1 00:00:10,470 --> 00:00:17,070 So let us continue with setting up a penetration lab section, and in this lecture we are going to see 2 00:00:17,070 --> 00:00:19,410 how to download and install the browser. 3 00:00:20,280 --> 00:00:23,460 But before installing Tor browser, what is your browser? 4 00:00:23,490 --> 00:00:25,450 And why do we use Tor browser? 5 00:00:26,430 --> 00:00:27,620 Not all of us. 6 00:00:27,690 --> 00:00:34,620 The best anonymous web browsing available today and researchers are hard at work improving Tor's anonymity 7 00:00:34,620 --> 00:00:35,250 properties. 8 00:00:35,670 --> 00:00:36,840 Now, what does this mean? 9 00:00:37,680 --> 00:00:40,610 Not all is a browser which hydrogen anonymity. 10 00:00:41,040 --> 00:00:46,440 Like if you're if you're searching for some exquisite product and if you purchase that product, the 11 00:00:46,980 --> 00:00:52,720 ISP that is your Internet service provider won't know that you have actually searched for that product. 12 00:00:52,740 --> 00:00:58,680 Now, how this is useful, because even if you're a security expert and you're trying to hack or you're 13 00:00:58,680 --> 00:01:05,250 trying to catch a hacker, that hacker should know that you're catching for him using Tor browser, 14 00:01:05,250 --> 00:01:10,740 you can search for resources which are not publicly available on Google or Yahoo! 15 00:01:10,740 --> 00:01:11,820 Or any other search engine. 16 00:01:12,570 --> 00:01:18,010 But the browser is basically one of the most advanced tools used to hide your anonymity. 17 00:01:18,030 --> 00:01:24,930 It constantly shifts your IP address on a particular website and basically it is used to hide your identity. 18 00:01:25,650 --> 00:01:29,160 And this is very useful if you are a security expert. 19 00:01:29,190 --> 00:01:34,330 It's very useful, but if you're considering to hide her anonymity as a hacker, it is about objectives. 20 00:01:34,680 --> 00:01:39,270 So it depends upon how do you use Tor browser then. 21 00:01:39,270 --> 00:01:45,870 Yes, so that your browser is a Web browser, that anonymous is your Web traffic using the term network, 22 00:01:46,260 --> 00:01:53,790 making it easy to protect your identity online if you are investing or or if you are investing some 23 00:01:53,790 --> 00:02:02,580 money in a competitor or you are investigating against a competitor hacker researching on opposing person 24 00:02:02,580 --> 00:02:03,870 in a legal dispute. 25 00:02:03,870 --> 00:02:09,600 Or just think it's creepy for your ISP or the government to know what websites you visit. 26 00:02:11,390 --> 00:02:16,910 Then browsing the web overthought is slower than the Clearnet, and some major websites blocked our 27 00:02:16,910 --> 00:02:18,100 users now. 28 00:02:18,830 --> 00:02:24,530 It is also illegal in authoritarian regimes that want to prevent the citizens from reading, publishing 29 00:02:24,530 --> 00:02:26,190 and communicating anonymously. 30 00:02:26,570 --> 00:02:31,360 Now, most of the people who want to write against their state or governments generally use your browser 31 00:02:31,430 --> 00:02:35,000 to publish anonymously and might be unauthorized. 32 00:02:35,000 --> 00:02:37,850 In some countries, it might be illegal in some countries. 33 00:02:37,880 --> 00:02:43,850 So before you install and download to make sure that your country allows start now, since I live in 34 00:02:43,850 --> 00:02:45,860 India, it is allowed to use the. 35 00:02:47,240 --> 00:02:53,210 The browser is available for Linux, Mac and Windows and has also been posted to Mobile, so so this 36 00:02:53,210 --> 00:02:59,120 is the first browser that provides complete anonymity of the user and you can download the next up versions. 37 00:02:59,120 --> 00:03:03,150 And I will also show you how to set up a browser for your Windows machine. 38 00:03:03,500 --> 00:03:05,210 So let us get started. 39 00:03:07,780 --> 00:03:09,910 So what you have to do is you have to go to Google. 40 00:03:12,300 --> 00:03:14,730 I didn't have to type download the. 41 00:03:20,810 --> 00:03:22,430 Download our browser. 42 00:03:23,990 --> 00:03:31,060 The first web website, w w w dot dot dot org is the official Web site to download the project. 43 00:03:31,400 --> 00:03:34,280 So let us click there, download our project. 44 00:03:34,880 --> 00:03:37,250 You can see this is the latest updated version. 45 00:03:37,250 --> 00:03:42,880 Again, Setout is available for Windows, OSX, Linux and Android also. 46 00:03:43,430 --> 00:03:49,610 So yes, they will click download for Windows and we will wait till dark browser downloads. 47 00:03:50,090 --> 00:03:55,730 It will take around 10 to 15 minutes to get downloaded since it's just a 70 and the file. 48 00:03:56,090 --> 00:03:58,610 So let us wait till Target's downloaded. 49 00:04:04,640 --> 00:04:09,380 And there you go, that our browser has been downloaded, it will just click the file. 50 00:04:15,530 --> 00:04:20,450 And will ask you to please select a language, so I will go with English. 51 00:04:21,080 --> 00:04:23,850 Now it is asking where to install the Dora browser. 