1 00:00:00,180 --> 00:00:06,150 One thing that's very, very useful when you're an ethical hacker and you want to maintain your privacy 2 00:00:06,150 --> 00:00:10,680 or if you just like, if you're someone that just, you know, wants to remain anonymous on the web 3 00:00:10,680 --> 00:00:15,990 for whatever reason, there are a lot of people that are actually very paranoid about this kind of stuff. 4 00:00:15,990 --> 00:00:19,990 You know, like maybe somebody's watching, maybe the government is watching, maybe they are all. 5 00:00:20,280 --> 00:00:25,610 So you don't necessarily want them to know, you know, what you're exactly doing. 6 00:00:25,620 --> 00:00:27,270 That doesn't mean that you're doing bad things. 7 00:00:27,270 --> 00:00:28,860 You just want to maintain your privacy. 8 00:00:28,860 --> 00:00:29,280 Which is it? 9 00:00:29,280 --> 00:00:29,640 Right. 10 00:00:30,030 --> 00:00:37,200 So the Tor browser is a Web browser that allows users to browse the web while preventing surveillance 11 00:00:37,200 --> 00:00:37,770 and tracking. 12 00:00:37,950 --> 00:00:43,770 Now, this is achieved by rerouting all of your requests through three other nodes, which are just 13 00:00:43,770 --> 00:00:46,500 other computers in the Tor ecosystem. 14 00:00:47,400 --> 00:00:49,590 And you prewash use them as proxies. 15 00:00:49,590 --> 00:00:50,520 Think of it this way. 16 00:00:50,520 --> 00:00:58,020 So traffic is coming from your peers, from your router, and it's going out to the Web, but it's going 17 00:00:58,020 --> 00:00:59,640 through three other computers. 18 00:00:59,790 --> 00:01:03,230 And each time, you know, it's encrypted, each time it goes through another computer. 19 00:01:03,240 --> 00:01:06,780 So no one, no one is going to be able to decrypt this traffic. 20 00:01:07,020 --> 00:01:12,040 And then, number two, you're going to have a different identity when you're on the Web. 21 00:01:12,210 --> 00:01:13,890 This is very, very useful. 22 00:01:14,040 --> 00:01:19,860 And you're going to see that, you know, your security and privacy improves drastically, you know, 23 00:01:19,860 --> 00:01:22,190 if you were to use the term browser. 24 00:01:22,410 --> 00:01:29,340 So if you want to download this on our virtual machine, we could just do a simple get install TOR and 25 00:01:29,340 --> 00:01:34,510 then toward browser launcher and we can go ahead and try that out and see if we can get Tor on our copy 26 00:01:34,530 --> 00:01:34,910 machine. 27 00:01:35,220 --> 00:01:37,230 OK, guys, so we're back at our calling machine. 28 00:01:37,240 --> 00:01:42,690 So what we need to do really quickly before we can install TOR is actually update the repositories that 29 00:01:42,690 --> 00:01:47,250 are callisthenics, machines actually pulling updates and install requests from. 30 00:01:47,270 --> 00:01:55,350 So what we're going to do is we slash ATC, slash ABC slash sources list and you're going to want to 31 00:01:55,350 --> 00:01:56,400 add this line right here. 32 00:01:56,400 --> 00:02:02,760 So pause the video and type this line exactly as you see it right here inside of this file. 33 00:02:03,210 --> 00:02:05,130 And then you're going to want to do it right quitte. 34 00:02:06,270 --> 00:02:18,320 Or just a quit go for me, didn't anything, and then now if you do a pseudo Apte Dash gets update, 35 00:02:18,330 --> 00:02:25,740 it should actually be able to all you know, from the repository, you know, all the different files 36 00:02:25,740 --> 00:02:26,490 that it needs. 37 00:02:26,700 --> 00:02:32,520 And then this if this works right here, you should be able to update, you know, all the things on 38 00:02:33,060 --> 00:02:40,950 Linux, but you should also be able to go through and actually do the ABG command to install TOR so 39 00:02:40,950 --> 00:02:43,260 you can go ahead of did your system, if you like to. 40 00:02:43,800 --> 00:02:50,880 If you do have an issue and it actually isn't finding tor still another command that may help you may 41 00:02:50,880 --> 00:02:52,220 or may not have to do this. 42 00:02:52,590 --> 00:03:05,840 So the ABC dash key space ATV space that says key server is KP calling for this for as long as he's 43 00:03:06,210 --> 00:03:13,590 G and you p g dot net and then just put dash dash i c v dash. 44 00:03:13,860 --> 00:03:23,880 He's inner is going to ask you this command and this is just going to go through and allow us to be 45 00:03:23,880 --> 00:03:26,160 able to actually pull, you know, fondness for pastoralist's. 46 00:03:26,160 --> 00:03:29,840 If you're having an issue, a may or you may or may not have to do that one. 47 00:03:30,360 --> 00:03:34,350 So after that, you've got an to update and see if it works. 48 00:03:35,340 --> 00:03:37,310 And if it did, you're going to be good to go. 49 00:03:37,320 --> 00:03:51,090 So what we can do now is pseudo Apte Dash Daggett's install Tor and then we're going to do Tor browser 50 00:03:51,990 --> 00:03:56,670 dash launcher and now it's going to pull from online. 51 00:03:56,910 --> 00:03:58,220 Ask if we want to continue. 52 00:03:58,410 --> 00:03:59,020 Yes. 53 00:03:59,070 --> 00:04:05,400 So now you type in capital y enter and now it's going to go through and actually download Tor from us. 54 00:04:05,730 --> 00:04:11,640 And then once that, once that's done we're going to be able to, you know, go ahead and launch tours. 55 00:04:11,640 --> 00:04:15,800 And once this is done, we're going to check back in. 56 00:04:15,810 --> 00:04:17,160 I'm going to teach you guys how to launch it. 57 00:04:17,700 --> 00:04:21,990 OK guys, so we have to install my install finished. 58 00:04:22,260 --> 00:04:30,540 So now let's go ahead and use the Tor browser launcher, the launcher. 59 00:04:31,440 --> 00:04:36,750 And what is it going to do since is the first time you're doing it has to download some files that go 60 00:04:36,750 --> 00:04:37,900 ahead and get you set up. 61 00:04:37,900 --> 00:04:43,350 But once this is done, it's going to open up the Tor browser for us. 62 00:04:43,500 --> 00:04:45,000 So let's just give it a minute. 63 00:04:45,450 --> 00:04:47,190 It's installed in the application. 64 00:04:47,850 --> 00:04:53,820 OK, so once it's installed Tor browser launch, so as you can see, it opened up this window by itself. 65 00:04:54,120 --> 00:05:00,540 So are you going to want to do is if you want to configure some settings, you can, but you say connect 66 00:05:00,540 --> 00:05:05,190 and then it's connecting this to the torch relay and it's going to encrypt all of our communications 67 00:05:05,190 --> 00:05:11,430 online and routing through all the different nodes that have said that. 68 00:05:11,430 --> 00:05:14,310 I explained before and we're pretty much good to go. 69 00:05:14,320 --> 00:05:17,550 You'll be browsing anonymously, not anonymously through Tor. 70 00:05:17,580 --> 00:05:21,600 It may be a little bit slower than you know if you're browsing in just a regular browser. 71 00:05:21,810 --> 00:05:26,850 That's just because of all the, you know, extra encryption and traveling that our data has to do when 72 00:05:26,850 --> 00:05:27,690 we're using TOR. 73 00:05:27,900 --> 00:05:30,990 But it's definitely worth the privacy.