Wednesday, February 1, 2012

Introduction to TOR and Proxychains

Lets talk about TOR and Proxychains. These two things are a great tools to make us stay "Anonymous" while hacking.  

TOR first..
Tor is a virtual network tunnels that allows Internet user to greatly imrove their privcy and security while surfing on the Internet. Actually, tor was designed, implemented, and deployed as a third-generation onion routing project of the U.S Naval Research Laboratory. But the information about it is leaked and now everyone can use it on a wide variety of purposes. Originally developed with the U.S. Navy in mind for the purpose of protecting government communications.

Why do we need TOR?

Tor protects us againts some internet surveillance or known as traffic analysis. Traffic analysis can be used to know who is talking to whom over a public network. The data captured are some important information about us like the source and the destination address, our location, our network info, etc.

For more information about tor you can go to its official website here :

And now what is proxychains?
Proxychains is an amazing program that can create a chains of proxy for us to comunicate. The chains created can be used as a tunnel for any program we want to run. And the effect, we will be more secure while surfing on the web because any hacker that want to attack our machine will confused with the proxy.

When do we need proxychains?
We can use proxychains to get out from the LAN through proxy server on the internet. We can also use it to bypass the firewall or site blocker dns.
More information about proxychains here :

"the quieter you become, the more you are able to hear.."


Post a Comment