How to Encrypt Your Browser Sessions in Linux
This article is a quick, comprehensive guide on setting up your newly installed KaliLinux2.0 (very attractive new GUI by the way) for secure encrypted browsing. Following this guide will enable you to "surf the web" with your back covered (like a pro) safe from prying eyes (GCHQ cough, NSA cough cough) packet sniffing and MITM attacks.
Find out more here: How To Transparently Route Traffic Through Tor. It will give you total anonymity to your Internet sessions.
gnome session manager
# service ssh start
SSH provides a secure environment through encryption, enabling you to tunnel your traffic and transfer a variant of files privately. Directing your network traffic through an SSH tunnel will encrypt the packets, rendering any captured packets unreadable.
# apt-get -y install gstm
Installing gstm is easy, it already exists in the kali repository, copy and pasting the above code should be sufficient.
Configure to match the configurations in below screenshot.
SOCKS (Socket secure) proxy enables the routing of network packets through a proxy server (local socks port 8080), thwarting MITM attacks.
Step 4: Start the Kali Tunnel session
To confirm that you browser sessions are encrypted. Start a wireshark session. Capture the loopback/lo interface. Note your traffic is now encrypted via the SSH protocol.
Observe the SSH highlighted session. Now all browser traffic is encrypted.
Feel free to ask any questions in the comments section of this page.
Written by Eli Ausi