GhostNET error

So, people, as I was saying in the telegram group, I came across this awesome tool called AnonSurf from ParrotOS. It doens't exist on our repositories so a friend on the group sent me this alternative:

I followed all the guide because that I know how to do xD and no errors showed up. But when running:

sudo ghostnet start

[11:45:01] Starting Gh0stN3t
[11:45:01] Killing network manager service --> dead
[11:45:04] Killing dangerous processes to prevent leaks --> dead
[11:45:04] Cleaning caches to prevent leaks --> done
[11:45:04] Do you want to change mac address?(y/n) n
[-- Mac address not changed!!!
[11:45:08] Redirecting to tor --> done
[11:45:15] (Re)start your tor service --> done
[11:45:16] Starting network manager service --> actived
[11:45:23] Updated resolv.conf to use tor

/bin/sh: line 1: /etc/resolv.conf: Operation not permitted

sudo ghostnet status

Traceback (most recent call last):
  File "/usr/lib/python3.9/urllib/request.py", line 1346, in do_open
    h.request(req.get_method(), req.selector, req.data, headers,
  File "/usr/lib/python3.9/http/client.py", line 1253, in request
    self._send_request(method, url, body, headers, encode_chunked)
  File "/usr/lib/python3.9/http/client.py", line 1299, in _send_request
    self.endheaders(body, encode_chunked=encode_chunked)
  File "/usr/lib/python3.9/http/client.py", line 1248, in endheaders
    self._send_output(message_body, encode_chunked=encode_chunked)
  File "/usr/lib/python3.9/http/client.py", line 1008, in _send_output
    self.send(msg)
  File "/usr/lib/python3.9/http/client.py", line 948, in send
    self.connect()
  File "/usr/lib/python3.9/http/client.py", line 919, in connect
    self.sock = self._create_connection(
  File "/usr/lib/python3.9/socket.py", line 822, in create_connection
    for res in getaddrinfo(host, port, 0, SOCK_STREAM):
  File "/usr/lib/python3.9/socket.py", line 953, in getaddrinfo
    for res in _socket.getaddrinfo(host, port, family, type, proto, flags):
socket.gaierror: [Errno -2] Name or service not known

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "/usr/bin/ghostnet", line 463, in <module>
    check()
  File "/usr/bin/ghostnet", line 446, in check
    main()
  File "/usr/bin/ghostnet", line 460, in main
    DoJob(job)
  File "/usr/bin/ghostnet", line 137, in __init__
    self.status()
  File "/usr/bin/ghostnet", line 178, in status
    DoJob.check_status()
  File "/usr/bin/ghostnet", line 117, in check_status
    getip = urlopen('http://ipinfo.io/ip').read()
  File "/usr/lib/python3.9/urllib/request.py", line 214, in urlopen
    return opener.open(url, data, timeout)
  File "/usr/lib/python3.9/urllib/request.py", line 517, in open
    response = self._open(req, data)
  File "/usr/lib/python3.9/urllib/request.py", line 534, in _open
    result = self._call_chain(self.handle_open, protocol, protocol +
  File "/usr/lib/python3.9/urllib/request.py", line 494, in _call_chain
    result = func(*args)
  File "/usr/lib/python3.9/urllib/request.py", line 1375, in http_open
    return self.do_open(http.client.HTTPConnection, req)
  File "/usr/lib/python3.9/urllib/request.py", line 1349, in do_open
    raise URLError(err)
urllib.error.URLError: <urlopen error [Errno -2] Name or service not known>

But luckly when I run "sudo ghostnet stop" no errors show up and it didn't break my system yay!! at least I haven't rebooted yet, so far, so good.

But well I'd like to know if anyone
1st > ever used ghostnet and can tell me if it's reliable
2nd > knows if there's a way to solve this issue
3rd > if not, if anyone know an alternative software inside our repositories : 3

Rather than running all your network activity via Tor just use Tor Browser.

You gain anonymity via your behaviour, not by using Tor for everything.

4 Likes

I understand your pov but I still want to give it a try if the software won't compromise my system (and if it works).

I suppose using the tor browser can work like a charm specially on any linux distro that are known to have almost/none telemetry, but I don't think it would be in any way a disadvantage or redundance to have a tool that can pass all my internet connections through the tor network rather than just the browser, having in mind other softwares I use can access the internet.
And on a gaming distro such a statement should be no surprise, as any game can easily and nowadays even have to connect to the internet without the browser.
There's also e-mail clients, other comunication apps, the built-in bittorrent thing, obs studio can put me live directly from itself, most backup tools can upload to a cloud, there's even nextcloud that comes with garuda... even blender can now donwload free to use models, brushes and palletes from within the software!
Which are all amazing solutions, but for me, being able to choose if I'll also pass all that info coming and going through tor makes me feel a bit less exposed. I also understand if by "behaviour" you are saying more than just being hided by some alternative network, but also having social tools and a lot of online awareness, but as everyday big companies find yet another way to track/find/spy on people and shamelessly force us to eat whatever they want us to, tor is still a really useful tool on the privacy (not only anonymity) issue.

But regardless, everyone can have their own thing on going and if anyone can help me get this thing to work, I'd really apreciate it.

You need to think about what you’re trying to accomplish here.

Passing all your network traffic through Tor does not secure you or anonymise you in any way, shape, or form.

This is not what Tor is for, and passing large amounts of data through the network degrades its capacity for everyone else who is using it.

You also can’t “hide” by doing that, and having no traffic other than Tor traffic will quickly get you added to whatever watch list your country uses.

All a connection to an external server does is (potentially) expose your IP address - you’re still transferring the same data (email, page, brush, …) to the same site with the same profile/fingerprint. There are far better ways of hiding your IP address than using Tor, and there are better ways of preventing unintended network egress.

However, this is now getting out-of-scope for this forum, and you should be looking instead for a different site that focusses on infosec etc.

7 Likes

Once again, as I said, I do understand your pov.
I assure you I have done some research and that I'm yet not mad enough to have Tor turned on 24/7, I don't even use Tor as a primary browser xD

All I asked was if the software was reliable and if it could work on this distro.
But by the time being and only you responding, I suppose I'll just ditch ghostnet without properly trying it out. Thanks for the small debate tho.

I mark-it-solved !

1 Like

This topic was automatically closed 2 days after the last reply. New replies are no longer allowed.