© Sanjib Sinha 2017

Sanjib Sinha, Beginning Ethical Hacking with Python, 10.1007/978-1-4842-2541-7_27

27. Proxy Chains

Sanjib Sinha

(1)Howrah, West Bengal, India

The name suggests its true meaning. To keep anonymity we need several proxies. Behind these proxies we can hide our true identity. It is not successful all the time. But Kali Linux gives you a special opportunity to change the configuration at the root so that you can hide your true identity while browsing the web using Tor . Actually, in this case you need to configure your “prxychain.conf” file. You have already installed Tor.

We need to open up the configuration file using “nano” text editor .

Open up your Kali Linux terminal as a root user and write down this command.

root@kali:∼# nano ...

Get Beginning Ethical Hacking with Python now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.