TOR (The Onion Router) - Proxy Tool
Technibble
Shares

TOR (The Onion Router) – Proxy Tool

Shares

TOR is a free client application that uses a network of multiple encrypted tunnels to route your Internet traffic. You can install the components to use TOR or download a standalone bundle that does not require installation. TOR can benefit IT Professionals in several ways:

  • To verify IP based firewall rules: Instead of needing to physically go outside your LAN you can use TOR on an internal machine to fetch IP addresses outside of your company’s block to test and validate your firewall settings.
  • To “remotely” connect to deployed services internally: A technician can use Tor to remotely connect back to services, without the need for an external machine.
  • To bypass security policies for critical IT usage: Tor can allow unfettered access to the internet while leaving standard security policies in place.
  • To work around ISP network outages: If an ISP is having DNS or routing problems TOR may be able to bypass the problem areas allowing you to connect to the internet, even though the ISP is malfunctioning.
  • Performing Malware Analysis: IT professionals in charge of incident handling/analysis may need to trace back the origins of malicious software or breach attempt. TOR allows the technician to do this anonymously for protection against retaliation attacks.

How to setup TOR

You can install TOR as a browser plugin or you can download a bundle pack specific for your operating system. The necessary components are TOR and a web proxy such as Polipo. You can add an additional layer of security by using PuttY. The TOR bundles include the torbutton (plugin for Firefox) and Vidalia (a GUI for TOR). Install, check that it’s working, and explore anonymously.

Screenshots:

Vidalia Control Panel

Downloads:

Download Site

  • Onkyo says:

    I have used TOR for quite some time, And am happy to see here lately that it is getting more and more exposure, I am seeing article’s published in many mainstream magazines, and online. The more people using it adds to security, but also users must understand that once you go outside the TOR network if you’re not using a secure connection, it is possible that the exit node may capture data. Although I do find it interesting that it is getting more popular, I am becoming a little concerned at the same time.
    There are several other utilities to assist in keeping yourself private on the internet. I hope we can get a great discussion going in member area of Technibble forums about this and others like it.

    Once again, another great article. Thanks for all your time.

  • zdanb says:

    Tor is a handy tool. It is slower than normal browsing. I have customers that worry about intrusion and tracking and Tor gives them some piece of mind. However if they worry about the government tracking them Tor makes them stand out as the use of Tor is a flag at the initial ISP entrance point.

    I believe Tor recently Forked FireFox for their own use. My current copy is a stand alone Firefox clone and not a plugin.

  • >