Browsing tag

how to use proxychains

How To Use Proxychains To Evade Detection in Kali Linux

The most important thing about doing penetration testing is anonymity, undetectable, or at least hard to be detected. The worst thing that can happen to any pentester is being detected by a security admin, the security technologies such as IDS, firewall, etc., or a forensic investigator. We need more additional tools in order to hide […]

How to Use Proxychains to Run Applications Behind Proxy

Some applications do not support proxy by default. Other applications might support HTTP proxy but fail when using SOCKS. As Tor provides a SOCKS proxy, you can not use it with your update or download client. Sure you can set up proxy variables (not SOCKS) in the shell, but there is a better alternative, Proxychains. […]