Jollier
Professional
- Messages
- 1,242
- Reaction score
- 1,321
- Points
- 113
The second part of "The Carder's Path", today we install and launch TorBox. Let me remind you that we need it for safe and anonymous surfing on the net, visiting forums, working telegrams, and everything related to our activities - everything only through TOR! After installing this software - forget about accessing the network from the white Internet!
Once you launch and configure everything - do not forget to register in SHIP JET!
Necessary inventory:
Sequence of actions:
I do not recommend hiding the fact of using TOR from providers, in most countries there is no need for this, because a huge number of people use Tor, as well as VPN, proxy.
Roll over Tor VPN or Proxy only if necessary, in case access to the service you need is limited for entering from the TOR IP (for example, you can enter the shipjet scoop service from either Tor or VPN or proxy
).
This is where the second part comes to an end. I remind you that the final part of the "Stuffer's Path" with brute force practice will be released only with good activity in all previous related topics! Ask all questions in the comments to the article.
Once you launch and configure everything - do not forget to register in SHIP JET!
Necessary inventory:
- Raspberry Pi 4
- SD card
- LAN cable
- BalenaEtcher software
- Putty software
Sequence of actions:
- Go to the software developer's website (torbox.ch) and download the software (it is advisable to find the old version 0.5.2 on the developer's GitHub or on the website, the new ones may not work for some!)
- After downloading, open BalenaEtcher, select the downloaded file, also select our SD card and click FLASH.
- After the image creation is complete, remove the SD card from the card reader, insert it into the Raspberry Pi - then launch it. It is important that all networks (LAN and Wifi) are disabled!
After launching the Raspberry Pi, wait a few minutes (from 2 to 10), after which a new WiFi network named TorBox052 will appear, after it appears, wait a few minutes to be able to connect to it.
Password from the CHANGE-IT network - Once connected to WiFi, open Putty.
Enter IP 192.168.42.1 and click Open - Click Accept
- Enter the login torbox and password CHANGE-IT (when you enter the password it is not visible)
- Click Yes
- We select the 3rd point (the Internet is taken from WiFi and is given encrypted to Tor via cable)
- Wait a few minutes, then turn off the raspberry and Wifi
- Only now we connect the LAN cable to the PC and launch the raspberry.
We wait a few minutes, after which we go to Putty. This time the IP is 192.168.43.1
Spoiler - Click Open Access
- Select your WiFi, press Enter, enter the password, press Enter. The inscription Connected should appear below. Go back to the Q button
- Click Yes
- Click Deactivate it
- Choose the bridge that suits you OBFS4 or SNOWFLAKE (depending on your location, TOR blocking)
- Waiting for the inscription Bootstrapped 100% Done
- Finish. Now all your traffic is wrapped in TOR.
I do not recommend hiding the fact of using TOR from providers, in most countries there is no need for this, because a huge number of people use Tor, as well as VPN, proxy.
Roll over Tor VPN or Proxy only if necessary, in case access to the service you need is limited for entering from the TOR IP (for example, you can enter the shipjet scoop service from either Tor or VPN or proxy

This is where the second part comes to an end. I remind you that the final part of the "Stuffer's Path" with brute force practice will be released only with good activity in all previous related topics! Ask all questions in the comments to the article.