Anonymizing your connection is one the main requirements you need to do when you want to do bad things... For this purpose we are going to use TOR.
"Tor is free software and an open network that helps you defend against a form of network surveillance that threatens personal freedom and privacy, confidential business activities and relationships, and state security known as traffic analysis"
First we install Tor:
sudo apt-get install tor
sudo apt-get install proxychains
Finally edit /etc/proxychains.conf and add the next line
socks4 127.0.0.1 9050
Now, we can run for example nmap anonymously.
Also, you can configure your browser for surfing on the Internet through Tor without Proxychains
First edit your Connection Settings and add a Manual Proxy.
Then your are hiding your connections. You could check it on http://whatismyipaddress.com/ for example.
Notes my Services are "Tor Exit Node" and that's not my real IP.
Finally you will work without worries...
this method only protects some layers but not all; it doesnt prevent dns leak for example; try using tor/privoxy instead
ReplyDeleteor at the end of your /etc/tor/torrc file, put in:
ReplyDeleteDNSPort 53
Then edit your /etc/resolv.conf so that it only says:
nameserver 127.0.0.1
Viola, dns requests are now routed through tor.