Several people have requested my assistance in setting up cryptostorm on the recent Kali Linux 2.0 distro. Of course one can simply use the command line, however, without a total reconfiguration of your iptables, and turning off ipv6, there is a complete dox via DNS blowback. Additionally, there is no "onion browser magic jumpin off." It is also labor intensive to set up each and every node, for those that like to switch on the fly as I do. Below is a link to the youtube video I made on the issue. Also works for the Voodoo network.
Step 1: bring your local packages & applications up to current versions
Code: Select all
Update kali source.list http://docs.kali.org/general-use/kali-linux-sources-list-repositories
apt-get clean && apt-get update && apt-get upgrade -y && apt-get dist-upgrade -y
apt-get install network-manager-openvpn-gnome
apt-get install network-manager-vpnc-gnome
apt-get install network-manager-vpnc
Step 2: grab the most current cryptostorm configuration file
Select 1_4.config file from here, or from the github repository collection
Step 2(b): grab the most recent public certificate for cryptostorm's server verification
Select the ca2.crt file (which is already pre-included in the 1.4 configs, but is also available separately for verification, etc.).
Step 3: input your (hashed) token value to authenticate to cryptostorm's network
Username = SHA512-hashed token
Password = anything you want
Step 4 (optional, sorta): additional leak protection for your session
Remember to turn off ipv6 for leakback protection
It is also advised to personalize iptables if you're feeling brave.
Step 5: you're safely on cryptostorm