52 00:04:24,230 --> 00:04:28,510 I will just install it on it as a browser to some different drive. 53 00:04:29,270 --> 00:04:32,150 I will install it in my to see. 54 00:04:32,690 --> 00:04:34,250 I'll just intelligent stop. 55 00:04:35,830 --> 00:04:42,970 So installed wherever you want, choose your preferred destination to install your browser and just 56 00:04:42,970 --> 00:04:45,490 wait till it gets installed completely. 57 00:04:51,620 --> 00:04:56,600 So now you can see that the setup of the door has been successfully installed, it is installed and 58 00:04:56,960 --> 00:05:00,970 yes, you have to start many shortcuts if you want. 59 00:05:00,980 --> 00:05:04,100 And let's just click finish Turandot or Brazeau. 60 00:05:09,460 --> 00:05:17,530 Now, make sure that you do not touch the window of your browser to not maximize it, because some experts, 61 00:05:17,530 --> 00:05:23,820 some security experts claim that even if you maximize your window, that may somehow leak your IP address. 62 00:05:23,920 --> 00:05:29,110 If you want to stay completely anonymous about your search, about your search engines and your data, 63 00:05:29,440 --> 00:05:31,470 please do not expand the window. 64 00:05:31,720 --> 00:05:35,410 I will follow that practice and I will just drag the window to the center. 65 00:05:36,610 --> 00:05:40,930 And I won't click here because this is this may reveal your identity. 66 00:05:41,530 --> 00:05:43,390 That is not a formal claim on that. 67 00:05:43,390 --> 00:05:50,080 But, yes, some security experts do say and do advise to keep the window to not maximize the window. 68 00:05:50,530 --> 00:05:51,430 Now, let us see. 69 00:05:51,430 --> 00:05:52,390 There are two options. 70 00:05:52,410 --> 00:05:54,760 Click that disconnect and configure. 71 00:05:55,120 --> 00:06:02,470 So the type of thing that click configure to adjust network settings, if a country that censors store 72 00:06:02,830 --> 00:06:07,550 such as Egypt, China, Turkey in the door is not allowed. 73 00:06:08,080 --> 00:06:09,940 So in my country, it is allowed. 74 00:06:09,980 --> 00:06:17,020 I will just say connect and it will directly connect to our proxy. 75 00:06:17,530 --> 00:06:19,420 And I will show you how Tarbox. 76 00:06:21,830 --> 00:06:29,390 Every time you have to follow this process before launching Tor, it takes some time to connect to the 77 00:06:29,900 --> 00:06:30,440 network. 78 00:06:34,090 --> 00:06:34,940 And there you go. 79 00:06:35,470 --> 00:06:38,960 We have successfully connected to the DA, rather, do not maximize the window. 80 00:06:39,370 --> 00:06:46,000 Now you can see that the default search engine is tactical, uh, which is a very useful search engine 81 00:06:46,000 --> 00:06:47,520 while you're searching anonymously. 82 00:06:48,280 --> 00:06:50,020 So this is how to get started. 83 00:06:50,020 --> 00:06:56,290 And I'll just search for, uh, let's say KVI, as is and Klecko. 84 00:06:57,570 --> 00:07:05,190 And yes, you can see CBS at Dr. Ghostwrote is using Dr. Ghoshal union to search and you if you click 85 00:07:05,190 --> 00:07:11,610 on the plus icon here, you can see that this is a Tasaki. 86 00:07:11,640 --> 00:07:13,020 It is a secure connection. 87 00:07:13,440 --> 00:07:19,470 And this circuit, this browser is directly connected to the doctor guru.com, where four different 88 00:07:19,470 --> 00:07:23,950 types, three different types, that is Germany, Sweden and against Germany. 89 00:07:24,440 --> 00:07:33,060 Now, if you want to change this, you just click a new circuit and you can see the browsers again loading 90 00:07:33,060 --> 00:07:36,570 and will again search CBS s. 91 00:07:37,950 --> 00:07:44,120 Let us see which connection or do we get right now, you can see Germany, United Kingdom and Germany, 92 00:07:44,580 --> 00:07:46,080 this is how we change now. 93 00:07:46,100 --> 00:07:53,480 If I go to commonalties scoring systems, I if you go to any random website and you can click here. 94 00:07:54,400 --> 00:08:00,880 You can again just click New Circuit and you can see the markets, and so this is how DOT is basically 95 00:08:00,880 --> 00:08:08,500 used to hide your IP address and you can browse on the Web anonymously without revealing your true identity. 96 00:08:08,860 --> 00:08:15,910 But make sure that you do not use DOT for any illegal purposes, because you might have heard that DOT 97 00:08:15,910 --> 00:08:17,680 is the only way to use the dark web. 98 00:08:17,680 --> 00:08:18,420 And that is right. 99 00:08:18,760 --> 00:08:26,190 But since are security experts going to follow our ethics and do not forget to not to maximize the window, 100 00:08:26,200 --> 00:08:28,360 keep it as it is, and then browse. 101 00:08:31,070 --> 00:08:34,420 So this was all for this lecture in the next lecture. 102 00:08:34,620 --> 00:08:40,670 See the basic commands and we'll see basically talk about the fine structures and different things about 103 00:08:40,670 --> 00:08:41,510 Kali Linux. 104 00:08:41,540 --> 00:08:43,250 So let us get started.