Updated Home (markdown)

Frank Denis 2018-02-23 17:24:17 +01:00
parent c3c6014f05
commit 35dfa26a62

62
Home.md

@ -19,66 +19,4 @@ Here is the list of people who contributed to this documentation so far:
- [evilvibes](https://github.com/evilvibes)
- [Fahad Usman](http://fahadusman.com/computer-network-security/recon/dns-tips-and-tricks/encrypting-dns-traffic/)(@fahadshery)
<h1><strong>Setting it up on Kali Linux</strong></h1>
If you are using <code>Kali</code>, here is how you could Encrypt your DNS traffic...
<ol>
<li style="list-style-type: none;">
<ol>
<li style="list-style-type: none;">
<ol>
<li>Goto: <a href="https://dnscrypt.info/implementations">https://dnscrypt.info/implementations</a></li>
<li>You will find <a href="https://github.com/jedisct1/dnscrypt-proxy/wiki/installation">Installation </a>and <a href="https://github.com/jedisct1/dnscrypt-proxy/releases">Downloads </a>links there</li>
<li><code>uname -a</code> to see if you are running a 32 or 64 bit OS. I will be downloading 64 bit in step 4.</li>
<li>Open terminal in Kali terminal and download : <code>wget https://github.com/jedisct1/dnscrypt-proxy/releases/download/2.0.1/dnscrypt-proxy-linux_x86_64-2.0.1.tar.gz</code></li>
<li>extract downloaded file: <code>tar xzvf dnscrypt-proxy-linux_x86_64-2.0.1.tar.gz</code></li>
<li>get into the extracted folder: <code>cd linux-x86_64</code></li>
<li>copy <code>.toml</code> file: <code>cp example-dnscrypt-proxy.toml dnscrypt-proxy.toml</code></li>
<li>change ownership: <code>chown 2000:2000 dnscrypt-proxy.toml</code></li>
<li><code>nano dnscrypt-proxy.toml</code></li>
<li>You now need to edit <code>dnscrypt-proxy.toml</code> file
<ol>
<li>Look for:<code> # server_names = ['scaleway-fr', 'google', 'yandex']</code></li>
<li>Change to the servers you would like to use and remove the leading <code>#</code>.</li>
<li>Example:<code> server_names = ['google','cisco-ipv6']</code></li>
<li>You could use DNS server sources <code>available at: <a href="https://github.com/jedisct1/dnscrypt-proxy/wiki/DNS-server-sources#opennic-servers">https://github.com/jedisct1/dnscrypt-proxy/wiki/DNS-server-sources#opennic-servers</a></code></li>
<li>I will be using the Opennic one because some of them don't log dns requests and support dnscrypt like luggs server at opennic, List maintained by Frank Denis at: <a href="https://download.dnscrypt.info/dnscrypt-resolvers/v2/opennic.md">https://download.dnscrypt.info/dnscrypt-resolvers/v2/opennic.md</a>
<ol>
<li style="list-style-type: none;">
<ol>
<li style="list-style-type: none;">
<ol>
<li>
<pre>To use that list, add this to the `[sources]` section of your
`dnscrypt-proxy.toml` configuration file:
[sources.'public-resolvers']
url = 'http://download.dnscrypt.info/resolvers-list/v2/public-resolvers.md'
minisign_key = 'RWQf6LRCGA9i53mlYecO4IzT51TGPpvWucNSCh1CBM0QTaLn73Y7GFO3'
cache_file = 'public-resolvers.md'</pre>
</li>
<li>Now choose the servers that you wish to use from this <code> public-resolvers file</code></li>
<li>For example I am using:<code> server_names = ['opennic-famicoman', 'opennic-tumabox', 'opennic-luggs']</code></li>
</ol>
</li>
</ol>
</li>
</ol>
</li>
</ol>
</li>
<li>Now we are ready to install and start <code>dnscrypt-proxy</code></li>
<li><code>./dnscrypt-proxy -service install</code></li>
<li>we also need to point local name-servers to localhost by:
<ol>
<li><code>nano /etc/resolv.conf</code></li>
<li>Comment all the lines and add <code>nameserver 127.0.0.1</code> and save the file</li>
</ol>
</li>
<li>Now start the service <code>./dnscrypt-proxy -service start</code></li>
</ol>
</li>
</ol>
</li>
</ol>
Now if you fireup the wireshark, and log the DNS traffic, it has been encrypted
Did you contribute? Feel free to add your name to the list above!