How to stay anonymous in Kali Linux penetration testing – Install and configure ProxyChains and Tor For Anonymity

  • Post last modified:March 18, 2017
  • Post category:Linux
  • Post author:

During the penetration testing or vulnerability assessment or hacking, staying anonymous is one of the important factor. Without it, the internet connection will reveal your identity. kali linux is good for penetration testing because it will come with pre-installed hacking tools. In this tutorial we are goning to achive the anonymity by using ProxyChains and Tor. ProxyChains is proxifier for linux system. It allows TCP and DNS tunneling through proxies. It supports HTTP, SOCKS4 and SOCKS5 proxy servers.It uses multiple proxies at a time, so it is called Proxy Chaining. If you want to install kali linux on virtualbox, please click the above link. it will expain you in detail.
(more…)

Continue ReadingHow to stay anonymous in Kali Linux penetration testing – Install and configure ProxyChains and Tor For Anonymity