NML Says

Anonymizing Your Kali Activity1

After you are up and running you may want to start using the tor network. It runs as a service, and may be queried/operated by either of:

1
2
3
sudo service tor status
sudo service tor start
sudo service tor stop

To use our tools anonymously we hide behind a series of tor proxies. For that we must configure proxychains by editing its configuration file /etc/proxychains4.conf. Open it in nano, or vi (editors;)

Locate the line

#dynamic_chain

and remove the # (comment). Then make sure that random_chain, round_robin_chain, and strict_chain are all commented.

Now locate the line

proxy_dns

and verify that it is uncommented. Finally add the following as the last line of the file:

socks5 127.0.0.1 9050

There may be a similar line for socks4, the above must be added after that. Then Save and exit.

Once that is done, any TCP activity that you wish to do anonymously should be invoked from the CLI with a proxychains prepended. Eg

 1
 2
 3
 4
 5
 6
 7
 8
 9
10
11
12
13
14
sudo service tor stop
sudo service tor start

# and then 

proxychains firefox iba.dk

# or

proxychains nmap -target

# or

proxychains python sqlmap -u target

You may wish to verify the anonymity by doing

1
2
3
sudo service tor stop
sudo service tor start
proxychains firefox dnsleaktest.com

a few times.