Becoming anonymous is a very good way to hide ourself form all kind of surveillance. But we get only few option because VPN is really bad, specially those free one. Free VPN’s keeps logs and we can be traced.
We can use TOR network, not the browser only. Tor can’t be traced easily it is very hard (practically close to impossible). Read our detailed article on
Tor.
We can use Tor as a default gateway for our network. Then all the traffic on our PC will transfer via Tor network and it’s not possible to trace us. We can do this manually with a server but manual configuration of this will consume a lot of time and hard work. Automated tools will help us.
This is not the first, previously we made an article on
AnonSurf, but that tool is not updated in last 3 years and we got a lot of issues.
In today’s article we gonna talking about
Nipe. This perl script enables us to directly route all our traffic from our computer to the Tor network through which we can use the internet anonymously without having to worry about tracked or traced back.
First of all we need to clone this repository from GitHub by using following command:
git clone https://github.com/htrgouvea/nipe
Then it will copied to our system we can go inside the directory using cd command:
The screenshot of the above commands is following:
Now we need to install libraries and dependencies by using following command:
sudo cpan install Try::Tiny Config::Simple JSON
Now for new comers cpan might be a strange command, cpan helps to install packages or modules for Perl. In simple words we can say ‘Python have pip‘ & ‘Perl have cpan‘.
After this we can install this Perl script using following command:
sudo perl nipe.pl install
Then the installation process will start. After the installation we got a notification that some services need to restart, here we press “TAB” button and select OK, as we can see in the following screenshot:
 |
NIPE requires to restart some services |
After this we can say that our installation process is done. Now we are ready to ROCK.
First of all we check the status of NIPE tool by applying following command:
sudo perl niple.pl status
The screenshot of the command is following:
Then we can start the tool by using following command:
sudo perl niple.pl start
Then we can see that NIPE has started and we can see the status in the following screenshot:
We have tested by opening dnsleaktest website to make sure that our original IP address is hided. Checking this will be beneficial for everyone.
When we are done we can off this Tor gateway and get back to our original IP address by applying following command:
After applying the above command NIPE will stop and we get back our original IP. We can check the status, as we did in the following screenshot:
NIPE makes Tor network our default gateway. This is how we can anonymise our total Kali Linux system. This process is enough secure. Practically cracking Tor is close to impossible but as we know theoretically everything is possible.
For any problem or issue we are always here to help. Let us know in the comment section below. We always reply.
Leave a Reply