Whonix for Ethical Hacking and Online Anonymity

Поделиться
HTML-код
  • Опубликовано: 26 окт 2024

Комментарии • 76

  • @NNAdmin
    @NNAdmin  11 месяцев назад +3

    Please consider Subscribing: studio.ruclips.net/channel/UC39GKRsNps38x7UzydcOZ9w
    Follow me on Twitter: twitter.com/NielsenNTWKING
    Chapters:
    00:00 Introduction
    00:57 What is Whonix?
    01:33 How does Whonix Work?
    04:50 Installing Whonix on Linux Hosts
    09:50 Linux Post Install Configuration and Best Practices
    18:32 Verifying Whonix and Tor Configuration
    19:34 System check for IP Leakage and overall heath
    21:00 Installing Whonix on Windows Hosts
    22:07 Importing Whonix OVA into VirtualBox
    23:20 Windows Post Install Configuration and Best Practices
    28:58 Verifying Whonix and Tor Configuration
    29:56 System check for IP Leakage and overall heath
    31:00 Famous Last Words

  • @4b5urd.
    @4b5urd. 11 месяцев назад +12

    Excellent video, my friend. You did whonix a lot more justice than I did trying to explain its role in the scheme of things in comments on your last video. Your videos articulate well and are approachable by most anyone, a great asset to the community and a helpful resource. Much appreciated

    • @NNAdmin
      @NNAdmin  11 месяцев назад +2

      Thank you kindly for all the nice words!

  • @Nick-r4b1t
    @Nick-r4b1t 4 дня назад +1

    Thanks. Well done. Keep posting videos.

  • @phillydee3592
    @phillydee3592 11 месяцев назад +3

    Thank you,this is the perfect environment to run Maltego for your OSINT investigations!!

    • @ytg6663
      @ytg6663 11 месяцев назад

      Can a government not order investigation of tor nodes located in their country ??

    • @Zemtex22
      @Zemtex22 11 месяцев назад

      @@ytg6663i’m pretty sure they run most of the tor nodes by now.

    • @Rage57350
      @Rage57350 10 месяцев назад

      ​@@ytg6663they could but it would take a massive amount of investigation to do so and would be very time consuming and costly. They'd have to start with an exit node in Tor which is usually going to be a rather large organization with probably thousands of not tens to hundreds of thousands of IPs before going back through the next node then on to the guard node, repeating the process through each node, and that's before even getting back to Whonix.

    • @phillydee3592
      @phillydee3592 4 месяца назад

      ​@ytg6663 Yes maybe but I think it would be very difficult as the proxies are scattered...however whoever controls the exit node might see yout data...

    • @jaygeeantonio
      @jaygeeantonio 2 месяца назад

      ​@@phillydee3592 Whats the difference between something like this and vim or nano /etc/proxychains.conf

  • @cajunphilippine
    @cajunphilippine 11 месяцев назад +4

    This is a good presentation my friend . Good information.

    • @NNAdmin
      @NNAdmin  11 месяцев назад

      Thank you kindly

  • @SamSepiol127
    @SamSepiol127 10 месяцев назад +2

    Seems interesting. I'll try it asap. Great video

  • @морс-ф3д
    @морс-ф3д 11 месяцев назад +1

    A big thank you for your very detailed tutorial!!! Its very interesting and clear👍🏻👍🏻👍🏻👍🏻👍🏻👍🏻

    • @NNAdmin
      @NNAdmin  11 месяцев назад

      Thank you, glad to hear it was helpful!

  • @aquahoodjd
    @aquahoodjd 10 месяцев назад +2

    Have you considered switching up your anonymity portion and incorporating the new node system setup by the members of The cult of the dead cow called Veilid?

    • @NNAdmin
      @NNAdmin  10 месяцев назад

      Not at this time, but I may put out a video on Veilid in the future.

