Hacking is a risky task. Novice hackers are
always easy to get caught if
they don't use varied precautions. Almost every professional hacker hides
his original identity with different tools or his written code to get detected.
Several tools are included with Kali Linux
to help you stay anonymous
while attacking systems. However, remember the hard fact that tour
government, Isp providers and sometimes even the VPN services that you
are using can track you. As you get significant
experience in the hacking
field you will develop various strategies that can help you spoof your
identity with ease and conviction. For now,
follow along this chapter to
know in detail about TOR, VPN and how
to spoof your MAC address in
detail. We will give a set of commands and examples in detail for your
better understanding of the topic.
How to Use the TOR Network in Kali Linux?
Normally if you want to install Tor in any of the windows or Mac systems
you need to install the tor browser bundle
that will start an anonymous
server and routes all the traffic through it.
But in the Linux terminals, we will get an
opportunity to start the tor
routing server from the command line itself.
Use the following command to start tor bundle service:
start tor
First of all before connecting to the tor server check your IP address.
Because you need to recheck whether the Tor server is working or not look
at the IP address.
What is TOR?
TOR is a chain of interconnected computers that are present from the
different locations around the world that are used to spoof the location of
the system. Few network engineers who have
the motivation to make the
internet secure and stop getting monitored by government agencies has
started this TOR project.
How TOR works?
Whenever a request is sent from the TOR
service or ToR browser the
request is sent to one of the TOR networks. You might have confused now
because this is how proxies work and how it is different from it and how it
can be different from it?
This is where TOR achieved something no one ever did. TOR service,
unlike proxies, doesn't route through
one network but a bunch of
interrelated anonymous networks thus making the detection very difficult.