📚 How To Install Tor And Use Proxychains For Anonymizing Internet Surfing On Kali Linux 2016?
💡 Newskategorie: IT Security
🔗 Quelle: kalilinuxdojo.com
Tor |
What is Tor?
Tor is a free ware anonymizing software.Tor browser also known as onion browser.It helps user to surf the internet anonymously.To make the connection secure and protected,it route the traffic through more than seven thousand relays.We can also say tor server is by default setup with lots of tor proxy.The only purpose of tor to protect the identity of user and make the communication confidential and secure.To access tor service, you just need to download the Tor browser. Everything you do in the browser goes through the Tor network relays and doesn't need any setup or configuration from you.Tor browser provide slow internet as compare to other browser due to lot's of relays and tor internet security which make the tor connection secure and protected.
To make the anonymous and secure connection,it encrypt the data on application layer.It also encrypt data, including the destination IP address, multiple times and sends it through a virtual circuit comprising successive.
To make the anonymous and secure connection,it encrypt the data on application layer.It also encrypt data, including the destination IP address, multiple times and sends it through a virtual circuit comprising successive.
Uses of Tor?
Tor's technology not just about browsing internet anonymously. User can also host websites through tor hidden services that are only accessible by other Tor users using tor browser. It's on one of these hidden service sites that something like The Silk Road exists to traffic drugs, child pornography and arms trading, too.
How to install Tor??
Download and install tor using below command:
apt-get install tor
What is Proxychains?
Proxy chain is a open source software.It is available for all version of linux.Proxychain is a tool which force the tcp connection made by application to go through several proxies similar to tor or any other SOCKS4, SOCKS5 or HTTP proxy.
Uses of Proxychain
To hack the victim system without being detected,we first need to hide the ip address.This can be done by using proxiechains.So when attacker launch attack on victim machine using multiple proxies in a chain, we make it harder and harder to detect our original IP address. If one of those proxies is outside the jurisdiction of the victim, it makes it very unlikely that any traffic can be attributed to our IP address.
Proxychain |
How to configure proxychain?
To configure and setup a proxy server, first open up the configuration file of proxychains using below command:
vi /etc/proxychain.conf
After opening the file,find the dynamic_chain and uncomment it and then find the strict chain and comment it.
Now add the below line at the end of configuration file and save it!
Now add the below line at the end of configuration file and save it!
socks5 127.0.0.1 9050
How to browse internet anonymously using tor and proxychain?
Download and install tor as above.
Configure and setup proxychain as above.
Now start tor service using below command:
Now start tor service using below command:
service tor start
Now surf the internet by hiding the ip address using below command:
proxychains iceweasel http://www.kalilinuxdojo.com