  • @masterzoxsecofficial
    @masterzoxsecofficial 11 месяцев назад +2

    Great Job

  • @PAFBEAST
    @PAFBEAST 10 месяцев назад +2

    Is whonix better tan tailsOS? you should make a difference video about these two OS's

    • @NNAdmin
      @NNAdmin  10 месяцев назад +1

      Tails is meant to be installed on removable media, and is suitable for scenarios where you want a portable and disposable solution, such as using it on different computers without leaving any trace. Whonix, being a virtual machine setup, is more suitable for a dedicated system where you want a more persistent environment.

  • @ThorAs244
    @ThorAs244 3 месяца назад +1

    Thanks for it good job

  • @mfbs8309
    @mfbs8309 5 месяцев назад

    Installing Linux on whonix Would this be perfect for anonymously hacking testing?

  • @JB-gt3rd
    @JB-gt3rd 11 месяцев назад +2

    Hey !Thx for sharing knowledge!
    I am always wondering , like we are hiding our IP with all them different techniques, but doesn't our MAC address get leaked ? I mean IP is changged to something else, but what about MAC address ? Can't it be traced as well as an IP ? As I know network cards MAC is unique and it is shared in sent packets at some layer.
    Pretty new in this area and a bit confused. If you could shed some light on that, would appreciate it a lot .

    • @realityinred
      @realityinred 11 месяцев назад +3

      Mac can be spoofed

    • @NNAdmin
      @NNAdmin  11 месяцев назад +3

      Whonix safeguards against IP leaks through its two-VM design, directing all traffic through the Tor network and isolating the Gateway for Tor connection. The system incorporates MAC address randomization, adding an extra layer of privacy by making it challenging to trace network traffic back to a specific device. By default, Whonix configures network filter settings to ensure that only the Tor network is utilized, reducing the risk of accidental leaks. While MAC addresses are unique and shared in packets, Whonix's measures minimize the potential for MAC address leakage, enhancing overall privacy and security for users navigating the Tor network.

    • @JB-gt3rd
      @JB-gt3rd 10 месяцев назад

      Hey! Thx for a swift reply! You're awesome !
      So Whonix does the job of MAC spoofing, thats cool. Do you think if spoofing your MAC manually would add any extra protection ? And also seen some guys getting rid of WHONIX workspace machine and setting up Kali instead to run through Whonix gateway. Does it reduce privacy in any way ? @@NNAdmin

  • @blazayblazay8888
    @blazayblazay8888 4 месяца назад +1

    HOW DO I USE IT ON A CHROMEBOOK?

  • @LearnItLiveItLoveItTheHavamal
    @LearnItLiveItLoveItTheHavamal 10 месяцев назад +2

    Hey I’m also Danish!!!

    • @LearnItLiveItLoveItTheHavamal
      @LearnItLiveItLoveItTheHavamal 10 месяцев назад

      Just picturing all the confused people reading this comment. Sorry, I had a squirrel moment. Scandinavian’s are a rare sight outside of Scandinavia. Those Irish though they are everrrrrywhere. Lol😂

  • @SatoshiNakamoto.Bitcoin
    @SatoshiNakamoto.Bitcoin 8 месяцев назад

    Very informal

  • @notyoursanymore9027
    @notyoursanymore9027 11 месяцев назад +1

    What's the difference between this and using kali and proxychains + tor ?

    • @NNAdmin
      @NNAdmin  11 месяцев назад +4

      Whonix not only routes all system traffic through the Tor network but also isolates networking components into separate virtual machines, providing a stronger defense against potential leaks. Additionally, Whonix includes features like stream isolation and secure defaults for applications, enhancing overall privacy and security. These comprehensive measures go beyond the capabilities of proxychains alone, offering a more thorough and effective solution for anonymous and secure web browsing.

    • @notyoursanymore9027
      @notyoursanymore9027 11 месяцев назад

      @@NNAdmin thanks a lot !

    • @ken_tx
      @ken_tx 11 месяцев назад

      @@NNAdmin Is this more secure than running a TOR enabled proxy chains over a VPN? Great video btw

    • @bloodfya13
      @bloodfya13 9 месяцев назад

      I'd like to know the answer to this question

  • @sakurazakikasumi2157
    @sakurazakikasumi2157 8 месяцев назад +1

    I mostly preferred tails os because I only comment on websites that allow anonymous comment which doesn't require account.

