Abstract
The name suggests its true meaning. To keep anonymity we need several proxies. Behind these proxies we can hide our true identity. It is not successful all the time. But Kali Linux gives you a special opportunity to change the configuration at the root so that you can hide your true identity while browsing the web using Tor. Actually, in this case you need to configure your “prxychain.conf” file. You have already installed Tor.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2017 Sanjib Sinha
About this chapter
Cite this chapter
Sinha, S. (2017). Proxy Chains. In: Beginning Ethical Hacking with Python. Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4842-2541-7_27
Download citation
DOI: https://doi.org/10.1007/978-1-4842-2541-7_27
Published:
Publisher Name: Apress, Berkeley, CA
Print ISBN: 978-1-4842-2540-0
Online ISBN: 978-1-4842-2541-7
eBook Packages: Professional and Applied ComputingApress Access BooksProfessional and Applied Computing (R0)