Anonymize Kali Linux 2016.2 with Tor + Proxychains – Penetration Testing in Linux

Tor is a connection-based low-latency anonymous communication system.
Clients choose a source-routed path through a set of relays, and negotiate a “virtual circuit” through the network, in which each relay knows its predecessor and successor, but no others. Traffic flowing down the circuit is decrypted at each relay, which reveals the downstream relay.

Basically, Tor provides a distributed network of relays. Users bounce their TCP streams (web traffic, ftp, ssh, etc) around the relays, and recipients, observers, and even the relays themselves have difficulty learning which users connected to which destinations.

This package enables only a Tor client by default, but it can also be configured as a relay and/or a hidden service easily.

Client applications can use the Tor network by connecting to the local socks proxy interface provided by your Tor instance. If the application itself does not come with socks support, you can use a socks client such as torsocks.

Note that Tor does no protocol cleaning on application traffic. There is a danger that application protocols and associated programs can be induced to reveal information about the user. Tor depends on Torbutton and similar protocol cleaners to solve this problem. For best protection when web surfing, the Tor Project recommends that you use the Tor Browser Bundle, a standalone tarball that includes static builds of Tor, Torbutton, and a modified Firefox that is patched to fix a variety of privacy bugs.

As a hacker, you need to hide yourself on the Internet. On this topic, i am going to guide how to use Tor for this purpose.

Step 1: Add line below to your sources.list filedeb http://ift.tt/oEZMpj lucid main

Save and close

Step 2: Installing the key with command:

gpg –keyserver keys.gnupg.net –recv 886DDD89

Step 3: Using apt-get update command

Step 4: Install Tor package

apt-get install tor

Step 5: Start Tor service

service tor start

Step 6: Now you can use Tor with attack tools like nmap, sqlmap, metasploit….

The post Anonymize Kali Linux 2016.2 with Tor + Proxychains appeared first on Penetration Testing in Linux. http://ift.tt/2ps4iSO http://ift.tt/2aM8QhC

Anúncios

Deixe um comentário

Preencha os seus dados abaixo ou clique em um ícone para log in:

Logotipo do WordPress.com

Você está comentando utilizando sua conta WordPress.com. Sair / Alterar )

Imagem do Twitter

Você está comentando utilizando sua conta Twitter. Sair / Alterar )

Foto do Facebook

Você está comentando utilizando sua conta Facebook. Sair / Alterar )

Foto do Google+

Você está comentando utilizando sua conta Google+. Sair / Alterar )

Conectando a %s