    • @NNAdmin
      @NNAdmin  8 месяцев назад +1

      You do you :)

  • @maddmerchant9414
    @maddmerchant9414 10 месяцев назад

    Does Tails OS not acomplish this. And from a USB stick?

    • @NNAdmin
      @NNAdmin  10 месяцев назад

      See my previous replies on this question.

  • @andresmontoya2741
    @andresmontoya2741 6 месяцев назад

    Hello bro, when I'm changing the sudo passwd user Its seems wrong... I don't know how to change :(

    • @NNAdmin
      @NNAdmin  6 месяцев назад

      I don't really understand the question you have?

  • @itsm3dud39
    @itsm3dud39 10 месяцев назад

    do we need to install on a virtual machine or host machine??

    • @4b5urd.
      @4b5urd. 10 месяцев назад +1

      Since whonix itself is a set of virtual machines, as shown in the video you have the gateway and then you have the workstation, you typically want to install whonix on your bare metal host. That is best practice and most reliable. You can try to install whonix within a virtual machine, but performance and reliability will become a concern. That type of setup is called nested virtualization. It works for some people in some situations, but it depends mostly on your system and your setup

    • @itsm3dud39
      @itsm3dud39 10 месяцев назад

      @@4b5urd. Thnkx 👍

    • @NNAdmin
      @NNAdmin  10 месяцев назад +1

      @itsm3dud39
      Whonix requires a hypervisor for its operation, with the most commonly used being a Type 2 hypervisor that necessitates a host operating system. While it is possible to install Whonix on bare metal using a Type 1 hypervisor like ESXi, Hyper-V, or Xen, this can be challenging based on my experience. Alternatively, a more straightforward approach is to install Kali or Fedora on a bare metal host and use VirtualBox as the hypervisor. This setup is user-friendly and effective. However, if you prefer VMWare Workstation, KVM, or another hypervisor, those are viable options as well.

    • @itsm3dud39
      @itsm3dud39 10 месяцев назад

      👍@@NNAdmin

  • @Anjarys
    @Anjarys 9 месяцев назад

    This is not for native linux system?

    • @NNAdmin
      @NNAdmin  9 месяцев назад

      Whonix is not a standalone operating system; instead, it is an operating system distribution based on Debian GNU/Linux. Specifically, Whonix is designed to run as a set of virtual machines on a host system.

  • @behindYOUR6
    @behindYOUR6 11 месяцев назад +1

    💚💚💚💚

  • @johntabaron3620
    @johntabaron3620 2 месяца назад

    hey, am i the only one who did not get a setup wizard after initial bootup?

    • @NNAdmin
      @NNAdmin  2 месяца назад

      I am not sure what you're referencing, can you explain what you're doing and what you have tried to do to resolve the issue?

  • @starviptv6544
    @starviptv6544 10 месяцев назад +1

    Wow

    • @NNAdmin
      @NNAdmin  10 месяцев назад

      Wow is good right?¿ :P

  • @bnk28zfp
    @bnk28zfp 10 месяцев назад +4

    why whonix is better then tails???😮

    • @NNAdmin
      @NNAdmin  10 месяцев назад +14

      Each has it's own place in the anonymity world, as does Anonym.OS, Qubes, etc. Tails is meant to be installed on removable media, and is suitable for scenarios where you want a portable and disposable solution, such as using it on different computers without leaving any trace. Whonix, being a virtual machine setup, is more suitable for a dedicated system where you want a more persistent environment.

