Skip to main content

Stay Anonymous while surfing on Internet | Basic Ethical Hacking Course


Nowadays, almost everything we Surf On Internet is tracked. We all know that everyone is being surveillanced in this Modern Era. The most Valuable thing in this modern world is Data. The regular users and Cybersecurity experts everyone wants to see how to determine the tracking and remain relatively anonymous on the internet and limit the ubiquitous surveillance.

Before further proceeding in hacking and penetration testing, the very first and most important step in a hacker's path is to Stay Anonymous while using Internet. In this tutorial, we are going to be anonymous by using proxychains and tor. We are going to learn how to change your IP address. We will perform this tutorial by using Kali Linux if you haven't installed Kali Linux on your PC then read our article on how to install kali linux in your PC .

Install Tor On Kali Linux

First lets install tor on our Kali Machine. Tor is free open network that enables anonymous communication. In Kali, open Terminal Window and type the following Command:

apt-get install tor



Then Press Y and hit enter. Now the Tor get installed. 

Install Proxychains On Kali Linux

Proxychains already comes preinstalled in Kali Linux if you don't have it then type the following command in the terminal for installation of proxychains:

apt-get install proxychains

Configure Proxychains 

You had installed proxychains. Now, you have to configure it. In order to configure type the following command in the terminal:

leafpad /etc/proxychains.conf 
OR
nano /etc/proxychains.conf

Nano and Leafpad are the text editors in Kali Linux System.
After typing the above commands, it will open the proxychains config file in text editor. Now in
the file kindly make some changes:


  • Find the strict_chain and comment the strict chain line by adding a hash(#) in front of it.
  • Uncomment the dynamic_chain by removing the hash(#).
  • Scroll down to the bottom of the page. If you want, you can add some additional proxies there or leave it as it is. You can find the proxies from this link. Find and select some good proxies which is reliable and add it in the bottom of the proxychains.conf file like the below format.
  • Add more than 5 for better result. It is useful if one of the proxy is down, then it will automatically use the other proxy in the list.


Now, Save the file and close it. Restart the tor service by typing this command:

service tor restart

If you want to use proxies while surfing on the internet then just run this command:

proxychains <the command you want proxied> <any arguments>

Example-

 proxychains firefox www.google.com

To Check you IP, run the following command:

proxychains firefox www.findmyip.org

Proxychains with for make detection much harder and it will help to stay anonymous. Also use do not tracking in your browser and use DuckDuckGo your search engine to increase your anonymity level. In addition, you can also use some sort of VPNs (NordVPN, GhostVPN, TurboVPN, etc). 

Keep Safe and Stay Anonymous in Kali Linux while Hacking and Penetration testing!

Comments

  1. ACTIVE & FRESH CC FULLZ WITH BALANCE
    Price $5 per each CC

    US FRESH, TESTED & VERIFIED SSN LEADS
    $1 PER EACH
    $5 FOR PREMIUM DATA

    CC DETAILS
    =>CARD TYPE
    =>FIRST NAME & LAST NAME
    =>CC NUMBER
    =>EXPIRY DATE
    =>CVV
    =>FULL ADDRESS (ZIP CODE, CITY/TOWN, STATE)
    =>PHONE NUMBER,DOB,SSN
    =>MOTHER'S MAIDEN NAME
    =>VERIFIED BY VISA
    =>CVV2

    SSN LEADS INFO
    First Name | Last Name | SSN | Dob | Address | State | City | Zip | Phone Number | Account Number | Bank NAME | DL Number | Home Owner | IP Address |MMN | Income

    Contact Us

    -->Whatsapp > +923172721122
    -->Email > leads.sellers1212@gmail.com
    -->Telegram > @leadsupplier
    -->ICQ > 752822040

    *You can buy for your specific states too
    *Payment in advance
    *Hope for the long term deal
    *Time wasters or cheap questioners please stay away
    *If you buy leads in bulk, I'll definitely negotiate
    *You can ask me for sample of Lead for demo

    US DUMP TRACK 1 & 2 WITH PIN CODES ALSO AVAILABLE

    ReplyDelete
  2. Hey Guys !

    USA Fresh & Verified SSN Leads AVAILABLE with best connectivity
    All Leads have genuine & valid information

    **HEADERS IN LEADS**
    First Name | Last Name | SSN | Dob | DL Number |Address | State | City | Zip | Phone Number | Account Number | Bank Name

    *Price for SSN lead $2
    *You can ask for sample before any deal
    *If anyone buy in bulk, we can negotiate
    *Sampling is just for serious buyers

    ==>ACTIVE & FRESH CC FULLZ ALSO AVAILABLE<==
    ->$5 PER EACH

    ->Hope for the long term deal
    ->Interested buyers will be welcome

    **Contact 24/7**
    Whatsapp > +923172721122
    Email > leads.sellers1212@gmail.com
    Telegram > @leadsupplier
    ICQ > 752822040

    ReplyDelete

Post a Comment

Popular posts from this blog

Embed Backdoor in any Android app | Android Hacking | Tricky Hash |

  H OW TO  CREATE A ANDROID TROJAN INTRO Everybody  install and use apps these days. So, the easiest way to hack a android by embed a Backdoor to a normal apk File. Now, install this apk file in your Victim's phone by using some Social Engineering trick.  When it is executed the user will see a normal app but in the same time our Backdoor will be running in the Background. REQUIREMENTS A Legitimate android apk file. Kali Linux  The FATRAT (Linux Tool) PROCEDURE   To embed Backdoor in any legitimate apk, we use fatrat. We have to install Fatrat in out terminal. Fatrat is used to generate local or remote listeners. It can generate payloads in various formats.  To Install Fatrat we'll have to use the following commands:  git clone  https://github.com/Screetsec/TheFatRat.git After cloning into TheFatRat now type: ls (enter) cd TheFatRat (enter) ls (enter) chmod +x setup.sh (enter) ls (enter) ./setup.sh (enter) It will automatically install all th...

CARDING!(BASICS,PROCEDURES,PRECAUTIONS,CONSEQUENCES)

part-1  * Why does the bank card number have #16 digits and what do these number s mean? * * 16 digits * on the card contains important information and * 6 digits * The first is the bank identification number and specifies which bank issued the card.  By examining these * 6 digits *, programmers will recognize the card issuing bank. "Brought to you by the Dark Army. * (Bank Identification Number) *   they say.  This number for some banks is as follows: Bank name Bank                       Bank Code      ----                       --------- Chemical Bank                    1263 Marine Midland                   6207 [1207?] Manufacturers Hanover Trust      1033 Citibank               ...

How to Guess any Password like Hackers Do | Password Cracking | Ethical Hacking |

In this article, I am going to tell you how Hackers and Crackers crack the password by Guessing. After reading this, you will be able to start think like a hacker. They use some methodologies while guessing and cracking passwords. So let's dive into it:  1. Guess the most common passwords At the end of every year, a list of the 25 most common passwords is released. These passwords are the easiest to guess and thus the most commonly hacked. Though you should avoid picking any of these passwords for yourself, try guessing from this list of passwords: 123456@  12345678  abc123  qwerty  monkey  letmein  dragon  baseball iloveyou  trustno1 1234567  sunshine  master  123123  welcome  shadow  Ashley  football  Jesus  Michael  ninja  mypassword  password1 2. Use some common password tricks  Other than guessing the most obvious passwords, there are a some tricks that are used by hackers....