A Quick Guide to Setting Up TryHackMe VPN on Kali Linux Network Manager

0P3N7H3cl00r
3 min readMar 25, 2024

--

Reason to Use Network Manager

  • Ease of Use: GUIs offer an intuitive, visual way to manage VPN connections, making it more accessible for beginners.
  • Management of Multiple Connections: A GUI allows for an easier overview and management of multiple VPN connections.
  • Visual Feedback: Errors and statuses are easier to understand through immediate visual cues and messages.

Step 1: Download Your TryHackMe VPN Configuration File

  1. Navigate to the “Access” section on the dashboard.
  2. Click on the “Download my configuration file” button. This will download a .ovpn file, which is crucial for setting up the VPN connection.

Step 2: Import the VPN Configuration to Network Manager

  1. Open the Network Manager by clicking on the network icon in your Kali Linux toolbar.
  2. Navigate to “VPN Connections” > “Configure VPN”.
  3. Click on “Add” and select “Import a saved VPN configuration” from the list, then click “Create”.
  4. Locate and select the .ovpn file you downloaded from TryHackMe, and click "Open".

Step 3: Configure VPN Settings

After importing the .ovpn file, some settings need to be adjusted:

In the VPN tab, name your connection something memorable like TryHackMe VPN.

  • Click Advanced.
  • Under General, uncheck Use custom renegotiation interval.
  • In Security, set Cipher to AES-256-CBC.
  • Hit Apply, then Save.

To connect, go to the network manager icon, select VPN Connections, and choose TryHackMe VPN. You’re now ready to securely access TryHackMe.

In the VPN tab, name your connection something memorable like TryHackMe VPN.
Click Advanced.
Under General, uncheck Use custom renegotiation interval.
In Security, set Cipher to AES-256-CBC.
Hit Apply
Hit Save
To connect, go to the network manager icon, select VPN Connections, and choose TryHackMe VPN. You’re now ready to securely access TryHackMe.

--

--

0P3N7H3cl00r
0P3N7H3cl00r

Written by 0P3N7H3cl00r

0P3N7H3cl00r here, managing the frontlines of cybersecurity. Let's explore the depths of security strategies and safeguard our digital realm together.

No responses yet