  • @googleaccountuser3116
    @googleaccountuser3116 10 месяцев назад

    VirtualBox is Microsoft's answer but it is limited crappy software. Whonix isn't that good if used by beginners. Now your privacy is at risk because you put all responsibility at the users end not to do anything stupid. Tor is a huge security risk for newbies so be aware of that.
    My personal preference is workstation > pfsense ( squid, etc... ) > local server ( tor, i2p, ... ) > pfsense > internet. Without virfualization because this is bad. If you use hardware you physically enforce your setup and your workstation is offloaded. Need an add blocker? Don't install that on your workstation but on the router. Etc... Balance your load over devices and separate your concerns. Tor is the anonymity, pfsense your privacy and firewall, workstation the browser.
    I don't use tor for normal browsing. But when I follow a tor link instead of hitting a wall pfsense detects it and forwards the request to the appropriate local server. Similar setup can be used for I2P server.

    • @NNAdmin
      @NNAdmin  10 месяцев назад +1

      Thanks for sharing your detailed setup! It's great to see diverse approaches to privacy and security. Your emphasis on physical enforcement, load balancing, and specific use of Tor adds interesting layers to your setup.
      However, it's worth noting that the complexity of your configuration might pose challenges for less experienced users. While Whonix has its own strengths and weaknesses, your setup, too, requires careful configuration and maintenance.
      Also, just a quick clarification: VirtualBox is maintained by Oracle, not Microsoft. Nonetheless, the choice between hardware and virtualization is subjective and depends on individual needs.
      In the end, the 'best' setup varies based on one's threat model and comfort level. Regular updates, good security practices, and staying informed about potential risks are key, regardless of the chosen approach. Thanks again for sharing your insights!

    • @googleaccountuser3116
      @googleaccountuser3116 10 месяцев назад

      @@NNAdmin thanks for your reply and corrections. I got confused with the vm part. Although not open source i prefer vmware.
      When watching your videos I realized the linux part was a bit below my level. I like to see myself as a simple ordinary user that just wants complete control over my system. I kind of got there with windows XP running it from ramdisks and what not but when I tried to use win7 I realized MS was doing everything they could to make my life hard. Things only got worse from there. I then switched to linux and all my issues dissapeared. Nowadays when I see people using windows I am confused. This is really odd, I used to be an expert with XP, what happened there?
      I use linux because it is simple, straightforward and easy to learn. I am baffled why people use an OS like windows that is so difficult to configure and control. Unless it is XP I can't help anyone.
      I am that kind of person that wants to look under the hood and know why the car drives. But I wasn't actually planning on driving it very far. My setup is a bit more complex but the best way to learn is to put knowledge into practice. I just see these things as fun projects.

  • @claytonpoortenga1811
    @claytonpoortenga1811 10 месяцев назад

    Sounds like a honey pot... I just lobotomized win10

    • @NNAdmin
      @NNAdmin  10 месяцев назад

      No sure what sounds like a honey pot, but nice job on the Windows box, maybe it will help it's performance. :P

  • @M.W.777
    @M.W.777 10 месяцев назад +1

    Noice! You have a new subscriber! Good day Sir

    • @NNAdmin
      @NNAdmin  10 месяцев назад

      Thanks for the sub!

  • @boh70326
    @boh70326 10 месяцев назад +1

    I use Virt-manager which one i gotta download?

    • @NNAdmin
      @NNAdmin  10 месяцев назад +3

      I don't use Virt-manager, but I would try the KVM installer/instructions.

  • @alexstaufenbiel1016
    @alexstaufenbiel1016 10 месяцев назад

    Can you please get ahold of me if you could I tried to find you on LinkedIn and couldn't I have lots of questions I need some good advice

    • @NNAdmin
      @NNAdmin  10 месяцев назад +1

      Hi , I don't take one on one question sessions, instead my goal is to build a community, so feel free to ask you questions here or in the member area.

    • @alexstaufenbiel1016
      @alexstaufenbiel1016 10 месяцев назад +1

      @@NNAdmin thanks much to the quick answer yes I'm watching all your videos and getting great insight from you and Niel I plan on being the best ethical hacker big goals big shoes to fill but if Neil can do the same I can but as a ex-felon there's many issues thanks for the quick response "Dream Chasing catching all my goals"😜

    • @PAFBEAST
      @PAFBEAST 10 месяцев назад

      @@alexstaufenbiel1016 bro no one is "best ethical hacker" lol, and also ethical hackers don't much use these things in real life...