Please consider Subscribing: studio.kzitem.info/rock/39GKRsNps38x7UzydcOZ9w Follow me on Twitter: twitter.com/NielsenNTWKING Chapters: 00:00 Introduction 00:57 What is Whonix? 01:33 How does Whonix Work? 04:50 Installing Whonix on Linux Hosts 09:50 Linux Post Install Configuration and Best Practices 18:32 Verifying Whonix and Tor Configuration 19:34 System check for IP Leakage and overall heath 21:00 Installing Whonix on Windows Hosts 22:07 Importing Whonix OVA into VirtualBox 23:20 Windows Post Install Configuration and Best Practices 28:58 Verifying Whonix and Tor Configuration 29:56 System check for IP Leakage and overall heath 31:00 Famous Last Words
@4b5urd.
8 ай бұрын
Excellent video, my friend. You did whonix a lot more justice than I did trying to explain its role in the scheme of things in comments on your last video. Your videos articulate well and are approachable by most anyone, a great asset to the community and a helpful resource. Much appreciated
@NNAdmin
8 ай бұрын
Thank you kindly for all the nice words!
@cajunphilippine
8 ай бұрын
This is a good presentation my friend . Good information.
@NNAdmin
8 ай бұрын
Thank you kindly
@phillydee3592
8 ай бұрын
Thank you,this is the perfect environment to run Maltego for your OSINT investigations!!
@ytg6663
8 ай бұрын
Can a government not order investigation of tor nodes located in their country ??
@Zemtex22
8 ай бұрын
@@ytg6663i’m pretty sure they run most of the tor nodes by now.
@Rage57350
8 ай бұрын
@@ytg6663they could but it would take a massive amount of investigation to do so and would be very time consuming and costly. They'd have to start with an exit node in Tor which is usually going to be a rather large organization with probably thousands of not tens to hundreds of thousands of IPs before going back through the next node then on to the guard node, repeating the process through each node, and that's before even getting back to Whonix.
@phillydee3592
Ай бұрын
@ytg6663 Yes maybe but I think it would be very difficult as the proxies are scattered...however whoever controls the exit node might see yout data...
@SamSepiol127
8 ай бұрын
Seems interesting. I'll try it asap. Great video
@ThorAs244
Ай бұрын
Thanks for it good job
@user-eq1er5lh3d
8 ай бұрын
A big thank you for your very detailed tutorial!!! Its very interesting and clear👍🏻👍🏻👍🏻👍🏻👍🏻👍🏻
@NNAdmin
8 ай бұрын
Thank you, glad to hear it was helpful!
@masterzoxsecofficial
8 ай бұрын
Great Job
@aquahood
8 ай бұрын
Have you considered switching up your anonymity portion and incorporating the new node system setup by the members of The cult of the dead cow called Veilid?
@NNAdmin
8 ай бұрын
Not at this time, but I may put out a video on Veilid in the future.
@LearnItLiveItLoveItTheHavamal
8 ай бұрын
Hey I’m also Danish!!!
@LearnItLiveItLoveItTheHavamal
8 ай бұрын
Just picturing all the confused people reading this comment. Sorry, I had a squirrel moment. Scandinavian’s are a rare sight outside of Scandinavia. Those Irish though they are everrrrrywhere. Lol😂
@SatoshiNakamoto.Bitcoin
6 ай бұрын
Very informal
@PAFBEAST
8 ай бұрын
Is whonix better tan tailsOS? you should make a difference video about these two OS's
@NNAdmin
8 ай бұрын
Tails is meant to be installed on removable media, and is suitable for scenarios where you want a portable and disposable solution, such as using it on different computers without leaving any trace. Whonix, being a virtual machine setup, is more suitable for a dedicated system where you want a more persistent environment.
@behindYOUR6
8 ай бұрын
💚💚💚💚
@sakurazakikasumi2157
6 ай бұрын
I mostly preferred tails os because I only comment on websites that allow anonymous comment which doesn't require account.
@NNAdmin
6 ай бұрын
You do you :)
@JB-gt3rd
8 ай бұрын
Hey !Thx for sharing knowledge! I am always wondering , like we are hiding our IP with all them different techniques, but doesn't our MAC address get leaked ? I mean IP is changged to something else, but what about MAC address ? Can't it be traced as well as an IP ? As I know network cards MAC is unique and it is shared in sent packets at some layer. Pretty new in this area and a bit confused. If you could shed some light on that, would appreciate it a lot .
