Skip to main content

Installing TOR browser

There are many ways of installing TOR but an easy step is to go to TOR website, download, extract the file and install it on Kali Linux. So, here we go.

STEPS:

2. Click on Download.
3. Navigate 32 bit or 64 bit for GNU/Linux, click on Download and then select Save file and press ok.
4. Once the file is downloaded, open terminal and type cd command to go to the directory where the file has been downloaded.
5. Decompress the file by running tar with xvzf parameters.
6. Once the file is decompressed, goto the tor folder.
7. Edit the file start-tor-browser in a text editor, like leafpad, by giving admin right
8. Run the browser, either by clicking on start-tor-browser or through terminal window by typing ./start-tor-browser.

Now let's see these by an example. Let's say, at the time of release, the filename of the tor browser is tor-browser-gnu-linux-i686-2.3.25-15-dev-en-US.tar.gz(for 32-bit, it may different depending on the architecture of your OS). This file has been downloaded in my Downloads directory. So, here are the steps that I performed.

(a) root@kali:~#cd Downloads
(b) root@kali:~/Downloads#tar -xvzf tor-browser-gnu-linux-i686-2.3.25-15-dev-en-US.tar.gz
(c) root@kali:~/Downloads#cd tor-browser_en-US
(d) root@kali:~/Downloads/cd tor-browser_en-US#leafpad start-tor-browser

Once the file is opened in leafpad, press ctrl + f and type root and then search. Now change the value from 0 to 1, as you are allowing tor browser file with administrative privilege.
Save the file and exit.
(e) root@kali:~/Downloads/cd tor-browser_en-US#./start-tor-browser to start tor browser.






Comments

Popular posts from this blog

Upcoming Book- Kali Linux Revealed: Mastering the Penetration Testing Distribution

More exciting news! In the past year, Kali Linux Official Team has been working internally on an Official Kali Linux book – Kali Linux Revealed: Mastering the Penetration Testing Distribution . This is the first official Kali book from Offsec Press , and is scheduled for release on June 5th, 2017 . Kali Linux Revealed will be available in both hard copy and online formats. Keeping the Kali Linux spirit, the online version of the book will be free of charge, allowing anyone who wishes to hone their skills and improve their knowledge of Kali to do so at no cost. This book, together with our official Kali documentation site will encompass the body of knowledge for the Kali Linux Certified Professional   (KLCP) .

Wordpress hacking - How to install / run wpscan on windows xp / windows 7 / windows 10

HOW TO RUN WPSCAN ON WINDOWS Byrockstardevil Requirements: rubyinstaller Development Kit for rubyinstaller curl DLL for windows : libcurl.dll 1 - install rubyinstaller you must have Ruby 2.2.3 version . download links here : http://rubyinstaller.org/downloads/ for more info : https://github.com/oneclick/rubyinstaller/wiki 2 - install Development Kit for rubyinstaller download link : http://rubyinstaller.org/downloads/ how to install : https://github.com/oneclick/rubyinstaller/wiki/Development-Kit if you face that problem  "unknown encoding name -  (ArgumentError)" just type "chcp 1252" in cmd and hit enter 3 - install libcurl.dll A - Download libcurl.dll from : http://www.confusedbycode.com/curl/ B - copy libcurl.dll copy  libcurl.dll into ruby bin folder or wpscan folder and make sure to add it to your PATH. I also added .DLL to PATHEXT ex : C:\Ruby21-x64\bin\ you can visit : http://www.computerhope.com/issues/ch000549.htm to know to set the p...

Kali Linux: A complete InfoSec Distro

BackTrack has always been a popular choice when it comes to security and penetration testing. This open source distro has gained a lot of popularity and was rolled till version 5 with frequent changes to the variants. This project from Offensive Security has been moved from Ubuntu to Debian and the operating system is now renamed as Kali Linux. If you have installed a fresh copy of Kali Linux, then you might have noticed some awesome security and penetration tools under Kali Linux drop down menu list. These tools are powerful and yet efficient to use. If you go through the menu list of security tools, you might have noticed that few like Wireless Attacks, Forensics and Reverse Engineering is added, which is quite impressive. One more section has been added in the list, ie Hardware Hacking. One more thing that you would be happy to see is Arduino kit on the list. Arduino is a single-board microcontroller designed to make the process of using electronics in multi-disciplinary projects mo...