

Here’s an example of how easy it is to connect a brand new VM through tor using my setup (no proxy settings have been touched). Although the router will take about 15 minutes to set up, you can pass unlimited VMs through Tor with no extra configuration! A VPN, such as NordVPN, can be used instead of Tor or together with it, creating the ultimate tool to protect your privacy.

Fortunately, Tor isn’t the only privacy tool out there. By design, their network of volunteer relays makes complete privacy impossible. Well, the solution I came up with was to create a transparent Tor proxy using a separate VM to act as a router, the virtual machine(s) used for research will then pass all traffic through Tor (with zero configuration or software, and without even being aware the proxy exists). Tor remains free and available to everyone at the cost of online safety.

Do you use your real IP? Do you use 3rd party software such as proxifier to try and force everything through tor, hoping no software leaks your IP to the bad guys? Do you even run your entire system through a VPN while you reverse and have to reconnect all your software afterwards? As most security researchers know there’s always a big decision with analyzing malware or exploits in a VM, most people would prefer to reverse in an offline environment, but if you’re monitoring C&C communications or a live exploit kit, this isn’t viable. Although the methods in this article can be used for proper anonymity outside of the tor browser, the main focus is creating a secure tor based research environment.
