How to spoof your IP address on Kali Linux.

Kali Linux is the most advanced penetration testing distribution with a number of tools. While using these tools a measure of anonymity is required. Today we are going to see how to spoof our IP address in Kali Linux. First, check your IP address by visiting any website which shows your IP address ( http://www.whatismyip.com ). Then go to the site http://www.vpnbook.com.

Download the Euro1 Server OpenVPN certificate bundle as shown below. Note down the username and password given. We will need it in later steps.

Image

When you click on the download link, the following window opens. Since it is a zip package, system will prompt whether to open it with unzip ( the default option ). Click on OK.

Image

Open the terminal and navigate to the directory where the cocntents of the zip archive have been unzipped. Type the command ls to see the unzipped files. We are going to use the vpnbook-euro1-udp53.ovpn package.

Image

OpenVPN has been installed by default in the Kali Linux distribution. Type the command openvpn vpnbook-euro1-udp53.ovpn to start the process.

Image

The installation starts.  Enter the username and password we noted above when prompted.

Image

After a short time, the process is completed. Check your IP address again. If everything goes well, your IP address will be changed.

About these ads

5 Responses to How to spoof your IP address on Kali Linux.

  1. Hi,
    I installed Kali linux just fine with your article, haven’t done any pen-testing yet but all looks/runs fine, great article. In fact I’m writing this on the Kali VM.

    When I try to run the openvpn application it tries/retries for ever, here is the output:

    openvpn vpnbook-euro1-udp53.ovpn
    Thu Dec 26 16:22:06 2013 OpenVPN 2.2.1 i486-linux-gnu [SSL] [LZO2] [EPOLL] [PKCS11] [eurephia] [MH] [PF_INET6] [IPv6 payload 20110424-2 (2.2RC2)] built on Jun 6 2013
    Enter Auth Username:vpnbook
    Enter Auth Password:
    Thu Dec 26 16:22:27 2013 WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
    Thu Dec 26 16:22:27 2013 NOTE: OpenVPN 2.1 requires ‘–script-security 2′ or higher to call user-defined scripts or executables
    Thu Dec 26 16:22:27 2013 LZO compression initialized
    Thu Dec 26 16:22:27 2013 Control Channel MTU parms [ L:1558 D:138 EF:38 EB:0 ET:0 EL:0 ]
    Thu Dec 26 16:22:27 2013 Socket Buffers: R=[163840->131072] S=[163840->131072]
    Thu Dec 26 16:22:27 2013 Data Channel MTU parms [ L:1558 D:1450 EF:58 EB:135 ET:0 EL:0 AF:3/1 ]
    Thu Dec 26 16:22:27 2013 Local Options hash (VER=V4): ‘66096c33′
    Thu Dec 26 16:22:27 2013 Expected Remote Options hash (VER=V4): ‘691e95c7′
    Thu Dec 26 16:22:27 2013 UDPv4 link local: [undef]
    Thu Dec 26 16:22:27 2013 UDPv4 link remote: [AF_INET]93.115.84.195:53
    Thu Dec 26 16:23:27 2013 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
    Thu Dec 26 16:23:27 2013 TLS Error: TLS handshake failed
    Thu Dec 26 16:23:27 2013 TCP/UDP: Closing socket
    Thu Dec 26 16:23:27 2013 SIGUSR1[soft,tls-error] received, process restarting
    Thu Dec 26 16:23:27 2013 Restart pause, 2 second(s)
    Thu Dec 26 16:23:29 2013 WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
    Thu Dec 26 16:23:29 2013 NOTE: OpenVPN 2.1 requires ‘–script-security 2′ or higher to call user-defined scripts or executables
    Thu Dec 26 16:23:29 2013 Re-using SSL/TLS context
    Thu Dec 26 16:23:29 2013 LZO compression initialized
    Thu Dec 26 16:23:29 2013 Control Channel MTU parms [ L:1558 D:138 EF:38 EB:0 ET:0 EL:0 ]
    Thu Dec 26 16:23:29 2013 Socket Buffers: R=[163840->131072] S=[163840->131072]
    Thu Dec 26 16:23:29 2013 Data Channel MTU parms [ L:1558 D:1450 EF:58 EB:135 ET:0 EL:0 AF:3/1 ]
    Thu Dec 26 16:23:29 2013 Local Options hash (VER=V4): ‘66096c33′
    Thu Dec 26 16:23:29 2013 Expected Remote Options hash (VER=V4): ‘691e95c7′
    Thu Dec 26 16:23:29 2013 UDPv4 link local: [undef]
    Thu Dec 26 16:23:29 2013 UDPv4 link remote: [AF_INET]93.115.84.195:53
    Thu Dec 26 16:24:29 2013 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
    Thu Dec 26 16:24:29 2013 TLS Error: TLS handshake failed
    Thu Dec 26 16:24:29 2013 TCP/UDP: Closing socket
    Thu Dec 26 16:24:29 2013 SIGUSR1[soft,tls-error] received, process restarting
    Thu Dec 26 16:24:29 2013 Restart pause, 2 second(s)
    Thu Dec 26 16:24:31 2013 WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
    Thu Dec 26 16:24:31 2013 NOTE: OpenVPN 2.1 requires ‘–script-security 2′ or higher to call user-defined scripts or executables
    Thu Dec 26 16:24:31 2013 Re-using SSL/TLS context
    Thu Dec 26 16:24:31 2013 LZO compression initialized
    Thu Dec 26 16:24:31 2013 Control Channel MTU parms [ L:1558 D:138 EF:38 EB:0 ET:0 EL:0 ]
    Thu Dec 26 16:24:31 2013 Socket Buffers: R=[163840->131072] S=[163840->131072]
    Thu Dec 26 16:24:31 2013 Data Channel MTU parms [ L:1558 D:1450 EF:58 EB:135 ET:0 EL:0 AF:3/1 ]
    Thu Dec 26 16:24:31 2013 Local Options hash (VER=V4): ‘66096c33′
    Thu Dec 26 16:24:31 2013 Expected Remote Options hash (VER=V4): ‘691e95c7′
    Thu Dec 26 16:24:31 2013 UDPv4 link local: [undef]
    Thu Dec 26 16:24:31 2013 UDPv4 link remote: [AF_INET]93.115.84.195:53

    I went to their help page but am stuck; what to do to spoof my ip?

    Thanks, Nico M, London

  2. Anonymous says:

    I Don’t think you can run it in a VM, I Know if you have kali installed as your prim sys then any VM will use then vpn automatically, If you don’t won’t to install kali on your hard drive I would try installing vpnbook on your prim system like windows and your VM should use the vpn by default, it’s that the vpn has to be ran on the machine that connects to the internet….

  3. Aweso posso says:

    I had the same problem for a while, and then I realized I was borking the password.
    It takes a while but after running for a minute or two I can connect to the VPN just fine in VMWare.

  4. You made some good points there. I looked on the net to find
    out more about the issue and found most individuals will go
    along with your views on this site.

  5. Ravin says:

    Yes, sure you can!! I dont have done this on vmware but Actually on virtualbox the guest os already has a completly diffrent ip address becoz of the Pre installed DHCP server. And may be you vm too :)

Comment on this article.

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

Follow

Get every new post delivered to your Inbox.

Join 159 other followers

%d bloggers like this: