diff --git a/Home.md b/Home.md index 3ac4751..66fa76c 100644 --- a/Home.md +++ b/Home.md @@ -19,66 +19,4 @@ Here is the list of people who contributed to this documentation so far: - [evilvibes](https://github.com/evilvibes) - [Fahad Usman](http://fahadusman.com/computer-network-security/recon/dns-tips-and-tricks/encrypting-dns-traffic/)(@fahadshery) -

Setting it up on Kali Linux

-If you are using Kali, here is how you could Encrypt your DNS traffic... -
    -
  1. -
      -
    1. -
        -
      1. Goto: https://dnscrypt.info/implementations
      2. -
      3. You will find Installation and Downloads links there
      4. -
      5. uname -a to see if you are running a 32 or 64 bit OS. I will be downloading 64 bit in step 4.
      6. -
      7. Open terminal in Kali terminal and download : wget https://github.com/jedisct1/dnscrypt-proxy/releases/download/2.0.1/dnscrypt-proxy-linux_x86_64-2.0.1.tar.gz
      8. -
      9. extract downloaded file: tar xzvf dnscrypt-proxy-linux_x86_64-2.0.1.tar.gz
      10. -
      11. get into the extracted folder: cd linux-x86_64
      12. -
      13. copy .toml file: cp example-dnscrypt-proxy.toml dnscrypt-proxy.toml
      14. -
      15. change ownership: chown 2000:2000 dnscrypt-proxy.toml
      16. -
      17. nano dnscrypt-proxy.toml
      18. -
      19. You now need to edit dnscrypt-proxy.toml file -
          -
        1. Look for: # server_names = ['scaleway-fr', 'google', 'yandex']
        2. -
        3. Change to the servers you would like to use and remove the leading #.
        4. -
        5. Example: server_names = ['google','cisco-ipv6']
        6. -
        7. You could use DNS server sources available at: https://github.com/jedisct1/dnscrypt-proxy/wiki/DNS-server-sources#opennic-servers
        8. -
        9. I will be using the Opennic one because some of them don't log dns requests and support dnscrypt like luggs server at opennic, List maintained by Frank Denis at: https://download.dnscrypt.info/dnscrypt-resolvers/v2/opennic.md -
            -
          1. -
              -
            1. -
                -
              1. -
                To use that list, add this to the `[sources]` section of your
                -`dnscrypt-proxy.toml` configuration file:
                -    [sources.'public-resolvers']
                -    url = 'http://download.dnscrypt.info/resolvers-list/v2/public-resolvers.md'
                -    minisign_key = 'RWQf6LRCGA9i53mlYecO4IzT51TGPpvWucNSCh1CBM0QTaLn73Y7GFO3'
                -    cache_file = 'public-resolvers.md'
                -
              2. -
              3. Now choose the servers that you wish to use from this public-resolvers file
              4. -
              5. For example I am using: server_names = ['opennic-famicoman', 'opennic-tumabox', 'opennic-luggs']
              6. -
              -
            2. -
            -
          2. -
          -
        10. -
        -
      20. -
      21. Now we are ready to install and start dnscrypt-proxy
      22. -
      23. ./dnscrypt-proxy -service install
      24. -
      25. we also need to point local name-servers to localhost by: -
          -
        1. nano /etc/resolv.conf
        2. -
        3. Comment all the lines and add nameserver 127.0.0.1 and save the file
        4. -
        -
      26. -
      27. Now start the service ./dnscrypt-proxy -service start
      28. -
      -
    2. -
    -
  2. -
-Now if you fireup the wireshark, and log the DNS traffic, it has been encrypted - Did you contribute? Feel free to add your name to the list above!