brainfucksec / kalitorify

Transparent proxy through Tor for Kali Linux OS
GNU General Public License v3.0
1.04k stars 225 forks source link

just a question #69

Closed d0lla1976 closed 1 year ago

d0lla1976 commented 2 years ago

I use kalitorify all the time.. I have been doing some testing and my question is, Does kalitorify run all my traffic including my terminal information through kalitorify?

brainfucksec commented 2 years ago

Hi @d0lla1976, what do you mean exactly for "terminal information", the terminal emulator is an application like the others.

d0lla1976 commented 2 years ago

yeah brother i get that.. I guess what i'm asking is, If i run an nmap scan against a target and i have kalitorify running will the scan i'm running in the terminal go through tor (kalitorify)? Once kalitorify is activated does every outside connection I attempt run through tor (kalitorify)?

BTW. I really appreciate your work and you taking the time to answer my questions..

Zbergen-cli commented 2 years ago

@d0lla1976, Yes, everything goes through Tor, but there is no stream isolations and will not be. That is, after enabling kalitorify, the likelihood that all connections will use the same ip address is very high. If you use the tor browser you will also get tor over tor which will also not be fixed.

brainfucksec commented 1 year ago

The topics that @Zbergen-cli has excellently explained to you are all presents in the README (see: the Security section). You can delve into the various topics from the indicated sources.

Also see the basics, like:

https://en.wikipedia.org/wiki/Proxy_server

https://gitlab.torproject.org/legacy/trac/-/wikis/doc/TransparentProxy