Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

TOR

Tor is software and an open network that helps you defend against traffic analysis, a form of network surveillance that threatens personal freedom and privacy. It gives you access to the dark web.
Dark web is nothing but the encrypted network that exists between tor servers and their clients.
For more detail : https://www.torproject.org/

PROXYCHAINS

A tool that forces any TCP connection made by any given application to follow through proxy like TOR or any other SOCKS4, SOCKS5 or HTTP(S) proxy.
Supported auth-types: “user/pass” for SOCKS4/5, “basic” for HTTP.

STEPS:

1. Open kali linux terminal and type

root@kali:-# sudo apt-get install tor proxychains

root@kali:-# sudo service tor start

root@kali:-# gedit /etc/proxychains.conf

Go to http://proxylist.hidemyass.com/ . Select one ip and add as shown :

root@kali:-# proxychains wget http://ipinfo.io/ip -qO-

That’s it! Now you can use proxychains with any sort of command.

Example:

root@kali:-# proxychains sqlmap -u http://www.sqldummywebsite.com/cgi-bin/item.cgi?item_id=15 –dbs