6 comments on “How to spoof your IP address in Kali Linux.

  1. Hi,
    I installed Kali linux just fine with your article, haven’t done any pen-testing yet but all looks/runs fine, great article. In fact I’m writing this on the Kali VM.

    When I try to run the openvpn application it tries/retries for ever, here is the output:

    openvpn vpnbook-euro1-udp53.ovpn
    Thu Dec 26 16:22:06 2013 OpenVPN 2.2.1 i486-linux-gnu [SSL] [LZO2] [EPOLL] [PKCS11] [eurephia] [MH] [PF_INET6] [IPv6 payload 20110424-2 (2.2RC2)] built on Jun 6 2013
    Enter Auth Username:vpnbook
    Enter Auth Password:
    Thu Dec 26 16:22:27 2013 WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
    Thu Dec 26 16:22:27 2013 NOTE: OpenVPN 2.1 requires ‘–script-security 2’ or higher to call user-defined scripts or executables
    Thu Dec 26 16:22:27 2013 LZO compression initialized
    Thu Dec 26 16:22:27 2013 Control Channel MTU parms [ L:1558 D:138 EF:38 EB:0 ET:0 EL:0 ]
    Thu Dec 26 16:22:27 2013 Socket Buffers: R=[163840->131072] S=[163840->131072]
    Thu Dec 26 16:22:27 2013 Data Channel MTU parms [ L:1558 D:1450 EF:58 EB:135 ET:0 EL:0 AF:3/1 ]
    Thu Dec 26 16:22:27 2013 Local Options hash (VER=V4): ‘66096c33’
    Thu Dec 26 16:22:27 2013 Expected Remote Options hash (VER=V4): ‘691e95c7’
    Thu Dec 26 16:22:27 2013 UDPv4 link local: [undef]
    Thu Dec 26 16:22:27 2013 UDPv4 link remote: [AF_INET]93.115.84.195:53
    Thu Dec 26 16:23:27 2013 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
    Thu Dec 26 16:23:27 2013 TLS Error: TLS handshake failed
    Thu Dec 26 16:23:27 2013 TCP/UDP: Closing socket
    Thu Dec 26 16:23:27 2013 SIGUSR1[soft,tls-error] received, process restarting
    Thu Dec 26 16:23:27 2013 Restart pause, 2 second(s)
    Thu Dec 26 16:23:29 2013 WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
    Thu Dec 26 16:23:29 2013 NOTE: OpenVPN 2.1 requires ‘–script-security 2’ or higher to call user-defined scripts or executables
    Thu Dec 26 16:23:29 2013 Re-using SSL/TLS context
    Thu Dec 26 16:23:29 2013 LZO compression initialized
    Thu Dec 26 16:23:29 2013 Control Channel MTU parms [ L:1558 D:138 EF:38 EB:0 ET:0 EL:0 ]
    Thu Dec 26 16:23:29 2013 Socket Buffers: R=[163840->131072] S=[163840->131072]
    Thu Dec 26 16:23:29 2013 Data Channel MTU parms [ L:1558 D:1450 EF:58 EB:135 ET:0 EL:0 AF:3/1 ]
    Thu Dec 26 16:23:29 2013 Local Options hash (VER=V4): ‘66096c33’
    Thu Dec 26 16:23:29 2013 Expected Remote Options hash (VER=V4): ‘691e95c7’
    Thu Dec 26 16:23:29 2013 UDPv4 link local: [undef]
    Thu Dec 26 16:23:29 2013 UDPv4 link remote: [AF_INET]93.115.84.195:53
    Thu Dec 26 16:24:29 2013 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
    Thu Dec 26 16:24:29 2013 TLS Error: TLS handshake failed
    Thu Dec 26 16:24:29 2013 TCP/UDP: Closing socket
    Thu Dec 26 16:24:29 2013 SIGUSR1[soft,tls-error] received, process restarting
    Thu Dec 26 16:24:29 2013 Restart pause, 2 second(s)
    Thu Dec 26 16:24:31 2013 WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
    Thu Dec 26 16:24:31 2013 NOTE: OpenVPN 2.1 requires ‘–script-security 2’ or higher to call user-defined scripts or executables
    Thu Dec 26 16:24:31 2013 Re-using SSL/TLS context
    Thu Dec 26 16:24:31 2013 LZO compression initialized
    Thu Dec 26 16:24:31 2013 Control Channel MTU parms [ L:1558 D:138 EF:38 EB:0 ET:0 EL:0 ]
    Thu Dec 26 16:24:31 2013 Socket Buffers: R=[163840->131072] S=[163840->131072]
    Thu Dec 26 16:24:31 2013 Data Channel MTU parms [ L:1558 D:1450 EF:58 EB:135 ET:0 EL:0 AF:3/1 ]
    Thu Dec 26 16:24:31 2013 Local Options hash (VER=V4): ‘66096c33’
    Thu Dec 26 16:24:31 2013 Expected Remote Options hash (VER=V4): ‘691e95c7’
    Thu Dec 26 16:24:31 2013 UDPv4 link local: [undef]
    Thu Dec 26 16:24:31 2013 UDPv4 link remote: [AF_INET]93.115.84.195:53

