Easy tor proxy switcher 02-06-2017, 05:10 PM
#1
I encountered like.... gogolplex trillion billion bruteforcer and voter scripts that were nice..... but useless because of the utilization of a proxy switcher. Even the shittyest grade backend is equipped with an IP/Agent load-balancer so nowadays you have NO OPTION but to avoid that.
From the official Tor repository (https://gitweb.torproject.org/torspec.gi...l-spec.txt), you can see that it's indeed really simple to switch to a new Tor node from the control port:
So from python perspective a switcher function would look like this:
see? not that hard.....
Things to consider:
Tor exit nodes are public, and many hosting services put them on blacklists.
The tor network is relatively small, it is much smaller than it could (and should) be, especially after lucky green left the tor project and shut down majority of the nodes.
The current network has ~7000 nodes and (unlike what the rumors say) there are only ~900 exit nodes (I highlighted this from a talk of the official developers), and usually I can only utilize ~250-270 IPs before encountering duplicates. However if your target uses a time-based IP ban, it is unlikely to get a duplicate within the ban interval.
Captcha bypasser coming soon....
From the official Tor repository (https://gitweb.torproject.org/torspec.gi...l-spec.txt), you can see that it's indeed really simple to switch to a new Tor node from the control port:
Code:
SIGNAL NEWNYM
So from python perspective a switcher function would look like this:
Code:
import socket
conn = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
control_conn = socket.socket(socket.AF_INET, socket.SOCK_SREAM)
conn.connect(('127.0.0.1', 9050))
control_conn.connect(('127.0.0.1', 9051)) # the tor control port, handle auth if needed
control_conn.sendall(b'AUTHORIZE ""') # dont forget to add password
while True:
#do your bruteforce shit here.....
conn.sendall('CONNECT %s:%d HTTP/1.1 \r\n\r\n')
# other shit
control_conn.sendall(b'SIGNAL NEWNYM') # switch proxy with 1 command
Things to consider:
Tor exit nodes are public, and many hosting services put them on blacklists.
The tor network is relatively small, it is much smaller than it could (and should) be, especially after lucky green left the tor project and shut down majority of the nodes.
The current network has ~7000 nodes and (unlike what the rumors say) there are only ~900 exit nodes (I highlighted this from a talk of the official developers), and usually I can only utilize ~250-270 IPs before encountering duplicates. However if your target uses a time-based IP ban, it is unlikely to get a duplicate within the ban interval.
Captcha bypasser coming soon....
(This post was last modified: 02-06-2017, 05:23 PM by silur.
Edit Reason: Specify things about tor utilization
)
Reflection of a lonely being trapped in a false time
exposing your precious secrets for I am scared of mine
tox: E321B7DD931582DE0277E578578F37B0E41FB9838E9466035235BFDE5E1F3C1C10026A5982BF
exposing your precious secrets for I am scared of mine
tox: E321B7DD931582DE0277E578578F37B0E41FB9838E9466035235BFDE5E1F3C1C10026A5982BF