Thursday, 8 October 2015

On 02:31 by Himanshu Joshi in ,    No comments
This article is a quick, comprehensive guide on setting up your newly installed KaliLinux2.0 (very attractive new GUI by the way) for secure encrypted browsing. Following this guide will enable you to “surf the web” with your back covered (like a pro) safe from prying eyes (GCHQ cough, NSA cough cough) packet sniffing and MITM attacks.
Dependencies:
ssh server
gnome session manager

Step 1: Utilize an SSH Server

# service ssh start
SSH provides a secure environment through encryption, enabling you to tunnel your traffic and transfer a variant of files privately. Directing your network traffic through an SSH tunnel will encrypt the packets, rendering any captured packets unreadable.

Step 2: Install Gstm (Gnome SSH Tunnel Manager)

# apt-get -y install gstm
Installing gstm is easy, it already exists in the kali repository, copy and pasting the above code should be sufficient.

Step 3: Configure Gstm (Gnome SSH Tunnel Manager)

Configure to match the configurations in below screenshot.
SOCKS (Socket secure) proxy enables the routing of network packets through a proxy server (local socks port 8080), thwarting MITM attacks.

Here You Will See the Tunnel You Named in the Previous Step. The Case Kali__Tunnel.

Step 4: Start the Kali Tunnel session

Step 4: Configure Your Browser to Match the Screenshot Below.

Step 5: Optional. For Testing Purpose Only

To confirm that you browser sessions are encrypted. Start a wireshark session. Capture the loopback/lo interface. Note your traffic is now encrypted via the SSH protocol.
Observe the SSH highlighted session. Now all browser traffic is encrypted.
Feel free to ask any questions in the comments section of this page.

0 comments:

Post a Comment