminals alike. As a disclaimer: We do not advocate any illegal activity, and any TOR browsing should be done in a safe and controlled environment. You can learn more on this topic and countless others by creating an account on Cybrary, simply click the link at the top of this page.
Where does TOR come from?
Let’s start with some basic background: TOR was initially developed by the US government for the purpose of hiding and encrypting communications within the United States Intelligence Community. The United States Intelligence Community, known shorthand as the IC, comprises of 17 different intelligence organizations. This includes well-known intelligence organizations such as the Central Intelligence Agency (CIA) and the Intelligence Branch of the Federal Bureau of Investigation (FBI). Like many other crucial technologies, it was developed with government/military applications in mind and then applied towards private and illicit enterprises. Along with the fact that TOR was developed with backdoor monitoring capabilities for the government, this may surprise those who initially saw TOR as an anti-establishment means of bypassing surveillance.
How can we use TOR?
How can we use TOR on Kali Linux? First off, you do not want to use TOR in root-user mode. Kali Linux defaults to launching everything with root permissions as a matter of convenience. If a vulnerability is exploited in your TOR browser while using it with root permissions, your device can easily be compromised. In order to prevent this, create a new user without root permissions using this command in the terminal:
adduser --home /newuser newuser
Feel free to replace “newuser” with any username of your choice. Once you’ve created your non-root user, use these commands to install the browser, configure permissions, and launch:
apt install torbrowser-launcher
To configure permissions, allowing newuser to run the program:
To launch the web browser:
sudo –u newuser –H torbrowser-launcher
After some feedback messages in the terminal, the web browser should then launch and be ready to use. You can browse standard, “clear net” sites anonymously, or anonymously use standard sites to research and find .onion links that take you to the “dark net”. Be extremely careful when browsing .onion sites, as the “deep web” is full of illegal activity and unwanted intrusions outside the law. Just a few incautious clicks can easily put you at legal risk and ruin your life or career. Used wisely and with proper preparation, TOR can be a very valuable tool for anonymity and secure communications.
George Mcpherson and
(Disclaimer: Breaking Stuff with Joe is a Cybrary series that will be running indefinitely. You will not earn CEU/CPE hours by watching any individual 'Breaking Stuff with Joe' episode. However, you can still earn a certificate of completion for each episode completed.)
This course is part of a Career Path:
No items found.
I’m a graduate of the Joint Cyber Analysis Course, the Advanced Cyber Training Program, and the Computer Network Operations Development Program. I’ve offered consultation to organizations of sizes from 10 employees to tens of thousands of employees, and I’ve contributed to dozens of security curricula and training programs.
In my rare free time, I write tabletop and live action games, and manage events and gaming conventions. In the even more rare downtime between those events, I enjoy reading and rowing. In 2019 I’m working on a personal project to read 100 new books by the end of the year.
Certificate of Completion
Complete this entire course to earn a How to Use TOR (BSWJ) Certificate of Completion