Posted on 6 Comments

How to spoof your IP address in Kali Linux.

Kali Linux is the most advanced penetration testing distribution with a number of tools. While using these tools a measure of anonymity is required. Today we are going to see how to spoof your IP address in Kali Linux. First, check your IP address by visiting any website which shows your IP address ( http://www.whatismyip.com ). Then go to the site www.vpnbook.com.

Download the Euro1 Server OpenVPN certificate bundle as shown below. Note down the username and password given. We will need it in later steps.

kalivpn1

 

When you click on the download link, the following window opens. Since it is a zip package, system will prompt whether to open it with unzip ( the default option ). Click on “OK”.

kalivpn2

 

Open the terminal and navigate to the directory where the cocntents of the zip archive have been unzipped. Type the command “ls” to see the unzipped files. We are going to use the vpnbook-euro1-udp53.ovpn package.

kalivpn3

 

OpenVPN has been installed by default in the Kali Linux distribution. Type the command “openvpn vpnbook-euro1-udp53.ovpn” to start the process.

kalivpn4

 

The installation starts.  Enter the username and password we noted above when prompted.

kalivpn5

 

After a short time, the process is completed. Check your IP address again. If everything goes well, your IP address will be changed.

6 thoughts on “How to spoof your IP address in Kali Linux.

  1. Hi,
    I installed Kali linux just fine with your article, haven’t done any pen-testing yet but all looks/runs fine, great article. In fact I’m writing this on the Kali VM.

    When I try to run the openvpn application it tries/retries for ever, here is the output:

    openvpn vpnbook-euro1-udp53.ovpn
    Thu Dec 26 16:22:06 2013 OpenVPN 2.2.1 i486-linux-gnu [SSL] [LZO2] [EPOLL] [PKCS11] [eurephia] [MH] [PF_INET6] [IPv6 payload 20110424-2 (2.2RC2)] built on Jun 6 2013
    Enter Auth Username:vpnbook
    Enter Auth Password:
    Thu Dec 26 16:22:27 2013 WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
    Thu Dec 26 16:22:27 2013 NOTE: OpenVPN 2.1 requires ‘–script-security 2’ or higher to call user-defined scripts or executables
    Thu Dec 26 16:22:27 2013 LZO compression initialized
    Thu Dec 26 16:22:27 2013 Control Channel MTU parms [ L:1558 D:138 EF:38 EB:0 ET:0 EL:0 ]
    Thu Dec 26 16:22:27 2013 Socket Buffers: R=[163840->131072] S=[163840->131072]
    Thu Dec 26 16:22:27 2013 Data Channel MTU parms [ L:1558 D:1450 EF:58 EB:135 ET:0 EL:0 AF:3/1 ]
    Thu Dec 26 16:22:27 2013 Local Options hash (VER=V4): ‘66096c33’
    Thu Dec 26 16:22:27 2013 Expected Remote Options hash (VER=V4): ‘691e95c7’
    Thu Dec 26 16:22:27 2013 UDPv4 link local: [undef]
    Thu Dec 26 16:22:27 2013 UDPv4 link remote: [AF_INET]93.115.84.195:53
    Thu Dec 26 16:23:27 2013 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
    Thu Dec 26 16:23:27 2013 TLS Error: TLS handshake failed
    Thu Dec 26 16:23:27 2013 TCP/UDP: Closing socket
    Thu Dec 26 16:23:27 2013 SIGUSR1[soft,tls-error] received, process restarting
    Thu Dec 26 16:23:27 2013 Restart pause, 2 second(s)
    Thu Dec 26 16:23:29 2013 WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
    Thu Dec 26 16:23:29 2013 NOTE: OpenVPN 2.1 requires ‘–script-security 2’ or higher to call user-defined scripts or executables
    Thu Dec 26 16:23:29 2013 Re-using SSL/TLS context
    Thu Dec 26 16:23:29 2013 LZO compression initialized
    Thu Dec 26 16:23:29 2013 Control Channel MTU parms [ L:1558 D:138 EF:38 EB:0 ET:0 EL:0 ]
    Thu Dec 26 16:23:29 2013 Socket Buffers: R=[163840->131072] S=[163840->131072]
    Thu Dec 26 16:23:29 2013 Data Channel MTU parms [ L:1558 D:1450 EF:58 EB:135 ET:0 EL:0 AF:3/1 ]
    Thu Dec 26 16:23:29 2013 Local Options hash (VER=V4): ‘66096c33’
    Thu Dec 26 16:23:29 2013 Expected Remote Options hash (VER=V4): ‘691e95c7’
    Thu Dec 26 16:23:29 2013 UDPv4 link local: [undef]
    Thu Dec 26 16:23:29 2013 UDPv4 link remote: [AF_INET]93.115.84.195:53
    Thu Dec 26 16:24:29 2013 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
    Thu Dec 26 16:24:29 2013 TLS Error: TLS handshake failed
    Thu Dec 26 16:24:29 2013 TCP/UDP: Closing socket
    Thu Dec 26 16:24:29 2013 SIGUSR1[soft,tls-error] received, process restarting
    Thu Dec 26 16:24:29 2013 Restart pause, 2 second(s)
    Thu Dec 26 16:24:31 2013 WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
    Thu Dec 26 16:24:31 2013 NOTE: OpenVPN 2.1 requires ‘–script-security 2’ or higher to call user-defined scripts or executables
    Thu Dec 26 16:24:31 2013 Re-using SSL/TLS context
    Thu Dec 26 16:24:31 2013 LZO compression initialized
    Thu Dec 26 16:24:31 2013 Control Channel MTU parms [ L:1558 D:138 EF:38 EB:0 ET:0 EL:0 ]
    Thu Dec 26 16:24:31 2013 Socket Buffers: R=[163840->131072] S=[163840->131072]
    Thu Dec 26 16:24:31 2013 Data Channel MTU parms [ L:1558 D:1450 EF:58 EB:135 ET:0 EL:0 AF:3/1 ]
    Thu Dec 26 16:24:31 2013 Local Options hash (VER=V4): ‘66096c33’
    Thu Dec 26 16:24:31 2013 Expected Remote Options hash (VER=V4): ‘691e95c7’
    Thu Dec 26 16:24:31 2013 UDPv4 link local: [undef]
    Thu Dec 26 16:24:31 2013 UDPv4 link remote: [AF_INET]93.115.84.195:53

