Using Tor with the Python Requests Library

in #tutorial7 years ago

Doing HTTP requests anonymously with Python and Tor.

If you have used Python then you have probably used the fantastic Requestslibrary. It makes doing HTTP request nice and easy. I use this library almost every day. Today I wanted to use it a bit differently. I wanted to use it with Tor. There are several ways to to this. I’ll showing you one possible way to do it.

Install Tor

First of all we want to install Tor. In this tutorial the Tor Browser will now help us. Follow these instructions for installation and activation. Do not use the default version available from your Linux distro. These are very often out of date. As always, it is best to be running to most up to date software. Running outdated software could be dangerous. Follow the official documents.

Install the Required Library

Remember to use some kind of isolated Python environment system. I like virtualenvwrapper but many others prefer pipenv.

pip install requests

And import

import requests

Setting up a empty session

We will be using the Session object from the Requests library. This object will allow certain parameter to be persistent. We will create a empty Session object.

session = requests.session()  
session.proxies = {}

This is how we normally make requests with the Request library:

r = requests.get('https://jasonrigden.com')

But the using the Session object is a just a tiny bit different:

r = session.get('https://jasonrigden.com')

Checking our current IP

_I’ll will not be showing my my real IP address. Instead. I’ll be using your routers address 192.168.0.1. 😉

Let us check out IP address by asking httpbin.org.

r = session.get(‘http://httpbin.org/ip')
print(r.text)

Gives us:

{  
    "origin”: "192.168.0.1"  
}

That seems normal and expected.

Use the proxies

Now let us create a new Session object and then add our proxies.

session = requests.session()  
session.proxies = {}

session.proxies\['http'\] = 'socks5h://localhost:9050'  
session.proxies\['https'\] = 'socks5h://localhost:9050'

Checking our new IP

Now we check out IP address again:

r = session.get(‘http://httpbin.org/ip')
print(r.text)

Giving us:

{  
    "origin": "185.220.101.26"  
}

This IP appears to be from East Africa but I am in Seattle. Thing seems to be working.

Dark Web Requests

This setup will also allow us to make request for Tor hidden services aka the dark web. We are going to visit a rather notorious site in this example. A site that has been used for violent revolutions, drugs, and to interfere will democratic elections. I just want to warn you. These guy make money selling you personal info and they will literally sell to anyone. We are going to Facebook. They run a hidden service at facebookcorewwwi.onion. If you try to visit this address in a standard without Tor you will get nothing. But let us try with our Session object.

r = session.get('https://www.facebookcorewwwi.onion/')
print(r.headers)

And we will get

{    
   'Content-Encoding':'gzip',  
   'Strict-Transport-Security':'max-age=15552000; preload',  
   'X-Frame-Options':'DENY',  
   'X-Content-Type-Options':'nosniff',  
   'Connection':'keep-alive',  
   'Date':'Tue, 06 Feb 2018 23:41:05 GMT',  
   'Transfer-Encoding':'chunked',  
   'Set-Cookie':'fr=0ibUkv48vNYqUtRGO..Baej0R.a4.AAA.0.0.Baej0R.AWXOsJtM; expires=Mon, 07-May-2018 23:41:05 GMT; Max-Age=7776000; path=/; domain=.facebookcorewwwi.onion; secure; httponly,sb=ET16Wt8nU0VqZwyI2JREUG7L; expires=Thu, 06-Feb-2020 23:41:05 GMT; Max-Age=63072000; path=/; domain=.facebookcorewwwi.onion; secure; httponly',  
   'Content-Type':'text/html; charset=UTF-8',  
   'Cache-Control':'private, no-cache, no-store, must-revalidate',  
   'Vary':'Accept-Encoding',  
   'Expires':'Sat, 01 Jan 2000 00:00:00 GMT',  
   'X-XSS-Protection':'0',  
   'X-FB-Debug':'rPWGof2T7AWYKmygk/NHSKiD73OmtkI579bnw/2FQxmgmIKmB92dRJYTjXLr13Fj79PNaBYfp4N5/F2dzcNbSg==',  
   'Pragma':'no-cache'  
}

We now have access to the dark web through our Python scripts. Now it is time to get paranoid.

User-agent

We are sending some info our requests:

r = session.get(‘https://httpbin.org/user-agent')
print(r.text)

That returns:

{  
    "user-agent”: “python-requests/2.18.4"  
}

Well, they would know we are a Python script, what library we are using, and some version info. We can change this.

We will create some request headers and change the User-agent:

headers = {}  
headers\['User-agent'\] = “HotJava/1.1.2 FCS”

Does anyone remember HotJava? You know it is old school when the download page warns that the software is not Y2K safe.

Then we include the headers in the request:

r = session.get('https://httpbin.org/user-agent', headers=headers)
print(r.text)

That returns:

{  
    "user-agent": "HotJava/1.1.2 FCS"  
}

Cookies

Using the Session object mean we have cookies. We will use httpbin to set a cookie with the value, “Hello”:

session.get('http://httpbin.org/cookies/set/sessioncookie/Hello')

Now we check to see if that cookie is working.:

r = session.get(‘http://httpbin.org/cookies')
print(r.text)

And we get:

{  
    "cookies": {  
        "sessioncookie": "Hello"  
    }  
}

We can kill the cookies:

session.cookies.clear()
r = session.get(‘http://httpbin.org/cookies')
print(r.text)

Resulting:

{  
    "cookies": {}  
}

No more cookies.

DNS leakage

DNS Leaks are a big concern. Check out the post “What is a DNS leak and why should I care?” for more info. Using Wireshark we can see the DNS requests for the previous examples.

Example:

requests.get(‘http://httpbin.org/ip')

But using the proxies through the Session object reveals nothing.

A picture of nothin’

Conclusion

So this is one way to use Tor with you the Request Library. I hope you find it useful.

Coin Marketplace

STEEM 0.21
TRX 0.25
JST 0.038
BTC 96989.50
ETH 3378.64
USDT 1.00
SBD 3.23