@realityinred
8 ай бұрын
Mac can be spoofed
@NNAdmin
8 ай бұрын
Whonix safeguards against IP leaks through its two-VM design, directing all traffic through the Tor network and isolating the Gateway for Tor connection. The system incorporates MAC address randomization, adding an extra layer of privacy by making it challenging to trace network traffic back to a specific device. By default, Whonix configures network filter settings to ensure that only the Tor network is utilized, reducing the risk of accidental leaks. While MAC addresses are unique and shared in packets, Whonix's measures minimize the potential for MAC address leakage, enhancing overall privacy and security for users navigating the Tor network.
@JB-gt3rd
8 ай бұрын
Hey! Thx for a swift reply! You're awesome ! So Whonix does the job of MAC spoofing, thats cool. Do you think if spoofing your MAC manually would add any extra protection ? And also seen some guys getting rid of WHONIX workspace machine and setting up Kali instead to run through Whonix gateway. Does it reduce privacy in any way ? @@NNAdmin
@blazayblazay8888
2 ай бұрын
HOW DO I USE IT ON A CHROMEBOOK?
@mfbs8309
3 ай бұрын
Installing Linux on whonix Would this be perfect for anonymously hacking testing?
@starviptv6544
8 ай бұрын
Wow
@NNAdmin
8 ай бұрын
Wow is good right?¿ :P
@notyoursanymore9027
8 ай бұрын
What's the difference between this and using kali and proxychains + tor ?
@NNAdmin
8 ай бұрын
Whonix not only routes all system traffic through the Tor network but also isolates networking components into separate virtual machines, providing a stronger defense against potential leaks. Additionally, Whonix includes features like stream isolation and secure defaults for applications, enhancing overall privacy and security. These comprehensive measures go beyond the capabilities of proxychains alone, offering a more thorough and effective solution for anonymous and secure web browsing.
@notyoursanymore9027
8 ай бұрын
@@NNAdmin thanks a lot !
@ken_tx
8 ай бұрын
@@NNAdmin Is this more secure than running a TOR enabled proxy chains over a VPN? Great video btw
@bloodfya13
6 ай бұрын
I'd like to know the answer to this question
@johntabaron3620
11 күн бұрын
hey, am i the only one who did not get a setup wizard after initial bootup?
@NNAdmin
9 күн бұрын
I am not sure what you're referencing, can you explain what you're doing and what you have tried to do to resolve the issue?
@andresmontoya2741
3 ай бұрын
Hello bro, when I'm changing the sudo passwd user Its seems wrong... I don't know how to change :(
@NNAdmin
3 ай бұрын
I don't really understand the question you have?
@maddmerchant9414
8 ай бұрын
Does Tails OS not acomplish this. And from a USB stick?
@NNAdmin
8 ай бұрын
See my previous replies on this question.
@itsm3dud39
8 ай бұрын
do we need to install on a virtual machine or host machine??
@4b5urd.
8 ай бұрын
Since whonix itself is a set of virtual machines, as shown in the video you have the gateway and then you have the workstation, you typically want to install whonix on your bare metal host. That is best practice and most reliable. You can try to install whonix within a virtual machine, but performance and reliability will become a concern. That type of setup is called nested virtualization. It works for some people in some situations, but it depends mostly on your system and your setup
@itsm3dud39
8 ай бұрын
@@4b5urd. Thnkx 👍
@NNAdmin
8 ай бұрын
@itsm3dud39 Whonix requires a hypervisor for its operation, with the most commonly used being a Type 2 hypervisor that necessitates a host operating system. While it is possible to install Whonix on bare metal using a Type 1 hypervisor like ESXi, Hyper-V, or Xen, this can be challenging based on my experience. Alternatively, a more straightforward approach is to install Kali or Fedora on a bare metal host and use VirtualBox as the hypervisor. This setup is user-friendly and effective. However, if you prefer VMWare Workstation, KVM, or another hypervisor, those are viable options as well.
@itsm3dud39
8 ай бұрын
👍@@NNAdmin
@Anjarys
7 ай бұрын
This is not for native linux system?
@NNAdmin
7 ай бұрын
Whonix is not a standalone operating system; instead, it is an operating system distribution based on Debian GNU/Linux. Specifically, Whonix is designed to run as a set of virtual machines on a host system.
