Welcome, Hacker.
Join the community to take advantage of all its opportunities
Sign up

Method Raise your own VPN




Aug 4, 2019
  • Magneto
  • 50 Reputation
  • Diamond
We buy the cheapest VPS (for example: To view the link, you must: Sign In or Sign Up )

After the purchase, the login data will go to the control panel by mail, put the debian of the latest version, there should be no problems with it.

We go by SSH (what is SSH, etc. we find out in Google, software for connecting to Putty SSH):

Updating the system:

 apt-get update
 apt-get upgrade
Next, run the automatic installer \ VPN tuner:

 wget https://git.io/vpn -O openvpn-install.sh && bash openvpn-install.sh
We follow the instructions, there will not be anything complicated, you can just press Enter and agree with everything in the flesh until the end of the installation, but I advise you to change the port at the beginning to your own.

After installation in the root directory will be the config of our VPN

Download it, for example, through the FileZilla program.

In order to create a config for a new device, simply run the installer script again:

 wget https://git.io/vpn -O openvpn-install.sh && bash openvpn-install.sh
And enter the name of the new config, the config will also appear in the root folder

Configuring openVPN on Windows (IP hiding):

Download and install OpenVPN To view the link, you must: Sign In or Sign Up

We start from the administrator, the VPN icon will appear in the tray, right-click on it and import our config downloaded from the server.

We are connected.

Configuring openVPN on ubuntu (IP hiding):

Will have to work in the terminal:

Install openVPN

 sudo apt-get install openvpn
Create a config file

Install the nano editor (you can use any):

 sudo apt-get install nano
- during installation, confirm with the "y" button

Create and edit the config:

 sudo nano /etc/openvpn/config.conf
We open the config downloaded from the VPS server with a text editor, copy everything that is there and paste it into the created config.conf file in the terminal

Press Ctrl + O to save and ctrl + x to exit

We launch:

 sudo openvpn --config /etc/openvpn/config.conf
If you want to start the VPN automatically after each reboot:

 sudo openvpn --config /etc/openvpn/config.conf
Anonymity of this method:

2 ways to disable logging:

Removing rsyslog:

 apt-get remove rsyslog
Disabling rsyslog:

 echo "if \ $ programname == 'openvpn' then ~"> /etc/rsyslog.d/openvpn.conf
/etc/init.d/rsyslog reload
Such a VPN is perfect for everyday use everywhere if you want:
  • Hide your real IP
  • Hide your activity from the provider
  • Use in various cafes and collective farm Wi-Fi networks
  • Use to bypass locks on various resources

Who, after setting up, has no connection to the server via OpenVPN, try this when executing the command:

 wget https://git.io/vpn -O openvpn-install.sh && bash openvpn-install.sh
Choose TCP rather than UDP

Error Solution:

ERROR: The certificate of `raw.githubusercontent.com 'is not trusted.

ERROR: The certificate of `raw.githubusercontent.com 'hasn't got a known issuer.

Run the command:

 sudo apt-get install ca-certificates
Definition of the tunnel (two-way ping often on 2ip.ru shows when checking). Cutting down using iptables:
# iptables -A OUTPUT -p icmp --icmp-type echo-request -j DROP

# iptables -A INPUT -p icmp --icmp-type echo-reply -j DRO

# iptables -A INPUT -p icmp --icmp-type echo-request -j REJECT
These commands block ICMP packets without any error messages from the server.

When using a VPN, I advise you to increase your anonymity using DNS from CloudFlare (when installing the script on VPS, select DNS or change it already in the system:


2606: 4700: 4700 :: 1111

2606: 4700: 4700 :: 1001
  • Like
Reactions: USAVALID

Members, viewing this thread

No members online now.