    I went to their help page but am stuck; what to do to spoof my ip?

    Thanks, Nico M, London

  2. I Don’t think you can run it in a VM, I Know if you have kali installed as your prim sys then any VM will use then vpn automatically, If you don’t won’t to install kali on your hard drive I would try installing vpnbook on your prim system like windows and your VM should use the vpn by default, it’s that the vpn has to be ran on the machine that connects to the internet….

  3. I had the same problem for a while, and then I realized I was borking the password.
    It takes a while but after running for a minute or two I can connect to the VPN just fine in VMWare.

  4. You made some good points there. I looked on the net to find
    out more about the issue and found most individuals will go
    along with your views on this site.

  5. Thanks you i’m french !

  6. root@probook:~/Downloads/VPNBook.com-OpenVPN-Euro1# openvpn vpnbook-euro1-udp53.ovpn
    Wed Feb 10 16:21:38 2016 OpenVPN 2.3.10 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [EPOLL] [PKCS11] [MH] [IPv6] built on Jan 21 2016
    Wed Feb 10 16:21:38 2016 library versions: OpenSSL 1.0.2f 28 Jan 2016, LZO 2.08
    Enter Auth Username: ****
    Enter Auth Password: ****************
    Wed Feb 10 16:21:44 2016 WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
    Wed Feb 10 16:21:44 2016 Socket Buffers: R=[212992->212992] S=[212992->212992]
    Wed Feb 10 16:21:44 2016 UDPv4 link local: [undef]
    Wed Feb 10 16:21:44 2016 UDPv4 link remote: [AF_INET]176.126.237.217:53
    Wed Feb 10 16:21:45 2016 TLS: Initial packet from [AF_INET]176.126.237.217:53, sid=c4c4a34a 0cc8deb5
    Wed Feb 10 16:21:45 2016 WARNING: this configuration may cache passwords in memory — use the auth-nocache option to prevent this
    Wed Feb 10 16:21:45 2016 VERIFY OK: depth=1, C=CH, ST=Zurich, L=Zurich, O=vpnbook.com, OU=IT, CN=vpnbook.com, name=vpnbook.com, emailAddress=admin@vpnbook.com
    Wed Feb 10 16:21:45 2016 VERIFY OK: depth=0, C=CH, ST=Zurich, L=Zurich, O=vpnbook.com, OU=IT, CN=vpnbook.com, name=vpnbook.com, emailAddress=admin@vpnbook.com
    Wed Feb 10 16:21:45 2016 Data Channel Encrypt: Cipher ‘AES-128-CBC’ initialized with 128 bit key
    Wed Feb 10 16:21:45 2016 Data Channel Encrypt: Using 160 bit message hash ‘SHA1’ for HMAC authentication
    Wed Feb 10 16:21:45 2016 Data Channel Decrypt: Cipher ‘AES-128-CBC’ initialized with 128 bit key
    Wed Feb 10 16:21:45 2016 Data Channel Decrypt: Using 160 bit message hash ‘SHA1’ for HMAC authentication
    Wed Feb 10 16:21:45 2016 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
    Wed Feb 10 16:21:45 2016 [vpnbook.com] Peer Connection Initiated with [AF_INET]176.126.237.217:53
    Wed Feb 10 16:21:48 2016 SENT CONTROL [vpnbook.com]: ‘PUSH_REQUEST’ (status=1)
    Wed Feb 10 16:21:48 2016 AUTH: Received control message: AUTH_FAILED
    Wed Feb 10 16:21:48 2016 SIGTERM[soft,auth-failure] received, process exiting

    I HAVE THIS PROBLEM ANYONE FOR HELP ?!

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.