kali linux拦截流量,如何将所有流量引导到Kali linux上

添加以下内容的torrc:

AutomapHostsOnResolve 1

DNSPort 53530

TransPort 9040

创建一个文件包含你的iptables规则。对于IPv4:/etc/iptables.firewall.rules和IPv6:/etc/ip6tables.firewall.rules。

现在编辑IPv4的文件,并添加类似于下面的(确保到grep的TODO项目,并按照说明进行操作):

# Ues the nat table to redirect some traffic to Tor

*nat

:PREROUTING ACCEPT [0:0]

:INPUT ACCEPT [0:0]

:OUTPUT ACCEPT [0:0]

:POSTROUTING ACCEPT [0:0]

# Don't allow Tor traffic to get stuck in a redirect loop...

# TODO: Is `tor' your actual Tor user? It might be `debian-tor' or `toranon' or something else.

-A OUTPUT -m owner --uid-owner tor -j RETURN

# Redirect DNS lookups to Tor.

# TODO: Set this to your Tor DNSPort if it's not 53530.

-A OUTPUT ! -o lo -p udp -m udp --dport 53 -j REDIRECT --to-ports 53530

# Do not redirect private networks or loopback.

-A OUTPUT -d 10.0.0.0/8 -j RETURN

-A OUTPUT -d 172.16.0.0/12 -j RETURN

-A OUTPUT -d 192.168.0.0/16 -j RETURN

# Redirect HS connections to the TransPort.

-A OUTPUT -d 127.192.0.0/10 -p tcp -m tcp --tcp-flags FIN,SYN,RST,ACK SYN -j REDIRECT --to-ports 9040

# Redirect all TCP traffic to Tor's TransPort.

-A OUTPUT ! -o lo -p tcp -m tcp --tcp-flags FIN,SYN,RST,ACK SYN -j REDIRECT --to-ports 9040

COMMIT

# Only accept anonymized network traffic in the filter table.

*filter

:INPUT DROP [0:0]

:FORWARD DROP [0:0]

:OUTPUT DROP [0:0]

:LAN - [0:0]

# Allow loopback

-A INPUT -i lo -j ACCEPT

# Allow connections that are already established.

-A INPUT -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT

-A OUTPUT -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT

# Reject incoming connections.

-A INPUT -p udp -m conntrack --ctstate NEW -j REJECT --reject-with icmp-port-unreachable

-A INPUT -p tcp -m conntrack --ctstate NEW -j REJECT --reject-with tcp-reset

-A INPUT -j REJECT --reject-with icmp-port-unreachable

# Accept network traffic for the Tor service itself.

# TODO: Tor user?

-A OUTPUT -m owner --uid-owner tor -j ACCEPT

# Accept DNS requests to the Tor DNSPort.

-A OUTPUT -d 127.0.0.1/32 -p udp -m udp --dport 53530 -j ACCEPT

# Accept outgoing traffic to the local Tor TransPort.

-A OUTPUT -d 127.0.0.1/32 -p tcp -m tcp --dport 9040 --tcp-flags FIN,SYN,RST,ACK SYN -j ACCEPT

# Accept outgoing traffic to the local Tor SOCKSPorts.

-A OUTPUT -d 127.0.0.1/32 -p tcp -m tcp --dport 9050 --tcp-flags FIN,SYN,RST,ACK SYN -j ACCEPT

-A OUTPUT -d 127.0.0.1/32 -p tcp -m tcp --dport 9150 --tcp-flags FIN,SYN,RST,ACK SYN -j ACCEPT

# Accept connections on private networks.

-A OUTPUT -d 10.0.0.0/8 -j LAN

-A OUTPUT -d 172.16.0.0/12 -j LAN

-A OUTPUT -d 192.168.0.0/16 -j LAN

-A LAN -p tcp -m tcp --dport 53 -j REJECT --reject-with icmp-port-unreachable

-A LAN -p udp -m udp --dport 53 -j REJECT --reject-with icmp-port-unreachable

-A LAN -j ACCEPT

# Reject all other outgoing traffic.

-A OUTPUT -j REJECT --reject-with icmp-port-unreachable

COMMIT

对于IPv6的文件,你可以用ip6tables类似的东西,或只需删除所有IPv6流量。

现在设置在启动时加载这些规则与下面的内容创建文件/etc/network/if-pre-up.d/firewall:

#!/bin/sh

/sbin/iptables-restore < /etc/iptables.firewall.rules

/sbin/ip6tables-restore < /etc/ip6tables.firewall.rules

重启Tor,如果需要的话,并通过执行上述命令手动加载新的防火墙规则。

  • 0
    点赞
  • 1
    收藏
    觉得还不错? 一键收藏
  • 0
    评论
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值