Proxychains – A step to anonymity so that you don’t leave your trails and authorities don’t run after you. Kali Linux or any other Linux of you choice and TOR will help us become anonymous.
Kali Linux + TOR + Proxychains will let us be anonymous if you do the rest properly. So let us just start, follow the below steps
Start your Kali Linux Operating System.

Run the terminal and the following commands to ensure that TOR , Proxychains are running
NOTE : if you are not a root user you might need to use “sudo” before few lines below in terminal.
root@ETHICALHACKX:~# apt-get update root@ETHICALHACKX:~# apt-get install tor root@ETHICALHACKX:~# apt-get install proxychains root@ETHICALHACKX:~# service tor status

Now we need to configure the proxychains file in /etc/proxychains.conf . In Terminal or by file manager or any way edit the mentioned file.
root@ETHICALHACKX:~# gedit /etc/proxychains.conf

Edit the File to enable Dynamic Chains and comment out Strict chains. We will later discuss what are these.
Enable Dynamic Chains and Remove the hash in front.

Now Disable Strict chains by commenting the line – place a # in front

Enable Proxy Chains for DNS Request, if you don’t you can easily still be traced , so this is very important you enable DNS Requests to be behind proxy as well.

Now comes the Proxies, we will use the TOR proxy which we installed in first step.
you can use the choice of your proxy be it SOCKS 4 or SOCKS5 or whatever you want, we will be here using TOR, which runs on port 9050. Edit the file like below and save this and close.

Now next part is configuring the default DNS Resolver else we face error . Edit the file – /usr/lib/proxychains3/proxyresolv and than creat a link, in terminal type the below commands
root@ETHICALHACKX:~# gedit /usr/lib/proxychains3/proxyresolv

Here in the DNS address type the DNS you like to use, I would use Cloudflare 1.1.1.1 , you may chose any, Open dns or google DNS 8.8.8.8 , you choice, by the way clouflare DNS is really working excellent on all the fronts, my suggestion. After editing Save the file.

Create a link for the file above in case some distribution load the resources from a different location and we don’t want errors, type the below command in terminal
root@ETHICALHACKX:~# ln -s /usr/lib/proxychains3/proxyresolv /usr/bin/
We are done with the setup part now lets check.
I will just post a pic here to show it’s working.
And restart TOR and check status if running.
In terminal type the following Command to execute you application
root@ETHICALHACKX:~# service tor restart root@ETHICALHACKX:~# proxychains firefox duckduckgo.com root@ETHICALHACKX:~# proxychains nmap -sV -p1-1000 duckduckgo.com


Restarted tor and see the location changed again.

This was brief and setting up proxychains. We will discuss more into this thing to make it real though to be tracked and cover more details, there are multiple ways to track a user and we will cover each one of them in upcoming articles, I will try updating the article later.
does using sudo after you are already root turn you on or are you just that stupid to think you need it?
Yes that is silly of me to use sudo while I am already root, but not advised to use root account , hence it is there in post
Thanks for pointing out, will try to edit accordingly where needed
thanks for writing this up for beginners
gotta question for you, im having an error at ‘service tor status’
error is – cannot read PID file /var/run/tor/tor.pid
any idea why im getting this error?
Can you check if the file exists ?