    I went to their help page but am stuck; what to do to spoof my ip?

    Thanks, Nico M, London

  2. I Don’t think you can run it in a VM, I Know if you have kali installed as your prim sys then any VM will use then vpn automatically, If you don’t won’t to install kali on your hard drive I would try installing vpnbook on your prim system like windows and your VM should use the vpn by default, it’s that the vpn has to be ran on the machine that connects to the internet….

  3. I had the same problem for a while, and then I realized I was borking the password.
    It takes a while but after running for a minute or two I can connect to the VPN just fine in VMWare.

  4. root@probook:~/Downloads/VPNBook.com-OpenVPN-Euro1# openvpn vpnbook-euro1-udp53.ovpn
    Wed Feb 10 16:21:38 2016 OpenVPN 2.3.10 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [EPOLL] [PKCS11] [MH] [IPv6] built on Jan 21 2016
    Wed Feb 10 16:21:38 2016 library versions: OpenSSL 1.0.2f 28 Jan 2016, LZO 2.08
    Enter Auth Username: ****
    Enter Auth Password: ****************
    Wed Feb 10 16:21:44 2016 WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
    Wed Feb 10 16:21:44 2016 Socket Buffers: R=[212992->212992] S=[212992->212992]
    Wed Feb 10 16:21:44 2016 UDPv4 link local: [undef]
    Wed Feb 10 16:21:44 2016 UDPv4 link remote: [AF_INET]176.126.237.217:53
    Wed Feb 10 16:21:45 2016 TLS: Initial packet from [AF_INET]176.126.237.217:53, sid=c4c4a34a 0cc8deb5
    Wed Feb 10 16:21:45 2016 WARNING: this configuration may cache passwords in memory — use the auth-nocache option to prevent this
    Wed Feb 10 16:21:45 2016 VERIFY OK: depth=1, C=CH, ST=Zurich, L=Zurich, O=vpnbook.com, OU=IT, CN=vpnbook.com, name=vpnbook.com, emailAddress=admin@vpnbook.com
    Wed Feb 10 16:21:45 2016 VERIFY OK: depth=0, C=CH, ST=Zurich, L=Zurich, O=vpnbook.com, OU=IT, CN=vpnbook.com, name=vpnbook.com, emailAddress=admin@vpnbook.com
    Wed Feb 10 16:21:45 2016 Data Channel Encrypt: Cipher ‘AES-128-CBC’ initialized with 128 bit key
    Wed Feb 10 16:21:45 2016 Data Channel Encrypt: Using 160 bit message hash ‘SHA1’ for HMAC authentication
    Wed Feb 10 16:21:45 2016 Data Channel Decrypt: Cipher ‘AES-128-CBC’ initialized with 128 bit key
    Wed Feb 10 16:21:45 2016 Data Channel Decrypt: Using 160 bit message hash ‘SHA1’ for HMAC authentication
    Wed Feb 10 16:21:45 2016 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
    Wed Feb 10 16:21:45 2016 [vpnbook.com] Peer Connection Initiated with [AF_INET]176.126.237.217:53
    Wed Feb 10 16:21:48 2016 SENT CONTROL [vpnbook.com]: ‘PUSH_REQUEST’ (status=1)
    Wed Feb 10 16:21:48 2016 AUTH: Received control message: AUTH_FAILED
    Wed Feb 10 16:21:48 2016 SIGTERM[soft,auth-failure] received, process exiting

    I HAVE THIS PROBLEM ANYONE FOR HELP ?!

Leave a Reply

Your email address will not be published. Required fields are marked *