@bnk28zfp
8 ай бұрын
why whonix is better then tails???😮
@NNAdmin
8 ай бұрын
Each has it's own place in the anonymity world, as does Anonym.OS, Qubes, etc. Tails is meant to be installed on removable media, and is suitable for scenarios where you want a portable and disposable solution, such as using it on different computers without leaving any trace. Whonix, being a virtual machine setup, is more suitable for a dedicated system where you want a more persistent environment.
@claytonpoortenga1811
8 ай бұрын
Sounds like a honey pot... I just lobotomized win10
@NNAdmin
8 ай бұрын
No sure what sounds like a honey pot, but nice job on the Windows box, maybe it will help it's performance. :P
@googleaccountuser3116
8 ай бұрын
VirtualBox is Microsoft's answer but it is limited crappy software. Whonix isn't that good if used by beginners. Now your privacy is at risk because you put all responsibility at the users end not to do anything stupid. Tor is a huge security risk for newbies so be aware of that. My personal preference is workstation > pfsense ( squid, etc... ) > local server ( tor, i2p, ... ) > pfsense > internet. Without virfualization because this is bad. If you use hardware you physically enforce your setup and your workstation is offloaded. Need an add blocker? Don't install that on your workstation but on the router. Etc... Balance your load over devices and separate your concerns. Tor is the anonymity, pfsense your privacy and firewall, workstation the browser. I don't use tor for normal browsing. But when I follow a tor link instead of hitting a wall pfsense detects it and forwards the request to the appropriate local server. Similar setup can be used for I2P server.
@NNAdmin
8 ай бұрын
Thanks for sharing your detailed setup! It's great to see diverse approaches to privacy and security. Your emphasis on physical enforcement, load balancing, and specific use of Tor adds interesting layers to your setup. However, it's worth noting that the complexity of your configuration might pose challenges for less experienced users. While Whonix has its own strengths and weaknesses, your setup, too, requires careful configuration and maintenance. Also, just a quick clarification: VirtualBox is maintained by Oracle, not Microsoft. Nonetheless, the choice between hardware and virtualization is subjective and depends on individual needs. In the end, the 'best' setup varies based on one's threat model and comfort level. Regular updates, good security practices, and staying informed about potential risks are key, regardless of the chosen approach. Thanks again for sharing your insights!
@googleaccountuser3116
8 ай бұрын
@@NNAdmin thanks for your reply and corrections. I got confused with the vm part. Although not open source i prefer vmware. When watching your videos I realized the linux part was a bit below my level. I like to see myself as a simple ordinary user that just wants complete control over my system. I kind of got there with windows XP running it from ramdisks and what not but when I tried to use win7 I realized MS was doing everything they could to make my life hard. Things only got worse from there. I then switched to linux and all my issues dissapeared. Nowadays when I see people using windows I am confused. This is really odd, I used to be an expert with XP, what happened there? I use linux because it is simple, straightforward and easy to learn. I am baffled why people use an OS like windows that is so difficult to configure and control. Unless it is XP I can't help anyone. I am that kind of person that wants to look under the hood and know why the car drives. But I wasn't actually planning on driving it very far. My setup is a bit more complex but the best way to learn is to put knowledge into practice. I just see these things as fun projects.
@M.W.777
8 ай бұрын
Noice! You have a new subscriber! Good day Sir
@NNAdmin
8 ай бұрын
Thanks for the sub!
@boh70326
8 ай бұрын
I use Virt-manager which one i gotta download?
@NNAdmin
8 ай бұрын
I don't use Virt-manager, but I would try the KVM installer/instructions.
@alexstaufenbiel1016
8 ай бұрын
Can you please get ahold of me if you could I tried to find you on LinkedIn and couldn't I have lots of questions I need some good advice
@NNAdmin
8 ай бұрын
Hi , I don't take one on one question sessions, instead my goal is to build a community, so feel free to ask you questions here or in the member area.
@alexstaufenbiel1016
8 ай бұрын
@@NNAdmin thanks much to the quick answer yes I'm watching all your videos and getting great insight from you and Niel I plan on being the best ethical hacker big goals big shoes to fill but if Neil can do the same I can but as a ex-felon there's many issues thanks for the quick response "Dream Chasing catching all my goals"😜
@PAFBEAST
8 ай бұрын
@@alexstaufenbiel1016 bro no one is "best ethical hacker" lol, and also ethical hackers don't much use these things in real life...
Пікірлер: 72